Use of EAPOL-Key messages during pre-auth

Slides:



Advertisements
Similar presentations
Doc.: IEEE /1186r0 Submission October 2004 Aboba and HarkinsSlide 1 PEKM (Post-EAP Key Management Protocol) Bernard Aboba, Microsoft Dan Harkins,
Advertisements

IEEE i IT443 Broadband Communications Philip MacCabe October 5, 2005
Doc.: IEEE /0476r3 Submission May 2004 Jesse Walker and Emily Qi, Intel CorporationSlide 1 Pre-Keying Jesse Walker and Emily Qi Intel Corporation.
Doc.: IEEE /1572r0 Submission December 2004 Harkins and AbobaSlide 1 PEKM (Post-EAP Key Management Protocol) Dan Harkins, Trapeze Networks
Doc.: IEEE /0476r2 Submission May 2004 Jesse Walker and Emily Qi, Intel CorporationSlide 1 Pre-Keying Jesse Walker and Emily Qi Intel Corporation.
Doc.: IEEE /551r0 Submission September 2002 Moore, Roshan, Cam-WingetSlide 1 TGi Frame Exchanges Tim Moore Microsoft Pejman Roshan Nancy Cam-Winget.
Doc.: IEEE /0707r0 Submission July 2003 N. Cam-Winget, et alSlide 1 Establishing PTK liveness during re-association Nancy Cam-Winget, Cisco Systems.
Doc.: IEEE /610r0 Submission November 2001 Tim Moore, Microsoft 802.1X and key interactions Tim Moore.
Doc.: IEEE /657r0 Submission August 2003 N. Cam-WingetSlide 1 TGi Draft 5.0 Comments Nancy Cam-Winget, Cisco Systems Inc.
Doc.: IEEE /1426r02 Submission NameAffiliationsAddressPhone ChengYan FengZTE Corporation No.800, Middle Tianfu Avenue, Hi-tech District,
Robust Security Network (RSN) Service of IEEE
Re-evaluating the WPA2 Security Protocol
M. Kassab, A. Belghith, J. Bonnin, S. Sassi
Some LB 62 Motions January 13, 2003 January 2004
Proposed SFD Text for ai Link Setup Procedure
802.11r Requirements Discussion
STAKey Design Flaws Date: Jesse, Shlomo, Suman
doc.: IEEE /xxxr0 Mike Moreton
802.1X and key interactions Tim Moore November 2001
Motions to Address Some Letter Ballot 52 Comments
EAP based Message Flow Optimization for FILS
Coexistence of Legacy & RSN STAs in Public WLAN
Emergency Call Setup Procedure
PEKM (Post-EAP Key Management Protocol)
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec
An Example Protocol for FastAKM
Stefan Rommer, Mats Näslund, András Méhes (Ericsson)
July 2002 Threat Model Tim Moore Tim Moore, Microsoft.
Fujio Watanabe, Moo Ryong Jeong, Toshiro Kawahara
Nancy Cam-Winget, Cisco Systems Inc
Beacon Protection Date: Authors: July 2018 July 2018
802.1X/ Issues Nancy Cam-Winget, Cisco Systems
Fair Quiet for DFS Date: Authors: February 2008
Fast Authentication in TGai : Updates to EAP-RP
Jesse Walker and Emily Qi Intel Corporation
Tentative Association May 12, 2004
Motorola TGr Fast Handover Proposal
Pre-Association Negotiation of Management Frame Protection (PANMFP)
Roaming Keith Amann, Spectralink
AP Power Down Notification
Month Year doc.: IEEE yy/xxxxr0
Reducing Overhead in Active Scanning with Simulation Results
doc.: IEEE /454r0 Bob Beach Symbol Technologies
Fast Roaming Compromise Proposal
Link Setup Flow July 2011 Date: Authors: Name Company
Florent Bersani, France Telecom R&D
CID#89-Directed Multicast Service (DMS)
Performance Analysis of authentication and authorization
Roaming timings and PMK lifetime
Different MKD domain MPs communication method
EAPOL-Key Clarifications
Reducing Overhead in Active Scanning with Simulation Results
Fast Roaming Compromise Proposal
Beacon Protection Date: Authors: July 2018 July 2018
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec
Fast Roaming Compromise Proposal
Dan Harkins Trapeze Networks
Roaming timings and PMK lifetime
Tim Moore Microsoft Pejman Roshan Nancy Cam-Winget Cisco Systems, Inc
FILS Frame Content Date: Authors: February 2008
Use of EAPOL-Key messages
Link Setup Flow July 2011 Date: Authors: Name Company
Sept 2003 PMK “sharing” Tim Moore Tim Moore, Microsoft.
Pre-Authentication with 802.1X
Roaming timings and PMK lifetime
Month Year doc.: IEEE yy/xxxxr0
Group Key Optimizations
Extended Usage of STKSA
Site Report Conceptual Model
Comment Resolution Motions
Presentation transcript:

