Doc.: IEEE 802.11-05/0467r1 Submission May 2005 Richard Paine, BoeingSlide 1 11k LB73 Security Resolutions Notice: This document has been prepared to assist.

Slides:



Advertisements
Similar presentations
Doc.: IEEE /0300r1 Submission May 2007 Guenael Strutt, MotorolaSlide 1 LB93 Unresolved RFI Comments Notice: This document has been prepared to.
Advertisements

Doc.: IEEE /0032r1 Submission January 2007 Donghee Shim et al, LG Electronics, Inc.Slide 1 Comments resolutions: Emergency call support in 11u.
Doc.: IEEE /0256r0 Submission February 2007 A. Centonza, D. StephensonSlide 1 Limitations on the Use of EBR Notice: This document has been prepared.
Doc.: IEEE /0866r1 Submission September 2005 Michael Montemurro, Chantry NetworksSlide 1 Mobility Domain Definition and Description Notice: This.
Doc.: IEEE /90r0 Submission Nov., 2012 NICTSlide b NICT Proposal IEEE P Wireless RANs Date: Authors: Notice: This document.
Doc.: IEEE /0930r0 Submission July 2006 Nancy Cam-Winget, Cisco Slide 1 Editor Updates since Jacksonville Notice: This document has been prepared.
Doc.: IEEE /1867r1 Submission November r Security TeamSlide 1 TGr Security Requirements Notice: This document has been prepared to.
Doc.: IEEE /0094r0 Submission November 2009 Steve Shellhammer, QualcommSlide 1 Comments on PAR Notice: This document has been prepared.
Doc.: IEEE /0644r2 Submission May 2006 Päivi Ruuska, NokiaSlide 1 Measurement Pilot Transmission Information as optional information in Probe.
Doc.: IEEE /2237r0 Submission July 2007 Emily Qi, Intel CorporationSlide 1 TGv Redline D1.0 Insert and Deletion Notice: This document has been.
Doc.: IEEE /1936r0 Submission December 2006 Bruce Kraemer, Marvell Adrian Stephens, IntelSlide 1 TGn Proposed Draft Revision Notice Notice: This.
Doc.: IEEE /86r2 Submission March, 2010 Gabor BajkoSlide 1 Location Proxy Notice: This document has been prepared to assist IEEE It is.
Doc.: IEEE /0028r0 Submission January 2005 Eleanor Hepworth, Siemens Roke ManorSlide 1 Definitions and Terminology Notice: This document has been.
Doc.: IEEE /1528r0 Submission 22 September 2006 Naveen Kakani, Nokia, IncSlide 1 TGn PSMP adhoc Group September Closing Report Notice: This document.
Doc.: IEEE /0197r0 Submission March 2005 Nancy Cam-Winget et alSlide 1 TAP & JIT Merge Process Notice: This document has been prepared to assist.
Doc.: IEEE /1006r0 Submission September 2005 Andrew McDonald, Siemens Roke ManorSlide 1 Initial Network Selection Concept Notice: This document.
Doc.: IEEE /0215r1 Submission January 2006 Jesse Walker, Intel CorporationSlide 1 TGw Closing Report Notice: This document has been prepared to.
Doc.: IEEE /2112r1 Submission Peter Loc, MarvellSlide 1 TGn LB97 Frame Format Ad Hoc San Francisco, July 2007 Notice: This document.
Doc.: IEEE /0652r1 Submission May 2007 Emily Qi, Intel CorporationSlide 1 TGv Redline D0.12 Insert and Deletion Notice: This document has been.
Beacon Measurement on Pilot Frames
Submission on comments to +HTC frames
LB84 General AdHoc Group Sept. Closing TGn Motions
LB84 General AdHoc Group Sept. Closing TGn Motions
[ Interim Meetings 2006] Date: Authors: July 2005
Motions Date: Authors: January 2006
LB73 Noise and Location Categories
LB73 Noise and Location Categories
Waveform Generator Source Code
March 2014 Election Results
Attendance and Documentation for the March 2007 Plenary
3GPP Extended Date: Authors: July 2005 July 2005
[ Policies and Procedure Summary]
Motion to accept Draft p 2.0
Protected SSIDs Date: Authors: March 2005 March 2005
Motions Date: Authors: January 2006
(Presentation name) For (Name of group) (Presenter’s name,title)
TGp Closing Report Date: Authors: March 2006 Month Year
TGn PSMP ad hoc Agenda – September 14 ‘06
On Coexistence Mechanisms
TGu-changes-from-d0-02-to-d0-03
On Coexistence Mechanisms
TGp Closing Report Date: Authors: March 2006 Month Year
Reflector Tutorial Date: Authors: July 2006 Month Year
TGv Redline D0.07 Insert and Deletion
TGv Redline D0.06 Insert and Deletion
Experimental DTV Sensor
IEEE WG Opening Report – July 2008
TGu-changes-from-d0-01-to-d0-02
Number of Encoder as a function of MCS
LB73 Noise and Location Categories
TGy draft 2.0 with changebars from draft 1.0
IEEE WG Opening Report – July 2007
WAPI Position Paper Sept 2005 Sept 2005 IEEE WG
Redline of draft P802.11w D2.2 Date: Authors:
Updates to assigned numbers
Document Motions Date: Authors: November 2005 November 2005
TGp Closing Report Date: Authors: March 2007 Month Year
TGr Proposed Draft Revision Notice
TGu-changes-from-d0-02-to-d0-03
[ Policies and Procedure Summary]
Beamforming and Link Adaptation Motions
Draft P802.11s D1.03 WordConversion
Motion to go to Letter Ballot
TGu-changes-from-d0-04-to-d0-05
Transition Nowhere Date: Authors: Sept 2005 Sept 2005
TGu-changes-from-d0-03-to-d0-04
TGu Motions Date: Authors: May 2006 May 2006
WAPI Position Paper Sept 2005 Sept 2005 IEEE WG
Use of KCK for TGr Management Frame Protection
TGr Proposed Draft Revision Notice
Presentation transcript:

doc.: IEEE /0467r1 Submission May 2005 Richard Paine, BoeingSlide 1 11k LB73 Security Resolutions Notice: This document has been prepared to assist IEEE It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. Release: The contributor grants a free, irrevocable license to the IEEE to incorporate material contained in this contribution, and any modifications thereof, in the creation of an IEEE Standards publication; to copyright in the IEEE’s name any IEEE Standards publication even though it may include portions of this contribution; and at the IEEE’s sole discretion to permit others to reproduce in whole or in part the resulting IEEE Standards publication. The contributor also acknowledges and accepts that this contribution may be made public by IEEE Patent Policy and Procedures: The contributor is familiar with the IEEE 802 Patent Policy and Procedures, including the statement "IEEE standards may include the known use of patent(s), including patent applications, provided the IEEE receives assurance from the patent holder or applicant with respect to patents essential for compliance with both mandatory and optional portions of the standard." Early disclosure to the Working Group of patent information that might be relevant to the standard is essential to reduce the possibility for delays in the development process and increase the likelihood that the draft publication will be approved for publication. Please notify the Chair as early as possible, in written or electronic form, if patented technology (or technology under patent application) might be incorporated into a draft standard being developed within the IEEE Working Group. If you have questions, contact the IEEE Patent Committee Administrator at. Date: Authors:

doc.: IEEE /0467r1 Submission May 2005 Richard Paine, BoeingSlide 2 Comment #309 Comment: Security is needed - even if it is not specified in k, there should be a clause limiting to use of certain functions such that they are only allowed where appropriate security services are available Resolution: Asked Jon Edney by to provide what functions need to be constrained and where he thinks this should go. Peter E.: Location might be one of those functions

doc.: IEEE /0467r1 Submission May 2005 Richard Paine, BoeingSlide 3 Comment #353 Comment: IEEE F-2003 called secure even though this recommended practice does not define security measures for the IAPP packets. IEEE F contains a comment saying that ESP can be used to protect MOVEs, but leaves the encryption details quite open. Resolution: Remove reference to 11F, even though he is wrong.

doc.: IEEE /0467r1 Submission May 2005 Richard Paine, BoeingSlide 4 Comment #358 Comment: Number of comments asking for security in LB71 were declined with a statement that "telecon participants do not agree". It looks like more than one commenter believed that security should be included for IEEE k additions, e.g., for Action frames. I strongly believe that all new amendments to IEEE should take security considerations into account. Is there a consensus on this not being the case for IEEE k? Recommended Resolution: Declined. TG11w has the charter and scope to secure action frames.

doc.: IEEE /0467r1 Submission May 2005 Richard Paine, BoeingSlide 5 Comment #378, #1385, and #1386 Comment: Lefkowitz: Table k12 is the first place preauth is mentioned. Preauth is an i concept i has not been ratified and thus this reference should not be in the specification. Moreton: If the current AP doesn't support pre-auth there is no way of telling if the remote one does. As most current APs will not know whether the new AP uses the same authenticator (authentication server), it's important to distinguish between this case and the case where the new AP is known not to have the same authenticator (Authentication server). Recommended Resolution: Accept resolution of #1385 and #1386 as the resolution for #378: Add a bit to the capabilities field. Exclude pre-auth from the check for the security bit. 11k misused the authenticator definition - change authenticator to authentication server in all cases. Action: Defer and have a Simon Black discussion with Mike Moreton

doc.: IEEE /0467r1 Submission May 2005 Richard Paine, BoeingSlide 6 Comment #628 Comment: The draft appears to contain no mechanisms to secure measurement requests and responses Recommended Resolution: Declined. TG11w has the charter and scope to secure measurement requests and responses, 11k does not.

doc.: IEEE /0467r1 Submission May 2005 Richard Paine, BoeingSlide 7 Comment #830, #1339, and #1394 Comment: Security bit should be set when the reported BSSID supports all of the security elements used by the associated STA, not all of the possible security settings of the current AP Recommended Resolution: Change text to: The Security bit, if set, indicates that the AP represented by this BSSID supports the security settings of the associated STA. Decline – the STA is aware of the current security capabilities and itself, so is in the best position to make the determination.

doc.: IEEE /0467r1 Submission May 2005 Richard Paine, BoeingSlide 8 Comment #1340 Comment: The Key Scope bit is ill defined if it's meant to facilitate roaming. I believe the intent was to specify the same "Authentication Server", not authenticator. Even then this is of somewhat limited use since two APs may not have the same AS but this bit should be set for roaming. Recommended Resolution: Accepted. Leave the bit as reserved and let TGr define it since some of the concepts of TGr may map directly to what this bit was intended for (as I understand it): Remove key scope bit from 11k (lines on Page 31 and figure k24 bit 3, remove from MIB P108 & P109 (3 places in the MIB))