Motion to Incorporate PSK RSN Extensions into TGi D2

Slides:



Advertisements
Similar presentations
Doc.: IEEE /360r0 Submission May 2002 Carlos Rios, RiosTek LLC Slide 1 “ARSN” An Adjunct RSN Proposal Carlos Rios RiosTek LLC.
Advertisements

Doc.: IEEE /431r0 Submission July 2002 Carlos Rios, RiosTek LLC Slide 1 Pre-Shared Key RSN Extensions Enrollment, Authentication and Key Management.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
WPA2 By Winway Pang. Overview  What is WPA2?  Wi-Fi Protected Access 2  Introduced September 2004  Two Versions  Enterprise – Server Authentication.
Marwan Al-Namari Week 10. RTS: Ready-to-Send. CTS: Clear-to- Send. ACK: Acknowledgment.NAV: network allocation vector (channel access, expected time to.
Wireless Security Issues David E. Hudak, Ph.D. Senior Software Architect Karlnet, Inc.
Network and Internet Security
Michal Rapco 05, 2005 Security issues in Wireless LANs.
Wireless and Security CSCI 5857: Encoding and Encryption.
Chapter Network Security Architecture Security Basics Legacy security Robust Security Segmentation Infrastructure Security VPN.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
WEP Protocol Weaknesses and Vulnerabilities
Doc.: IEEE /331r1 Submission May 2002 Carlos Rios, RiosTek LLC Slide 1 Postmortem Opinions on LB35/TGi D2.0 Carlos Rios RiosTek LLC.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
Lecture 24 Wireless Network Security
Wireless Network Security CSIS 5857: Encoding and Encryption.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
EECS  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Doc.: IEEE /0103r0 Submission January 2004 Jesse Walker, Intel CorporationSlide 1 Some LB 62 Motions January 14, 2003.
Richard EAP-WAI Authentication Protocol Stockholm, IETF 75th draft-richard-emu-wai-00.
Understand Wireless Security LESSON Security Fundamentals.
CAPWAP Threat Analysis
Robust Security Network (RSN) Service of IEEE
CSE 4905 WiFi Security II WPA2 (WiFi Protected Access 2)
Outline What is Wireless LAN Wireless Transmission Types
“ARSN” An Adjunct RSN Proposal Carlos Rios RiosTek LLC
Lecture 29 Security in IEEE Dr. Ghalib A. Shah
September 2005 Test Methodology, Metrics and Test Cases for measuring BSS Transition Performance Date: Authors: Notice: This document has been.
Enhanced Security Features for
Some LB 62 Motions January 13, 2003 January 2004
A Wireless LAN Security Protocol
Enhanced Security Features for
COMPUTER PRIVACY.
TGi Motions for Comment Resolution
Proposed Modifications to
Wireless LAN Security 4.3 Wireless LAN Security.
doc.: IEEE xxx Bob Beach Symbol Technologies
TSN Architecture Mike Moreton, STMicroelectronics
Nancy Cam-Winget, Cisco Systems Inc
IEEE i Dohwan Kim.
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec
Mutual Authentication
March 2001 Optional MAC-Level Security Enhancements for Home WLANs Carlos Rios LinCom Wireless Carlos Rios, LinCom Wireless.
basics Richard Dunn CSE July 2, 2003.
July 2002 Threat Model Tim Moore Tim Moore, Microsoft.
Mutual Authentication
WLAN Security Antti Miettinen.
Proposed Modifications to e-D4.0 Direct Link Protocol
AP Architecture Thoughts
Jesse Walker and Emily Qi Intel Corporation
doc.: IEEE /454r0 Bob Beach Symbol Technologies
Antti Miettinen (modified by JJ)
GCMP Restriction Date: Authors: January 2011 May 2010
Roaming timings and PMK lifetime
Responses to Clause 5 Comments
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec
Frame Request-Report Enhancements
Roaming timings and PMK lifetime
Tim Moore Microsoft Pejman Roshan Nancy Cam-Winget Cisco Systems, Inc
Session MAC Address Solves Deadlocks
Fast Roaming Observations
Sept 2003 PMK “sharing” Tim Moore Tim Moore, Microsoft.
Roaming timings and PMK lifetime
Group Key Optimizations
IEs in 4-way handshake description
Postmortem Opinions on LB35/TGi D2.0 Carlos Rios RiosTek LLC
Comment Resolution Motions
Presentation transcript:

Motion to Incorporate PSK RSN Extensions into TGi D2 Motion to Incorporate PSK RSN Extensions into TGi D2.3 Carlos Rios RiosTek LLC

The Motion “Move to instruct the Technical Editor to work with the interested parties and incorporate the Pre-Shared Key RSN Extension protocols as presented in 02/431r0 and 02/432r0 into the successor revision of the 802.11i D2.2 draft text”

Argument 1 For PSKE D2.2 802.1x protocols inadequately address enhanced security for the Small BSS (WLAN not provisioned with RADIUS) D2.2 talks about pre-shared key support (Enrollment) Provides 4 way EAPOL handshake, key hierarchy structure (Key Management) D2.2 provides for NO Authentication if no AS is present Handwaves an “Implicit Authentication” “Just go ahead and send encrypted packets- If you DON’T suffer catastrophic loss of data and/or get disassociated by countermeasures then you are Authenticated” UNACCEPTABLE! Positive mutual authentication is essential to the RSN PSKE provides full enhanced security support for the SBSS User friendly PSK Enrollment Key Management simpler than, yet equivalent to 802.1x Mutual Authentication Counterpoint: 802.1x based protocols CAN support SBSS Just incorporate an Authentication Server into the AP Yeah, Sure. Well, whoever really wants to do that, just knock yourself out- just let ME do it the easy way- PSKE

Argument 2 For PSKE D2.2 802.1x protocols inadequately address enhanced security for the IBSS As for the SBSS, D2.2 handwaves pre-shared key Enrollment and EAPOL 4 way handshake, but keeps mum on Authentication Same fatal flaw as for SBSS case PSKE provides full enhanced security support for the IBSS Tiered PSK Enrollment, User Friendly or Very User Friendly imply true pairwise privacy or pairwise ordered group privacy, respectively Key Management simpler than, yet equivalent to 802.1x Mutual Authentication Counterpoint: 802.1x based protocols CAN support IBSS Just incorporate an Authentication Server into every Station! Well, why stop with just incorporating the AS into the AP? I’ll pass, thanks.

Argument 3 For PSKE 802.1x protocols won’t adequately address two important sidechannel scenarios, SBSS and “Enterprise Guest” SBSS sidechannel also suffers from fatal lack of Mutual Authentication Enterprise Guest is not authorized to use the DS, is not worth the trouble of Enrollment, so can’t be Authenticated and issued keys by the AS The more common sidechannel scenario where both stations are associated to the same AP (and have been automatically Enrolled by virtue of the same), but PSKE protocols can be used to provide Authentication and Key Management. PSKE provides full enhanced security support for the SBSS and Enterprise Guest User Friendly PSK Enrollment Key Management simpler than, yet equivalent to 802.1x Mutual Authentication Counterpoint: 802.1x protocols CAN support Sidechannel If you’ve got an AS in every station, sure

Summary D2.2’s 802.1x based protocols don’t address some gaping holes in the RSN PSKE is a minimalist, user friendly set of MAC protocols that complement 802.1x and fill in the following holes: IBSS Enrollment, Authentication and Key Management SBSS Enrollment, Authentication and Key Management Sidechannel Enrollment, Authentication and Key Management for the SBSS and the Enterprise Guest PSKE is a much simpler solution than other, still in the oven 802.1x based approaches PSKE is a sufficient solution, is arguably a necessary solution, but need not be the unique solution PSKE makes a lot of sense, it’s time to just do it

The Motion “Move to instruct the Technical Editor to work with the interested parties and incorporate the Pre-Shared Key RSN Extension protocols as presented in 02/431r0 and 02/432r0 into the successor revision of the 802.11i D2.2 draft text”