An Example Protocol for FastAKM

Slides:



Advertisements
Similar presentations
Submission doc.: IEEE /1326r1 August 2011 Hiroki Nakano, Trans New Technology, Inc.Slide 1 Early Key Generation by ECDH and PKC Date:
Advertisements

Submission doc.: IEEE 11-12/0271r1 March 2012 Hiroki Nakano, Trans New Technology, Inc.Slide 1 SFD Text for Big IE Date: Authors: NameAffiliationsAddressPhone .
Submission doc.: IEEE /1167r0 August 2011 Hiroki Nakano, Trans New Technology, Inc.Slide 1 Upper Layer Data IE Date: Authors: NameAffiliationsAddressPhone .
Submission doc.: IEEE /1124r0 August 2011 Hiroki Nakano, Trans New Technology, Inc.Slide 1 Example of IP address assignment using Generic Upper.
Doc.: IEEE /0059r3 Submission January 2010 Hiroki Nakano, Trans New Technology, Inc.Slide 1 An Example Protocol for FastAKM Date: Authors:
Doc.: IEEE /0032r0 Submission NameAffiliationsAddressPhone Hitoshi MORIOKAAllied Telesis R&D Center Tenjin, Chuo-ku, Fukuoka
Doc.: IEEE /0976r1 Submission July 2011 Hitoshi Morioka, ROOT INC.Slide 1 TGai Authentication Protocol Proposal Date: Authors: NameAffiliationsAddressPhone .
Doc.: IEEE /0976r0 Submission July 2011 Hitoshi Morioka, ROOT INC.Slide 1 TGai Authentication Protocol Proposal Date: Authors: NameAffiliationsAddressPhone .
Submission doc.: IEEE /1003r1 July 2011 Hiroki Nakano, Trans New Technology, Inc.Slide 1 Upper Layer Data on Management frames Date:
Submission doc.: IEEE 11-12/0273r8 May 2012 Hiroki Nakano, Trans New Technology, Inc.Slide 1 SFD Text for Upper Layers Date: Authors: NameAffiliationsAddressPhone .
Submission doc.: IEEE 11-12/0273r9 May 2012 Hiroki Nakano, Trans New Technology, Inc.Slide 1 SFD Text for Upper Layers Date: Authors: NameAffiliationsAddressPhone .
Submission doc.: IEEE 11-10/0701r0 May 2012 Hitoshi Morioka, Allied Telesis R&D CenterSlide 1 Supplemental Information for HLCF Date: Authors:
Submission doc.: IEEE /1003r2 July 2011 Hiroki Nakano, Trans New Technology, Inc.Slide 1 Upper Layer Data on Management frames Date:
Doc.: IEEE /0977r2 Submission NameAffiliationsAddressPhone Hitoshi MORIOKA ROOT INC Tenjin, Chuo-ku, Fukuoka JAPAN
Doc.: IEEE /0275r3 Submission March 2012 Hitoshi Morioka, Allied Telesis R&D CenterSlide 1 Higher Layer Configuration Function for TGai SFD Date:
Doc.: IEEE /0977r1 Submission NameAffiliationsAddressPhone Hitoshi MORIOKA ROOT INC Tenjin, Chuo-ku, Fukuoka JAPAN
Doc.: IEEE /0133r3 Submission NameAffiliationsAddressPhone Hitoshi MORIOKAAllied Telesis R&D Center Tenjin, Chuo-ku, Fukuoka
Doc.: IEEE /0873r0 Submission July 2010 Hiroki Nakano, Trans New Technology, Inc.Slide 1 Effectiveness of Reduction of Message Exchanges Date:
Doc.: IEEE /0361r0 Submission March 2010 Hiroki Nakano, Trans New Technology, Inc.Slide 1 Fast Initial Authentication Date: Authors:
Submission doc.: IEEE 11-12/0273r7 May 2012 Hiroki Nakano, Trans New Technology, Inc.Slide 1 SFD Text for Upper Layers Date: Authors: NameAffiliationsAddressPhone .
Doc.: IEEE /1008r0 August 2010Hiroki Nakano, Trans New Technology, Inc.Slide 1 Parallel processing for upper layer Date: Authors: NameCompanyAddressPhone .
Doc.: IEEE /0896r0 SubmissionJae Seung Lee, ETRISlide 1 Probe Request Filtering Criteria Date: July 2012.
Submission doc.: IEEE 11-12/0273r5 March 2012 Hiroki Nakano, Trans New Technology, Inc.Slide 1 SFD Text for Upper Layers Date: Authors: NameAffiliationsAddressPhone .
Doc.: IEEE /1244r0 Submission Sep 2011 Hiroshi Mano, Root, Inc.Slide 1 11ai overview (PAR, Scope and current status) Date: Authors:
Doc.: IEEE /1000r2 Submission Nov 2009 Hiroki NAKANO, Trans New Technology, Inc.Slide 1 Toward Mobile IEEE (a.k.a. IEEE for High Speed.
Submission doc.: IEEE 11-12/0273r10 May 2012 Hiroki Nakano, Trans New Technology, Inc.Slide 1 SFD Text for Upper Layers Date: Authors: NameAffiliationsAddressPhone .
Submission doc.: IEEE /1146r0 Hitoshi Morioka, ROOT INC. Jun 2010 Feasibility Study of FIA Date: Authors: NameCompanyAddressPhone .
Fast Initial Authentication
Robust Security Network (RSN) Service of IEEE
Higher Layer Packet Container Proposal Presentation
Authentication and Upper-Layer Messaging
Month Year doc.: IEEE yy/xxxxr0 May 2012
Broadcasting on WLAN Date: Authors: July 2017
Proposed SFD Text for ai Link Setup Procedure
Broadcasting on WLAN Date: Authors: September 2017
Feasibility Study of FIA
Broadcasting on WLAN Date: Authors: July 2017
Broadcast Service on WLAN
IEEE for High Speed Mobility
IEEE for High Speed Mobility
FILS presentation on High Level Security Requirements
Broadcast Service on WLAN
AP Discovery Information Broadcasting
SFD Text for Public Key Cryptography
More Example Ideas around FIA
More Example Ideas around FIA
Fast Initial Authentication
An Example Idea of FIA Authors: Date: May 2010 Name Company
EAP based Message Flow Optimization for FILS
An Example Idea of FIA Authors: Date: May 2010 Name Company
TGaq Transaction Protocol
TGai FILS Authentication Protocol
IP Address assignment: Offline discussion summary
Feasibility Study of FIA
An Example Idea of FIA Authors: Date: May 2010 Name Company
IEEE TGai Closing Report
(Man in the Middle) MITM in Mesh
An Example Idea of FIA Authors: Date: May 2010 Name Company
Listen to Probe Request from other STAs
IEEE Fast Initial Authentication Study Group Closing Report
IEEE Fast Initial Authentication Study Group Closing Report
Pre-Association Negotiation of Management Frame Protection (PANMFP)
An Example Protocol for FastAKM
IEEE TGai Closing Report
Month Year doc.: IEEE yy/xxxxr0 May 2012
Broadcast Service on WLAN
11ay Fast Association Authentication
11ay Fast Association Authentication
IEEE Fast Initial Authentication Study Group Closing Report
Month Year doc.: IEEE yy/xxxxr0 May 2012
Presentation transcript:

An Example Protocol for FastAKM January 2010 doc.: IEEE 802.11-10/0059r0 January 2010 An Example Protocol for FastAKM Date: 2010-01-19 Authors: Name Company Address Phone email Hiroki NAKANO Trans New Technology, Inc. Sumitomo-Seimei Kyoto Bldg. 8F, 62 Tukiboko-cho Shimogyo-ku, Kyoto 600-8492 JAPAN +81-75-213-1200 cas.nakano@gmail.com cas@trans-nt.com Hitoshi MORIOKA ROOT Inc. #33 Ito Bldg. 2-14-38 Tenjin, Chuo-ku, Fukuoka 810-0001 JAPAN +81-92-771-7630 hmorioka@root-hq.com Hiroshi MANO 8F TOC2 Bldg. 7-21-11 Nishi-Gotanda, Shinagawa-ku, Tokyo 141-0031 JAPAN +81-3-5719-7630 hmano@root-hq.com Hiroki Nakano, Trans New Technology, Inc. Hiroki Nakano, Trans New Technology, Inc.

January 2010 doc.: IEEE 802.11-10/0059r0 January 2010 Abstract FastAKM framework reduces time to set up association between AP and non-AP STA. This results in reduction of blackout time on handover and enables us to use VoIP in 802.11 “mobile” environment. We show technical possibility by introducing an trial of example implemention of FastAKM, which establishes an association between AP and non-AP STA by single round-trip exchange of management frames. Hiroki Nakano, Trans New Technology, Inc. Hiroki Nakano, Trans New Technology, Inc.

Requirements Employ just ONE round-trip exchange of frames January 2010 Requirements Employ just ONE round-trip exchange of frames STA to AP, then AP to STA Do all things to start user’s data exchange Association Authentication Key Exchange No direct contract between AP and non-AP STA ‘Authentication Server’ mediates between AP and non-AP STA For separation of service providers and AP infrastructure Possibly compatible with existing 802.11 framework Old STAs can be still operated together. Hiroki Nakano, Trans New Technology, Inc.

An Example Procedure by 802.11-2007 January 2010 An Example Procedure by 802.11-2007 STA AP RADIUS Server Beacon Probe Request Probe Response Open System Authentication Open System Authentication Association Request Association Accept EAPOL-Start EAP-Request/Identity EAP-Response/Identity RADIUS-Access-Request/Identity RADIUS-Access-Challenge/TLS-Start EAP-Request/TLS-Start EAP-Response/TLS-client Hello RADIUS-Access-Request/Pass Through RADIUS-Access-Challenge/ Server Certificate EAP-Request/Pass Through EAP-Response/Client Certificate RADIUS-Access-Request/Pass Through RADIUS-Access-Challenge/Encryption Type EAP-Request/Pass Through EAP-Response RADIUS-Access-Request RADIUS-Access-Accept EAP-Success EAP-Key Hiroki Nakano, Trans New Technology, Inc.

Complaint about the Procedure… January 2010 Complaint about the Procedure… STA AP RADIUS Server Beacon Probe process is optional Open System auth. is meaningless Probe Request Probe Response Open System Authentication Open System Authentication Association Request Association Accept Any other framework than EAPOL?? EAPOL-Start EAP-Request/Identity EAP-Response/Identity RADIUS-Access-Request/Identity RADIUS-Access-Challenge/TLS-Start EAP-Request/TLS-Start EAP-Response/TLS-client Hello RADIUS-Access-Request/Pass Through RADIUS-Access-Challenge/ Server Certificate EAP-Request/Pass Through EAP-Response/Client Certificate RADIUS-Access-Request/Pass Through RADIUS-Access-Challenge/Encryption Type EAP-Request/Pass Through EAP-Response RADIUS-Access-Request RADIUS-Access-Accept EAP-Success EAP-Key Hiroki Nakano, Trans New Technology, Inc.

Trial 1: Omit Pre-RSNA Auth. Process January 2010 Trial 1: Omit Pre-RSNA Auth. Process We use “Open System” authentication on Pre-RSNA framework at anytime. Anyone using Shared Key auth? “Open System auth. is a null auth. algorithm. Any STA requesting Open System auth. may be authenticated” Quoted from 802.11-2007 section 8.2.2.2 Nevertheless, it takes ONE round-trip time to do that! Standard should be changed to allow to run Association process without Open System authentication process. Any problem occurs? Hiroki Nakano, Trans New Technology, Inc.

Reason of existence of Open System auth. January 2010 Reason of existence of Open System auth. “NOTE 3—IEEE 802.11 Open System authentication provides no security, but is included to maintain backward compatibility with the IEEE 802.11 state machine (see 11.3).” Quoted from 802.11-2007 section 8.4.1.2.1 b) Hiroki Nakano, Trans New Technology, Inc.

January 2010 802.11-2007 Figure 11-6 Hiroki Nakano, Trans New Technology, Inc.

Modified Figure? January 2010 Association with FastAKM Hiroki Nakano, Trans New Technology, Inc.

Trial 2: Piggyback Auth. Info. onto Association Request/Response January 2010 Trial 2: Piggyback Auth. Info. onto Association Request/Response Can “Mutual Authentication” be done by just A round-trip of Association Request/Response? “Single Round-trip Authentication” is a common problem. STA AP Authentication Server Beacon (Probe Request) (Probe Response) