Pre-association Security Negotiation for 11az SFD Follow up

Slides:



Advertisements
Similar presentations
Doc.: IEEE ai Submission NameAffiliationsAddressPhone George Calcev Huawei Technologies Co., Ltd. huawei.com TGai.
Advertisements

Doc.: IEEE /1042r1 Submission NameAffiliationsAddressPhone Giwon ParkLG Electronics LG R&D Complex 533, Hogye- 1dong, Dongan-Gu, Anyang,
Submission doc.: IEEE 11-10/1367r01 Nov 2012 Hiroshi Mano (ATRD)Slide 1 TGai- Motion/Straw Poll-Nov-2012-San-Antonio Date: Authors:
Submission doc.: IEEE 11-10/1367r00 Nov 2012 Hiroshi Mano (ATRD)Slide 1 TGai- Motion/Straw Poll-Nov-2012-San-Antonio Date: Authors:
Doc.: IEEE /0896r0 SubmissionJae Seung Lee, ETRISlide 1 Probe Request Filtering Criteria Date: July 2012.
PHY Security FRD and SRD Text
802.11az Negotiation Date: Authors: Jan 2017 Month Year
FILS Reduced Neighbor Report
Security for location determination at a Public Domain
Month Year doc.: IEEE yy/xxxxr0 May 2012
Resource Negotiation for Unassociated STAs in MU Operation
802.11az Negotiation Date: Authors: May 2017 Month Year
Trigger Frame Format for az
PHY Security FRD and SRD Text
Relay Threat Model for TGaz
Security for location determination at a Public Domain
SU Sounding Measurement Exchange and Feedback
Triggering the Broadcast Probe Response
FILS presentation on High Level Security Requirements
Protected LTF Using PMF in SU and MU Modes
Ranging ID and its Lifetime Management
Month Year doc.: IEEE yy/xxxxr0 July 2015
Month Year doc.: IEEE yy/xxxxr0 July 2017
Fast Authentication in TGai
Relay Threat Model for TGaz
Triggering the Broadcast Probe Response
Defense Against Multi-Channel Man-in-the-Middle (MITM)
Frame Protection for 11az
Pre-association Security Negotiation for 11az SFD Follow up
Defense Against Multi-Channel Man-in-the-Middle (MITM)
Resource Allocation for Unassociated STAs – Follow Up
Multiple Frequency Channel Scanning
Two-sided LMR Feedback between AP and STA
Pre-Association Security Negotiation (PASN) for 11az
11az STA Polling for MU NDP Ranging
MU Ranging Sequence Date: Authors: Nov 2017 Month Year
Month Year doc.: IEEE yy/xxxxr0 July 2015
Existence Indication of Attacker or Jammer in LMR
Band adjustment for fasat AP discovery
WUR Action Frame Format Follow up
An unified az Protocol Date: Authors: Nov 2016
Fast Authentication in TGai : Updates to EAP-RP
Intel Secured Location Threat Model
11az STA Polling for MU NDP Ranging
Jesse Walker and Emily Qi Intel Corporation
11az NDP Announcement Date: July 2008
Pre-Association Negotiation of Management Frame Protection (PANMFP)
Reducing Overhead in Active Scanning with Simulation Results
GCMP Restriction Date: Authors: January 2011 May 2010
Link Setup Flow July 2011 Date: Authors: Name Company
FTM Frame Exchange Authentication
Reducing Overhead in Active Scanning with Simulation Results
TGai FILS: GAS/ANQP Signaling Reduction
Triggering the Broadcast Probe Response
11az related bits in the Extended Capabilities element
CR for CID 1115 Date: Authors: May 2019
Month Year doc.: IEEE yy/xxxxr0 May 2012
Link Setup Flow July 2011 Date: Authors: Name Company
Defense Against Multi-Channel Man-in-the-Middle (MITM)
Defense Against Multi-Channel Man-in-the-Middle (MITM)
Intel Secured Location Threat Model
Secure SU and MU Ranging Measurement Procedure
Multiple Frequency Channel Scanning
Reducing Overhead in Active Scanning
PHY Security SRD Text Update
Reducing Overhead in Active Scanning
11az Negotiation Protocol (update)
Intel Secured Location Threat Model
CR for CID 1115 Date: Authors: May 2019
Month Year doc.: IEEE yy/xxxxr0 May 2012
Presentation transcript:

Pre-association Security Negotiation for 11az SFD Follow up Date: 2017-12-14 Authors: Name Affiliations Address Phone email Nehru Bhandaru Broadcom Ltd. 250 Innovation Drive San Jose, CA 95134 +1 408-922-5924 nehru.bhandaru@broadcom.com Matthew Fischer +1 408-543-3370 matthew.fischer@broadcom.com Jonathan Segev Intel Jonathan.segev@intel.com Chittabrata Ghosh Benny Abramovsky Ido Ouzieli 1

Introduction TGaz FRD 16/0424r7 - r38 – Requires support for PASN One secured mode that provides Authentication, Key Management, Encryption and Message Integrity in unassociated state TGaz SFD 11-17/0462r5 Security setup optional, but prior to 11az Protocol Negotiation Out of band keys may be used Fields over which range measurements are performed are protected TGaz 11/1737r0 outlines the proposed SFD text Contained straw poll(s) for possible SFD text This submission Few discussion items Update based on additional feedback Consolidated motion to be considered 2

