Which Management Frames Need Protection?

Slides:



Advertisements
Similar presentations
Use of KCK for TGr Management Frame Protection
Advertisements

LB84 General AdHoc Group Sept. Closing TGn Motions
LB84 General AdHoc Group Sept. Closing TGn Motions
[ Interim Meetings 2006] Date: Authors: July 2005
LB73 Noise and Location Categories
LB73 Noise and Location Categories
Waveform Generator Source Code
TGu Closing Report Date: Authors: November 2005
March 2014 Election Results
TGp Closing Report Date: Authors: July 2007 Month Year
Attendance and Documentation for the March 2007 Plenary
Attendance and Documentation for the March 2007 Plenary
[ Policies and Procedure Summary]
[ Policies and Procedure Summary]
3GPP liaison report May 2006 May 2006 Date: Authors:
Motion to accept Draft p 2.0
Protected SSIDs Date: Authors: March 2005 March 2005
3GPP liaison report July 2006
[place presentation subject title text here]
Motions Date: Authors: January 2006
TGp Motions Date: Authors: November 2005 Month Year
TGp Closing Report Date: Authors: March 2006 Month Year
On Coexistence Mechanisms
TGu-changes-from-d0-02-to-d0-03
TGp Closing Report Date: Authors: May 2007 Month Year
On Coexistence Mechanisms
TGp Closing Report Date: Authors: March 2006 Month Year
Reflector Tutorial Date: Authors: July 2006 Month Year
TGv Redline D0.07 Insert and Deletion
TGu Timeline Date: Authors: January 2005 January 2005
TGv Redline D0.06 Insert and Deletion
TGu Closing Report Date: Authors: September 2005
ADS Study Group Mid-week Report
TGu Timeline Date: Authors: July 2005 July 2005
Selection Procedure Recommendation
TGu-changes-from-d0-01-to-d0-02
LB73 Noise and Location Categories
TGy draft 2.0 with changebars from draft 1.0
TGv Redline D0.10 Insert and Deletion
Suggested comment resolution on ATIM window parameter
WAPI Position Paper Sept 2005 Sept 2005 IEEE WG
Redline of draft P802.11w D2.2 Date: Authors:
Document Motions Date: Authors: November 2005 November 2005
TGp Closing Report Date: Authors: March 2007 Month Year
TGr Proposed Draft Revision Notice
TGu-changes-from-d0-02-to-d0-03
[ Policies and Procedure Summary]
March Opening Report Date: Authors: March 2011
3GPP2 Liaison Report Date: Authors: May 2006 May 2006
May 2005 CAPWAP AHC Closing Report
TGu Motions Date: Authors: May 2006 May 2006
Liaison Report From Date: Authors: Month Year
Beamforming and Link Adaptation Motions
[ Policies and Procedure Summary]
Draft P802.11s D1.03 WordConversion
TGu Timeline Date: Authors: May 2006 May 2006
Motion to go to Letter Ballot
TGu-changes-from-d0-04-to-d0-05
Transition Nowhere Date: Authors: Sept 2005 Sept 2005
TGu-changes-from-d0-03-to-d0-04
TGu Timeline Date: Authors: January 2005 January 2005
TGu Motions Date: Authors: May 2006 May 2006
TGu Timeline Date: Authors: May 2005 May 2005
TGu Timeline Date: Authors: July 2005 July 2005
WAPI Position Paper Sept 2005 Sept 2005 IEEE WG
Use of KCK for TGr Management Frame Protection
Use of KCK for TGr Management Frame Protection
TGu Timeline Date: Authors: July 2005 July 2005
TGr Proposed Draft Revision Notice
TGp Motions Date: Authors: January 2006 Month Year
Presentation transcript:

Which Management Frames Need Protection? March 2005 doc.: IEEE 802.11-y05/0139r0 March 2005 Which Management Frames Need Protection? Authors: Date: 2005-02-28 Name Organization E-Mail Jon Edney Nokia email@jon.edney.name Notice: This document has been prepared to assist IEEE 802.11. It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. Release: The contributor grants a free, irrevocable license to the IEEE to incorporate material contained in this contribution, and any modifications thereof, in the creation of an IEEE Standards publication; to copyright in the IEEE’s name any IEEE Standards publication even though it may include portions of this contribution; and at the IEEE’s sole discretion to permit others to reproduce in whole or in part the resulting IEEE Standards publication. The contributor also acknowledges and accepts that this contribution may be made public by IEEE 802.11. Patent Policy and Procedures: The contributor is familiar with the IEEE 802 Patent Policy and Procedures <http:// ieee802.org/guides/bylaws/sb-bylaws.pdf>, including the statement "IEEE standards may include the known use of patent(s), including patent applications, provided the IEEE receives assurance from the patent holder or applicant with respect to patents essential for compliance with both mandatory and optional portions of the standard." Early disclosure to the Working Group of patent information that might be relevant to the standard is essential to reduce the possibility for delays in the development process and increase the likelihood that the draft publication will be approved for publication. Please notify the Chair <stuart.kerry@philips.com> as early as possible, in written or electronic form, if patented technology (or technology under patent application) might be incorporated into a draft standard being developed within the IEEE 802.11 Working Group. If you have questions, contact the IEEE Patent Committee Administrator at <patcom@ieee.org>. Jon Edney, Nokia Jon Edney, Nokia

March 2005 doc.: IEEE 802.11-y05/0139r0 March 2005 Abstract Considers the requirements for protection 802.11 management frames and proposes a set of protections Jon Edney, Nokia Jon Edney, Nokia

Management Frames (Re)Associate Rq/Rsp Probe Rq/Rsp Beacon ATIM March 2005 doc.: IEEE 802.11-y05/0139r0 March 2005 Management Frames (Re)Associate Rq/Rsp Probe Rq/Rsp Beacon ATIM Disassociate Authenticate / De-authenticate Action Jon Edney, Nokia Jon Edney, Nokia

Discovery: Beacon, Probe Access: Authentication, Association March 2005 doc.: IEEE 802.11-y05/0139r0 March 2005 Functional Groups Discovery: Beacon, Probe Access: Authentication, Association Power management: ATIM (IBSS only) Data transfer: Action Jon Edney, Nokia Jon Edney, Nokia

Protection requirements (proposal) March 2005 doc.: IEEE 802.11-y05/0139r0 March 2005 Protection requirements (proposal) Jon Edney, Nokia Jon Edney, Nokia

Issues with protecting Discover Group March 2005 doc.: IEEE 802.11-y05/0139r0 March 2005 Issues with protecting Discover Group Would like to: verify sender verify that information is not modified verify information is not replay Cost of such protections is high solutions are based on public key cryptography Issues related to service discovery are currently under discussion in TGu TGu discovery may be linked to higher layer protocols We postulate: it is inappropriate to create a general protection mechanism for beacons and probe requests without considering application requirements. This is work of TGu Jon Edney, Nokia Jon Edney, Nokia

Issues with Power Management March 2005 doc.: IEEE 802.11-y05/0139r0 March 2005 Issues with Power Management Tampering with ATIM frame causes potential DOS attack. However ATIM is only used in IBSS IBSS power save is not widely supported We postulate that it is not worth protecting ATIM Jon Edney, Nokia Jon Edney, Nokia

Protecting Access Messages March 2005 doc.: IEEE 802.11-y05/0139r0 March 2005 Protecting Access Messages (re)Associate message. We would like to protect but: conventional systems do not have PTK prior to association Tgr will (likely) provide protection since PTK is computed prior to associate. conclusion: No action needed Authenticate. Open auth. in conventional systems does not need protection Tgr may redefine auth. messages but proposals include protections mechanisms Deauthenticate, Dissassociate: Forgery of these messages is an easy and major DOS attack conclusion: we must have data integrity & data origin authenticity Jon Edney, Nokia Jon Edney, Nokia

Action Management Frame March 2005 doc.: IEEE 802.11-y05/0139r0 March 2005 Action Management Frame requirements differ Some applications need no protection – action frame is informative only and false information is not damaging Most applications want to protect against forgery or tampering of action frames Some applications want confidentiality of the information in action frames Conclusion: we need a mechanism to provide data integrity, data origin authenticity, replay protection, and data confidentiality Jon Edney, Nokia Jon Edney, Nokia

Summary of Mandatory Protections March 2005 doc.: IEEE 802.11-y05/0139r0 March 2005 Summary of Mandatory Protections Jon Edney, Nokia Jon Edney, Nokia