Doc.: IEEE 802.11-05/0539r2 Submission June 2005 Bill Marshall, TGr EditorSlide 1 Technical corrections to D0.01 Notice: This document has been prepared.

Slides:



Advertisements
Similar presentations
Doc.: IEEE /0282r0 Submission March, 2006 B Aboba, M Lefkowitz, K SoodSlide 1 Fast Transition in Neighbor Reports Notice: This document has been.
Advertisements

Doc.: IEEE /0032r1 Submission January 2007 Donghee Shim et al, LG Electronics, Inc.Slide 1 Comments resolutions: Emergency call support in 11u.
Doc.: IEEE /1065r0 Submission November 2005 Emily Qi et alSlide 1 Proposal for Load Balancing Notice: This document has been prepared to assist.
Doc.: IEEE /0256r0 Submission February 2007 A. Centonza, D. StephensonSlide 1 Limitations on the Use of EBR Notice: This document has been prepared.
Doc.: IEEE /0003r0 Submission January 2013 S. Filin H. Harada, NICTSlide 1 Introduction to Contributions Notice: This document has been prepared.
Doc.: IEEE /0866r1 Submission September 2005 Michael Montemurro, Chantry NetworksSlide 1 Mobility Domain Definition and Description Notice: This.
November 2005 Floyd Simpson, MotorolaSlide 1 doc.: IEEE /1193r0 Submission LB78 D3.0 Active Scanning Comments (clause ) Notice: This.
Doc.: IEEE /90r0 Submission Nov., 2012 NICTSlide b NICT Proposal IEEE P Wireless RANs Date: Authors: Notice: This document.
Doc.: IEEE /0930r0 Submission July 2006 Nancy Cam-Winget, Cisco Slide 1 Editor Updates since Jacksonville Notice: This document has been prepared.
Doc.: IEEE /1867r1 Submission November r Security TeamSlide 1 TGr Security Requirements Notice: This document has been prepared to.
Doc.: IEEE /0094r0 Submission November 2009 Steve Shellhammer, QualcommSlide 1 Comments on PAR Notice: This document has been prepared.
Doc.: IEEE /0566r1 Submission May 2006 Sood, Walker, Cam-Winget, CalhounSlide 1 TGr Security Architecture Notice: This document has been prepared.
Doc.: IEEE /0121r0 Submission January 2006 S. Bezzateev, A. Fomin, M. WongSlide 1 Broadcast Management Frame Protection Notice: This document.
Doc.: IEEE /0644r2 Submission May 2006 Päivi Ruuska, NokiaSlide 1 Measurement Pilot Transmission Information as optional information in Probe.
Doc.: IEEE /2155r0 Submission May 2007 Jiyoung et al.Slide 1 Advanced Event Request and Event Report Notice: This document has been prepared to.
Doc.: IEEE /0025r1 Submission January 2007 Peng Mo, Huawei Technologies Co., Ltd.Slide 1 MAPID for User Plane Support Notice: This document has.
Doc.: r Submission March 2006 AllSlide 1 A method to refresh the keys hierarchy periodically Notice: This document has been prepared to.
Doc.: IEEE yy/xxxxr0 Submission Month Year John Doe, Some CompanySlide 1 [place presentation subject title text here] Notice: This document has.
Doc.: IEEE /1219r2 Submission January, 2006 S. Ponnuswamy (Aruba Networks)Slide 1 Virtual AP Presentation Notice: This document has been prepared.
Doc.: IEEE /0538r4 Submission July 2005 Bill Marshall, TGr EditorSlide 1 Introducing 11r-d0.00 Notice: This document has been prepared to assist.
Doc.: IEEE /0239r0 Submission March 2005 Montemurro, Smith, Edney, KumarSlide 1 Resource pre-allocation and commmunication adhoc report Notice:
Doc.: IEEE /0408r0 Submission May 2005 John Klein, SymbolSlide 1 TPC Comments Notice: This document has been prepared to assist IEEE It.
Doc.: IEEE /0041r1 AP Location Capability January 2007 Donghee Shim et alSlide 1 AP Location Capability Notice: This document has been prepared.
Doc.: IEEE /1936r0 Submission December 2006 Bruce Kraemer, Marvell Adrian Stephens, IntelSlide 1 TGn Proposed Draft Revision Notice Notice: This.
Doc.: IEEE /86r2 Submission March, 2010 Gabor BajkoSlide 1 Location Proxy Notice: This document has been prepared to assist IEEE It is.
Doc.: IEEE /1219r4 Submission March, 2006 S. Ponnuswamy (Aruba Networks)Slide 1 Virtual AP Presentation Notice: This document has been prepared.
Doc.: IEEE /0xxxr0 Submission July, 2008 Hu JunlingSlide 1 Location Coordinates Inquiry Notice: This document has been prepared to assist IEEE.
Doc.: IEEE /0197r0 Submission March 2005 Nancy Cam-Winget et alSlide 1 TAP & JIT Merge Process Notice: This document has been prepared to assist.
Doc.: IEEE /01097r0 Submission November 2005 N. Cam-Winget, K. Sood, and J. WalkerSlide 1 EAPKIE Replay Counters and MIC Notice: This document.
Doc.: IEEE /1006r0 Submission September 2005 Andrew McDonald, Siemens Roke ManorSlide 1 Initial Network Selection Concept Notice: This document.
Doc.: IEEE /0467r1 Submission May 2005 Richard Paine, BoeingSlide 1 11k LB73 Security Resolutions Notice: This document has been prepared to assist.
Doc.: IEEE /0538r2 Submission June 2005 Bill Marshall, TGr EditorSlide 1 Introducing 11r-d0.00 Notice: This document has been prepared to assist.
FBMS Termination Date: Name Compay Address Phone
Beacon Measurement on Pilot Frames
Use of KCK for TGr Management Frame Protection
Resource Request/Response Discussion
Motions Date: Authors: January 2006
QoS Resource Query Overview
TGr Architectural Entities
Miscellaneous Updates
QoS Resource Query Overview
Miscellaneous Updates
Motions Date: Authors: January 2006
Fast Transition Mobility (FTM) Domain
Technical corrections to D0.01
Fast Transition Report
Technical corrections to D0.01
Mechanism to update current session parameters
Protection Assurance Method
Introducing 11r-d0.00 Date: Authors: January 2002
Motions for 2007/05 Date: Authors: May 2007 Month Year
Impact of KTP Non-definition
TPC Comments Date: Authors: January 2005
Updates to assigned numbers
Off-channel selection
Protection Assurance Method
Introducing 11r-d0.00 Date: Authors: July 2005
Location Capability Negotiation
2-Level Key Hierarchy Date: 19 July 2005 Authors: July 2005 Month Year
Transition Nowhere Date: Authors: Sept 2005 Sept 2005
Motion for request of assigned numbers
Non-AP STA Location Capability
Reserve Option Contradiction
A method to refresh the keys hierarchy periodically
A method to refresh the keys hierarchy periodically
Virtual AP Presentation
Use of KCK for TGr Management Frame Protection
Use of KCK for TGr Management Frame Protection
Use of Nonces in Fast Transitioning Flows
Greenfield protection mechanism
Presentation transcript:

