TSN Architecture Mike Moreton, STMicroelectronics

Slides:



Advertisements
Similar presentations
Doc.: IEEE /1191r5 Submission November 2004 Mike Moreton, STMicroelectronicsSlide 1 AP Architecture Thoughts Mike Moreton, STMicroelectronics.
Advertisements

Doc.: IEEE /095r0 Submission January 2003 Dan Harkins, Trapeze Networks.Slide 1 Fast Re-authentication Dan Harkins.
Doc.: IEEE /689r0 Submission November 2002 Dan Harkins, Trapeze Networks.Slide 1 Re-authentication when Roaming Dan Harkins.
Submission doc.: IEEE /1167r0 August 2011 Hiroki Nakano, Trans New Technology, Inc.Slide 1 Upper Layer Data IE Date: Authors: NameAffiliationsAddressPhone .
Doc.: IEEE /173r1 Submission Byoung-Jo Kim, AT&T March 2003 Slide 1 Coexistence of Legacy & RSN STAs in Public WLAN Byoung-Jo “J” Kim AT&T Labs-Research.
Submission doc.: IEEE /1003r2 July 2011 Hiroki Nakano, Trans New Technology, Inc.Slide 1 Upper Layer Data on Management frames Date:
Doc.: IEEE /1063r0 Submission Nov 2005 Jon Edney, NokiaSlide 1 The Lock-out Problem - an Analysis Notice: This document has been prepared to assist.
Doc.: IEEE /610r0 Submission November 2001 Tim Moore, Microsoft 802.1X and key interactions Tim Moore.
Wireless Network Security CSIS 5857: Encoding and Encryption.
Doc.: IEEE /0485r0 Submission May 2004 Jesse Walker and Emily Qi, Intel CorporationSlide 1 Management Protection Jesse Walker and Emily Qi Intel.
SubmissionJoe Kwak, InterDigital1 Simplified 11k Security Joe Kwak InterDigital Communications Corporation doc: IEEE /552r0May 2004.
Doc.: IEEE /0896r0 SubmissionJae Seung Lee, ETRISlide 1 Probe Request Filtering Criteria Date: July 2012.
Doc.: IEEE /1436r0 Submission November 2004 Mike Moreton, STMicroelectronicsSlide 1 L2 Domain Indication Mike Moreton, STMicroelectronics 15 th.
Doc.: IEEE /0103r0 Submission January 2004 Jesse Walker, Intel CorporationSlide 1 Some LB 62 Motions January 14, 2003.
Robust Security Network (RSN) Service of IEEE
AP Architecture Changes Mike Moreton, STMicroelectronics
Instructor Materials Chapter 6 Building a Home Network
Methods of Securing LANs
Month Year doc.: IEEE yy/xxxxr0 May 2012
Some LB 62 Motions January 13, 2003 January 2004
Proposed SFD Text for ai Link Setup Procedure
doc.: IEEE /xxxr0 Mike Moreton
802.1X and key interactions Tim Moore November 2001
TGi Motions for Comment Resolution
Motions to Address Some Letter Ballot 52 Comments
TDLS TPK Handshake Date: Authors: May 2010 May 2010
Coexistence of Legacy & RSN STAs in Public WLAN
Multiple MAC addresses
Multicast Replay Detection Fred Stivers, Texas Instruments
doc.: IEEE /xxxx February 2004 September 2004
Multi-band Discovery Assistance
OCT based 6 GHz AP Operation Discussion
March 2001 Optional MAC-Level Security Enhancements for Home WLANs Carlos Rios LinCom Wireless Carlos Rios, LinCom Wireless.
doc.: IEEE /xxxx February 2004 September 2004
Beacon Protection Date: Authors: July 2018 July 2018
Beacon Protection Date: Authors: May 2018 January 2018
802.1X/ Issues Nancy Cam-Winget, Cisco Systems
Proposed Modifications to e-D4.0 Direct Link Protocol
AP Architecture Thoughts
Multicast Replay Detection Fred Stivers, Texas Instruments
Multicast Replay Detection Fred Stivers, Texas Instruments
Jesse Walker and Emily Qi Intel Corporation
Directed Multicast Service (DMS)
Multicast Replay Detection Fred Stivers, Texas Instruments
A Simplified Solution For Critical A-MPDU DoS Issues
doc.: IEEE /454r0 Bob Beach Symbol Technologies
GCMP Restriction Date: Authors: January 2011 May 2010
CID#89-Directed Multicast Service (DMS)
TGr state machines: normative or informative?
Rekeying Protocol Fix Date: Authors: Month Year
A Simplified Solution For Critical A-MPDU DoS Issues
Fast Roaming Using Multiple Concurrent Associations
Beacon Protection Date: Authors: July 2018 July 2018
Fast Roaming Compromise Proposal
Dan Harkins Trapeze Networks
Overview of Improvements to Key Holder Protocols
FILS Frame Content Date: Authors: February 2008
Beacon Protection Date: Authors: May 2018 January 2018
Overview of Improvements to Key Holder Protocols
Month Year doc.: IEEE yy/xxxxr0 May 2012
Use of EAPOL-Key messages
Directed Multicast Service (DMS)
Multiple Networks Date: Authors: July 2005 July 2005
Shared Infrastructure
MIB TruthValue Usage Patterns Presentation
WPA Coordination Changes
Site Report Conceptual Model
Reducing Overhead in Active Scanning
Encrypting Management Frames
Comment Resolution Motions
Presentation transcript:

TSN Architecture Mike Moreton, STMicroelectronics doc.: IEEE 802.11-04/xxxx February 2004 February 2004 TSN Architecture Mike Moreton, STMicroelectronics February 19, 2004 Mike Moreton, STMicroelectronics Fred Stivers, Texas Instruments

doc.: IEEE 802.11-04/xxxx February 2004 February 2004 Why MLME? MLME and MA interfaces describe a functional split between the MAC and “everything else” Make it easier to understand the problem, by splitting it in two. Describe the architecture – particularly important in security. Needs to be “almost” implementable. Does not constrain implementation. It’s exactly these issues of “who knows what when” that have led to problems with the 4 way handshake. While the MLME/MA architectural split does not constrain an implementation, it’s up to the implementer to check the security of any other architecture. Mike Moreton, STMicroelectronics Fred Stivers, Texas Instruments

802.1X Filtering The 802.1X filtering function is “above” the MAC doc.: IEEE 802.11-04/xxxx February 2004 February 2004 802.1X Filtering The 802.1X filtering function is “above” the MAC MLME-ASSOCIATE.ind requires filtering to exist for STAs that the Authenticator doesn’t know about. In a TSN, some STAs are not RSNA capable 802.1X filtering will be applied to them as well To prevent a race condition between an MLME-ASSOCIATE.indication and an immediately following data frame, the 802.1X filtering function must behave as if there is an uncontrolled/(unauthorised)controlled port pair instantiated for every possible MAC address. At this point we’re not saying that there isn’t WEP based filtering as well, just that whether there is or not, 802.1X filtering will be applied anyway. Mike Moreton, STMicroelectronics Fred Stivers, Texas Instruments

doc.: IEEE 802.11-04/xxxx February 2004 February 2004 Pre-RSNA Ports How is 802.1X filtering turned off for pre-RSNA devices? Could have special code in the filtering code to handle such devices. But if already treating them as if there was a controlled/uncontrolled port pair, why not just authorise the controlled port? Conclusion: Pre-RSNA devices have controlled/uncontrolled ports But they don’t have an 802.1X PAE In some senses you could argue that they do have a PAE, but that it’s different from an 802.1X one Mike Moreton, STMicroelectronics Fred Stivers, Texas Instruments

Filtering in an 802.11 Environment February 2004 Filtering in an 802.11 Environment 802.1X filtering only works if protection is enabled before the controlled port is authorised. For a pre-RSNA device, this means turning on WEP. Two options – the MAC could do it, or the SME could do it. Mike Moreton, STMicroelectronics

Option 1 – MAC Enables WEP doc.: IEEE 802.11-04/xxxx February 2004 February 2004 Option 1 – MAC Enables WEP MAC digs into the Association Request, spots that there is no RSN IE, and hence turns on WEP. Against the spirit of both TGi and 802.11-1999 where enabling/disabling encryption is the responsibility of the SME Requires extra code in the MAC AP architecture for pre-RSNA devices different than for RSNA devices. (1) Alternatively WEP is normally on, and when an RSN IE is present it turns it off for that STA. Mike Moreton, STMicroelectronics Fred Stivers, Texas Instruments

Option 2 – SME Enables WEP doc.: IEEE 802.11-04/xxxx February 2004 February 2004 Option 2 – SME Enables WEP By default MAC receives unencrypted frames from anywhere Relies on 802.1X filtering that we know is there. When SME gets a pre-RSNA association, it enables WEP before authorising the controlled port for that device. No special handling in the MAC AP Architecture for Pre-RSNA and RSNA devices is the same Mike Moreton, STMicroelectronics Fred Stivers, Texas Instruments

doc.: IEEE 802.11-04/xxxx February 2004 February 2004 One slight twist… The current WEP configuration interface is not flexible enough The current WEP configuration interface is not synchronised So… Allow WEP to be configured as a pairwise key through the SETKEYS and SETPROTECTION interfaces The issue with WEP configuration is that the Discard Protected flag is not per-STA. Mike Moreton, STMicroelectronics Fred Stivers, Texas Instruments

One Unexpected Benefit? doc.: IEEE 802.11-04/xxxx February 2004 February 2004 One Unexpected Benefit? TSN APs don’t have to support pre-RSNA per-frame pseudocode An advantage when WEP dies… Mike Moreton, STMicroelectronics Fred Stivers, Texas Instruments

One Unavoidable(?) Problem doc.: IEEE 802.11-04/xxxx February 2004 February 2004 One Unavoidable(?) Problem When a pre-RSNA device associates, some frames from it may be lost while the 802.1X port is authorised. Implementations could fix it by attaching a flag to frames indicating the association type. Correct architectural solution is to add MLME-ASSOCIATE.response This is an existing problem, not one introduced by this proposal. For pre-RSNA devices, SME would enable WEP, authorise the controlled port, and send MLME-ASSOCIATE.response. Could this also remove the need for 1X filtering on pre-RSNA connections? Well no, the same arguments about whether you want WEP specific functionality in the 1X filtering, and how actually to configure WEP still apply. Mike Moreton, STMicroelectronics Fred Stivers, Texas Instruments

Architectural Responsibilities February 2004 Architectural Responsibilities MAC sends and receives frames, protected or unprotected as required. SME decides which encryption suites to use, and when. SME is responsible for protocol based frame filtering. MAC is responsible for source based filtering (when required by SME) Mike Moreton, STMicroelectronics

Conclusion This is not the only possible architecture February 2004 Conclusion This is not the only possible architecture But we need an architecture to analyse, and this is one. Relatively simple and consistent. Mike Moreton, STMicroelectronics