Use of EAPOL-Key messages during pre-auth Month 2002 doc.: IEEE 802.11-04/xxxr0 May 2004 Use of EAPOL-Key messages during pre-auth Tim Moore Microsoft Tim Moore, Microsoft

May 2004 Introduction 11-04-0516 describes a list of interesting information about the AP ESSid, BSSid, Channel/Frequency Security options, keys Provider Last/average received RSSI Last Contact Time (local time and TSF) Association “State”/History Load information Other useful things “Bad experiences” (e.g. it’s a rogue, it refused my association) Things that disqualify it (wrong security, wrong network) Much of this could be exchanged during discovery phase if the AP/STA can communicate Tim Moore, Microsoft

802.11i pre-auth “Communication” between STA and AP before association May 2004 802.11i pre-auth “Communication” between STA and AP before association Exchanges security information to generate a PMK Communication is really STA/Authentication Server 802.11i STA/AP communication (EAPOL-Key) isn’t used Doesn’t generate a PTK and exchange additional information Tim Moore, Microsoft

EAPOL-Key 2 types of message May 2004 EAPOL-Key 2 types of message 4-way for generating PTK and sending some information: IEs, KDEs(GTK), etc. Other for sending KDEs (GTK, STAKey, TKIP errors, STAKey requests), IEs, etc. Tim Moore, Microsoft

Obtaining information from other APs May 2004 Obtaining information from other APs 802.11i can pre-authenticate with other APs in the same ESS (on the same subnet) 802.11i doesn’t do 4-way after pre-authentication since for security reasons the 4-way is needed after association 4-way handshake can be run over pre-auth Ethertype Secure channel for exchanging IEs then available between STA and APs Tim Moore, Microsoft

Issues 4-way is AP initiated May 2004 Issues 4-way is AP initiated If STA wants to send information to AP, the 4-way must be run Use EAPOL-Key message 1 Set Request bit Allow multiple PMKID KDEs in KeyData field Tim Moore, Microsoft

STA initiated 4-way STA sends a EAPOL-Key message 1 request May 2004 STA initiated 4-way STA sends a EAPOL-Key message 1 request Add a list of PMKID KDEs to message PMKs that STA believes could be used (normally from pre-authentication) AP can: Response with message 1 using a PMK (may or may not be one of the PMK specified by the STA) EAP-Request/Identity if it does not have a PMK for the STA, the STA will respond with 802.1X pre-authentication STA can send any IEs during message 2 of the 4-way handshake, AP can send any IEs during message 3 of the 4-way handshake Additional information can be sent after 4-way handshake completes Tim Moore, Microsoft

May 2004 Conclusion 4-way Handshake over pre-authentication channel allows direct communication with non-associated APs Information from pre-auth 4-way is direct from AP and is secure Can be updated at any time by sending EAPOL-Key message Tim Moore, Microsoft