doc.: IEEE /0539r2 Submission June 2005 Bill Marshall, TGr EditorSlide 1 Technical corrections to D0.01 Notice: This document has been prepared to assist IEEE It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. Release: The contributor grants a free, irrevocable license to the IEEE to incorporate material contained in this contribution, and any modifications thereof, in the creation of an IEEE Standards publication; to copyright in the IEEE’s name any IEEE Standards publication even though it may include portions of this contribution; and at the IEEE’s sole discretion to permit others to reproduce in whole or in part the resulting IEEE Standards publication. The contributor also acknowledges and accepts that this contribution may be made public by IEEE Patent Policy and Procedures: The contributor is familiar with the IEEE 802 Patent Policy and Procedures, including the statement "IEEE standards may include the known use of patent(s), including patent applications, provided the IEEE receives assurance from the patent holder or applicant with respect to patents essential for compliance with both mandatory and optional portions of the standard." Early disclosure to the Working Group of patent information that might be relevant to the standard is essential to reduce the possibility for delays in the development process and increase the likelihood that the draft publication will be approved for publication. Please notify the Chair as early as possible, in written or electronic form, if patented technology (or technology under patent application) might be incorporated into a draft standard being developed within the IEEE Working Group. If you have questions, contact the IEEE Patent Committee Administrator at. Date: Authors:

doc.: IEEE /0539r2 Submission June 2005 Bill Marshall, TGr EditorSlide 2 Abstract Numerous inconsistencies were discovered while generating the initial draft of the 11r amendment. Most appear to be “nearly editorial” in nature, but might possibly be considered technical changes. This presentation lists those discovered, and proposes resolutions to appear in the next draft of the amendment.