Straw poll results during IEEE Nov 2017 meeting Add to SFD Security section: “PASN Authentication PASN authentication allows message authentication, encryption, and message integrity to be provided for selected 802.11 frames that require such protection. Whether such protection is required for a frame is determined by the security parameters negotiated for the exchange (e.g. 11az Protocol Negotiation) to which the frame belongs.” Results: Y: 22, N: 0, A: 6 3

Straw poll results during IEEE Nov 2017 meeting Add to SFD PASN Authentication section: “An AP indicates PASN support by advertising a TBD PASN AKM in RSNIE that is included in some of the Beacons and in Probe Responses, and also in neighbor reports and reduced neighbor reports where supported. A non-AP STA selects use of PASN authentication based on the security requirements of features that need pre-association security. 11az protocol security for an un-associated STA requires PASN.” Results: Y: 20, N: 0, A: 4 4

Strawpoll results during IEEE Nov 2017 meeting Add to SFD PASN Authentication section: “A non-AP STA and an AP use 802.11 authentication frames with the Authentication algorithm number set to TBD (PASN Authentication) for the protocol exchange.” Results: Y:18, N:0, A: 6 5

Straw poll results during IEEE Nov 2017 meeting Straw poll #3: Add to SFD PASN Authentication section: “A non-AP STA optionally, via PASN protocol, proposes to an AP a base AKM and PMKID(s) used to identify the PMK used for derivation of PTK for key confirmation and frame protection. An AP optionally, via PASN protocol, indicates to the non-AP STA, a base AKM and PMKID corresponding to the PMK used for derivation of PTK for key confirmation and frame protection. A non-AP STA and AP exchange ephemeral public keys to derive protection keys via PASN. The PTK for the exchange is derived from PMK, if any, and the shared secret from the ephemeral key exchange.” Results: Y: 18, N: 0, A: 4. 6

Straw poll results during IEEE Nov 2017 meeting Add to SFD Security section: “802.11az protocol negotiation and measurement reports shall be integrity protected and optionally encrypted for privacy. Results: Y: 22, N: 0, A: 1. 7

Discussion Items Use of E911/11u Mechanisms to generate pre-association keys E911 mechanisms for RSN described in Annex R5/R5.3/R5.3 of [1] Either Open association or Uses 11u Interworking Element 802.1x port protection is bypassed, “cryptographic keys are not exchanged” Feedback Feedback during Nov meeting may be about need to provide E911 bypass for 11az security That would be addressed by 11az negotiation; PASN is about establishing security association if required. Is this about 11az E911 requirements No. If there are any requirements they are to be addressed separately 8

Discussion Items Should privacy be optional for measurement reports Optional privacy requires non-PMF mechanism Suggest LMRs requiring both integrity and privacy 9

Discussion Items What Base AKMs do we need to support Can we just mandate a subset? Just FILS? FILS shared key + FT (using PMKr1) PSK modes less useful for pre-association security Feedback Base AKMs – why only FILS and FT FILS fastest, gaining traction and is likely to be adopted by the time 11az is available. One message exchange to setup SA FT already in market – PMKr0 SA already exists, leverage PMKr1 without additional negotiation Perhaps FILS + Any other AKM w/ PMK (including PSK modes) 10

Motion Move to adopt the following text in the TGaz SFD under Section 6 – Security - and grant the SFD editor editorial license: Pre-association Security Negotiation (PASN) authentication allows message authentication, encryption, and message integrity to be provided for selected 802.11 frames that require such protection. Whether such protection is required for a frame is determined by the security parameters negotiated for the exchange (e.g. 11az Protocol Negotiation) to which the frame belongs. An AP indicates PASN support by advertising a [TBD] PASN AKM in RSNIE that is included in some or all of the Beacons and in Probe Responses, and also in neighbor reports and reduced neighbor reports where supported. A non-AP STA selects use of PASN authentication based on the security requirements of features that need pre-association security. 11az protocol security for an un-associated STA requires PASN. 11

Motion – Contd.. A non-AP STA and an AP use 802.11 authentication frames with the Authentication algorithm number set to [TBD] (PASN Authentication) for the protocol exchange. A non-AP STA optionally, via PASN protocol, proposes to an AP a base AKM and PMKID(s) used to identify the PMK used for derivation of PTK for key confirmation and frame protection. An AP optionally, via PASN protocol, indicates to the non-AP STA, a base AKM and PMKID corresponding to the PMK used for derivation of PTK for key confirmation and frame protection. PASN protocol allows a FILS base AKM using shared key (See 12.12.2.3 of [1]) PASN protocol allows any base protocol with a PMK – e.g. FT base AKM using PMKr1 12

Motion – Contd.. A non-AP STA and AP exchange ephemeral public keys to derive protection keys via PASN. The PTK for the exchange is derived from PMK, if any, and the shared secret from the ephemeral key exchange. If 11az measurement security for type A or a type B attackers is required, the IEEE 802.11az negotiation protocol and measurement reports shall be integrity protected and encrypted for privacy. If 11az measurement security for type B attacker is required, the fields over which measurements are performed shall be protected (e.g. LTF sequence derived using the keys from PASN protocol). Moved: Seconded: Results: 13

References IEEE P802.11-REVmdTM/D0.3, September 2017 11-15-0030-09-0ngp-ngp-par-draft 11-15-0262-04-0ngp-csd-working-draft 11-16-0137-00-00az-ngp-use-case-document 11-16-0424-07-00az-functional-requirements-for-11az 11-17-1127-01-00az-comments-on-11az-functional-requirements 11-16/1643-00-00az-preassociation-negotiation-of-management-frame- protection 11-17/1737r0 - Pre-association Security Negotiation for 11az Slide 14