doc.: IEEE /0539r2 Submission June 2005 Bill Marshall, TGr EditorSlide 3 Change log of this contribution Changes in R1 –Authenticator address (AA) really is defined in 11ma (I missed it). No new definition is needed. Drop the change to – : Updated resolution to keep RSN IE as a separate IE in the frame, not embedded in the EAPKIE. (this was Resolution #2 in rev0). Changes in R2 –TTAP vs AP, and new term for FBT-enabled AP, to be a separate contribution; no change in from this document –Status code in FT Response and ACK Action frames to be 2 bytes –PTKName to be defined, (Resolution #2 in rev1) –Extended Capability bit resolution to be preempted by contribution –One more probable typo (“RSTA” should likely be “QSTA”) in 11.3A.3.

doc.: IEEE /0539r2 Submission June 2005 Bill Marshall, TGr EditorSlide SPA SPA is defined as the address of Supplicant, typically the STA’s MAC address SPA is used throughout as an acronym of an entity that participates in key derivation Resolution: SPA, when used as a key derivation participant, changed to “Supplicant”

doc.: IEEE /0539r2 Submission June 2005 Bill Marshall, TGr EditorSlide R2KH-ID Pairwise Master Key R2 Key Holder Identifier is defined as the holder of PMK-R1 Resolution: Pairwise Master Key R2 Key Holder Identifier (R2KH-ID): the 16 octet identifier that is advertised as the holder of the PMK-R2

doc.: IEEE /0539r2 Submission June 2005 Bill Marshall, TGr EditorSlide Association Message information contents Figure 121D, for First Contact, shows three additional fields in the Association and Association response (and also in the Reassociation and Reassociation response) messages, TSIE, TRIE, and RSNIE. They are not listed in the Association request nor Association response message. These fields are already shown in Reassociation request and Reassociation response in JIT-TAP proposal, section 5.7.3, , and Resolution: Add Information items to the Association request and Association response: –Fast Transition Security information –Fast Transition Resource information –Robust Security Network information No change yet to and , as that requires more details of the message contents

doc.: IEEE /0539r2 Submission June 2005 Bill Marshall, TGr EditorSlide RSN in Reassociation Request frame RSN IE not included in Reassociation request frame, due to its being included in the EAPOL-Key message in the EAPKIE 11i devices that don’t do 11r will put a RSN IE in the Reassociation request frame, so spec needs to allow it Other frames, specifically FT Action and Auth-FT, include both RSN IE and EAPKIE Resolution: Keep the RSN IE in the Reassociation request frame Don’t put the RSN IE in the EAPKIE Arrange the IEs so that RSN at order 9 is still between the Count and EAPKIE Note: whatever we do here, it should be the same as the FT Action frames and the Auth-FT frames, which seem to follow this resolution

doc.: IEEE /0539r2 Submission June 2005 Bill Marshall, TGr EditorSlide Reassociation timeout interval in Reassociation Response Time Interval IE, containing the Reassociation timeout value, is included in the Reassociation Response Doesn’t make much sense, since the reassociation has just been done. Does it only appear in error cases where the STA needs to quickly re-do the reassociation? Resolution: Drop the Time Interval IE from this message

doc.: IEEE /0539r2 Submission June 2005 Bill Marshall, TGr EditorSlide Reassociation Response JIT-TAP proposal listed several items in the Reassociation Response frame that are not presently in that message in –Listen Interval –Current AP Address –SSID –Power Capability –Supported Channels These all appear in the Reassociation Request, not response. Resolution: Drop them from the list of elements of this frame.

doc.: IEEE /0539r2 Submission June 2005 Bill Marshall, TGr EditorSlide Authentication frame Fast Transition Security Information Element shown as ALWAYS appearing in the message, not just in Fast Transition frames Probably a missing ref to footnote 3 in section 4.1 of JIT-TAP proposal Resolution: TSIE is only present in the Fast Transition Authentication frames as defined in Table 14

doc.: IEEE /0539r2 Submission June 2005 Bill Marshall, TGr EditorSlide AKM suites Suite type value 4 appears both as Authentication type “PSK” and as “Reserved” in JIT-TAP section Resolution: Value 4 is “PSK” Values are “Reserved”

doc.: IEEE /0539r2 Submission June 2005 Bill Marshall, TGr EditorSlide Length of Count IE Length of Count IE specified in JIT-TAP section as 0x03 11ma section states that length indicates the length of the information field, not the total length of the element Resolution: Length of Count IE is 0x01

doc.: IEEE /0539r2 Submission June 2005 Bill Marshall, TGr EditorSlide TRIE advertised by TTAP TRIE can only be advertised by a TTAP TSIE and KeyHolderIE can be advertised by an AP Resolution: TRIE can be advertised by an AP “TTAP” is used many places where it (the AP) likely doesn’t know if it might be a transition target or not. Many should probably be just “AP” Resolution: General consensus that a name is needed for an AP that has the capability to do Fast BSS Transitions, and that TTAP may not be the right term to use. Separate contribution needed to address this.

doc.: IEEE /0539r2 Submission June 2005 Bill Marshall, TGr EditorSlide length of TRIE JIT-TAP section showed “Fast Transition Resource Mechanism” as 3 octets, and the detailed figure of its content showed its length as 17 (bytes 0-16 defined) Resolution: Length field in TRIE must be set to 17

doc.: IEEE /0539r2 Submission June 2005 Bill Marshall, TGr EditorSlide Length of SMD-ID JIT-TAP section (TSIE) shows SMD- ID as bytes 1-15, with byte 0 unassigned. Resolution: SMD-ID is bytes 0-15, for a length of 16 Length field of TSIE is 64

doc.: IEEE /0539r2 Submission June 2005 Bill Marshall, TGr EditorSlide FT Action values FT Action values are defined as for the four messages FT Action values used in are !! Authentication messages are defined as for the four-way handshake Confusion likely Resolution: Change FT Action values to to match the values used in Authentication messages

doc.: IEEE /0539r2 Submission June 2005 Bill Marshall, TGr EditorSlide RSN within EAPKIE? RSN is shown separate from EAPKIE in the FT Action frames RSN is contained within EAPOL-Key according to JIT-TAP section If RSN is variable length, how can EAPKIE (containing RSN) be fixed length? Resolution: (tied up with issue in ) Keep RSN separate from EAPKIE, but within the range of IEs covered by the MIC.

doc.: IEEE /0539r2 Submission June 2005 Bill Marshall, TGr EditorSlide FT Response status code FT Response message doesn’t include a status code Status code is referenced in section 8A.4.2 Resolution: Add a 2-octet status code between TTAP and Count IE

doc.: IEEE /0539r2 Submission June 2005 Bill Marshall, TGr EditorSlide FT Response TIE Time Interval IE in FT Response “used to convey either the reassociation deadline time.” Resolution: Time Interval IE shall be set to the reassociation deadline time.

doc.: IEEE /0539r2 Submission June 2005 Bill Marshall, TGr EditorSlide FT ACK status code FT ACK message doesn’t include a status code Status code is referenced in section 8A.4.2 Resolution: Add a 2-octet status code between TTAP and Count IE

doc.: IEEE /0539r2 Submission June 2005 Bill Marshall, TGr EditorSlide A.2 PMK-R2 naming PMK-R2 is named by the SPA, R0KH, R1KH, and R2KH AA is included in the formula in 8.5A.6 Resolution: Add AA to the list in 8.5A.2

doc.: IEEE /0539r2 Submission June 2005 Bill Marshall, TGr EditorSlide A.2 PTKName PTK is named by SNonce, ANonce, SPA, and TTAP (==BSSID? ==AA?) Several refs later to PTKName, 8A.3, 8A.4.1, 8A.4.2; its computed, but is it ever used? No definition of PTKName in 8.5A.8 Resolution: 8.5A.8 to include a definition of PTKName Definition to be provided by separate contribution Add informative text explaining why names are useful – particularly in debugging or trace outputs that should not display keys, but want to know whether the correct key is being used. Editor to add this text.

doc.: IEEE /0539r2 Submission June 2005 Bill Marshall, TGr EditorSlide A.2 PTKey derivation Figure 120B in 8.5A.2 has string for PTK “PTKey derivation” 8.5A.8 has string for PTK “PTK Key derivation” Resolution: String should be “PTK Key derivation”

doc.: IEEE /0539r2 Submission June 2005 Bill Marshall, TGr EditorSlide A.2 PTK formula Formula for PTK in Figure 120B has “SPA || AA” Formula for PTK in 8.5A.8 has “AA || SPA” Resolution: Fix figure, (so it is consistent with PMK-R2) using “AA || SPA”

doc.: IEEE /0539r2 Submission June 2005 Bill Marshall, TGr EditorSlide A.9 Auth frame sequences Currently state that Message type is Management, Message subtype is Authentication Messages are mapped into Authentication/Reassociation frames for base mechanism Messages are mapped into 4 Authentication frames for over-the-air reservation Messages are mapped into 4 Action frames for over-the-ds reservation This could be the primary definition of the authentication message sequence for FBT Resolution: Define these frame sequences as based only on a sequence of IEs, (first) Count, RSN, TRIE, TSIE, (optionally) TIE, (optionally) RIC, (optionally) others, (lastly) EAPKIE; and other information that needs to be given in surrounding parts of messages Need a contribution for the text.

doc.: IEEE /0539r2 Submission June 2005 Bill Marshall, TGr EditorSlide 26 8A.1.1 Extended Capability bit Original text in JIT-TAP referenced the Extended Capability bit No other definition of that IE is in proposal Resolution: “Fast Transition capability will be advertised in the Beacon and Probe Response frames” Presence of TRIE and TSIE advertises FT Contribution 0551 addresses this and will pre-empt the above text; Editor to keep section 8A.1.1 consistent with the definition of the frame contents.

doc.: IEEE /0539r2 Submission June 2005 Bill Marshall, TGr EditorSlide 27 8A.1.2 Reassoc Resp SNonce Figure 121A has ANonce in Reassociation Response Section says it should be SNonce Resolution Fix figure, it should be SNonce

doc.: IEEE /0539r2 Submission June 2005 Bill Marshall, TGr EditorSlide 28 8A.1.2 use of CIE Figures 121A/B/C includes CIE STA and CIE AP. Presumed to mean “Count IE”, but unclear and CIE is never defined. Resolution: No subscript needed for that IE Change to “Count” in figure

doc.: IEEE /0539r2 Submission June 2005 Bill Marshall, TGr EditorSlide 29 8A.1.2 ordering of IEs in figure Ordering of the IEs used in Fast Transition is inconsistent between figures and text Resolution: Decide this is an editorial change Let editor fix the “order” values in frames to match frame definition

doc.: IEEE /0539r2 Submission June 2005 Bill Marshall, TGr EditorSlide 30 8A.1.3 Authentication ACK ANonce Figure 121B has Authentication ACK containing ANonce Section 8.5A.8.4 claims it should be SNonce Resolution Fix figure to use SNonce

doc.: IEEE /0539r2 Submission June 2005 Bill Marshall, TGr EditorSlide 31 8A.1.3 Reassoc Response ANonce Figure 121B has Reassociation Response containing ANonce Section says this frame should contain SNonce Resolution Fix figure; it should be SNonce

doc.: IEEE /0539r2 Submission June 2005 Bill Marshall, TGr EditorSlide 32 8A.1.3 Action ACK with ANonce Figure 121C has Action ACK frame with ANonce Section says it should be SNonce Resolution Fix figure; it should be SNonce

doc.: IEEE /0539r2 Submission June 2005 Bill Marshall, TGr EditorSlide 33 8A.1.3 Reassoc Response ANonce Figure 121C has Reassociation Response containing ANonce Section says this frame should contain SNonce Resolution Fix figure; it should be SNonce

doc.: IEEE /0539r2 Submission June 2005 Bill Marshall, TGr EditorSlide 34 8A.1.3 use of EAPKeyIE Figure 121C Action Response frame contains EAPKeyIE Everywhere else it is EAPKIE Resolution Change to EAPKIE in figure

doc.: IEEE /0539r2 Submission June 2005 Bill Marshall, TGr EditorSlide 35 8A.1.4 EAPOL-Key-FT needed? Section (11i) defined EAPOL-Key Current definition allows arbitrary IEs to be included as Key-data No reason apparent for a new EAPOL-Key-FT to be defined Resolution: Drop EAPOL-Key-FT; change to EAPOL-Key Define EAPOL-Key like Auth-FT was defined – with “Data: additional information elements carried in the Key-data portion of the message” Add KeyName to , referencing RSNIE PMKID (this is the only addition that names something already in the message instead of adding an additional IE to Key-data)

doc.: IEEE /0539r2 Submission June 2005 Bill Marshall, TGr EditorSlide 36 8A.3, 8A.4 Status code in msg#1 Auth-FT message #1 (TSTA->TTAP) shown with SC in 8A.3 Auth-FT message #1 with SC in 8A.4.1 There is no status to report in the first message Resolution Change “SC” to “0” in those two messages

doc.: IEEE /0539r2 Submission June 2005 Bill Marshall, TGr EditorSlide 37 8A.4 Encapsulation for over-the-DS messages between CAP and TTAP Original text said encapsulation was TBD Is it intended to be defined in TGr? ??? Resolution: Change to “encapsulation method beyond the scope of this specification.”

doc.: IEEE /0539r2 Submission June 2005 Bill Marshall, TGr EditorSlide 38 8A.4.1 lack of SC in Auth-FT msg Third and fourth message of authentication sequence not shown with status code value in 8A.4.1 Evidently just a skipped parameter Resolution: Third message, add “0, ” to params Fourth message, add “SC, “ to params

doc.: IEEE /0539r2 Submission June 2005 Bill Marshall, TGr EditorSlide 39 8A.4.2 Method for TTAP to retrieve PMK-R2 from infrastructure Original text said TBD Section 8A.4.1 in similar paragraph said “beyond scope of this specification” Resolution Change to “beyond scope of this specification”

doc.: IEEE /0539r2 Submission June 2005 Bill Marshall, TGr EditorSlide 40 8A.4.2 SC in FT Action frames Section 8A.4.2 mentions a Status code returned by the TTAP in a FT Action frame Definition of FT Action frames ( , ) do not include a status code Resolution Add a Status Code to FT Action Response Add a Status Code to FT Action Ack And, BTW, there is no reason to add an acronym “SC” when the full word “Status” will do just fine

doc.: IEEE /0539r2 Submission June 2005 Bill Marshall, TGr EditorSlide 41 8A.3, 8A.4.1, 8A.4.2 value of MIC in Reassociation Request message Reassociation Request message “echoes the TTAP’s ANonce and authentication tag in the respective Key Nonce and MIC fields.” Echo of a previous authentication tag doesn’t sound like an algorithm to calculate a MIC Section “TSTA … authenticating the frame by including a valid MIC in the EAPKIE.” Resolution Reassociation Request echoes the ANonce Reassociation Request calculates a MIC

doc.: IEEE /0539r2 Submission June 2005 Bill Marshall, TGr EditorSlide A.3 TS Lifecycle TS successfully created … in case the RSTA in question transitions to it. No definition in 11ma, nor 11e for RSTA Likely typo and should be QSTA Resolution QSTA

doc.: IEEE /0539r2 Submission June 2005 Bill Marshall, TGr EditorSlide 43 Throughout: use of “(Re)-association” 8A.2 “First Contact”, along with Figure 121D, uses “(Re)- association” –Could be either “Association” or “Reassociation” Other uses of (Re)-association (numerous) –Really only mean reassociation –Remember this is a document about BSS transitions, not about initial associations Resolution: Change occurrences of “(Re)-association” to “Reassociation” except in section 8A.2 “First Contact”

doc.: IEEE /0539r2 Submission June 2005 Bill Marshall, TGr EditorSlide 44 Motion To instruct the editor to include the resolutions given in this document in the next draft of the 11r amendment.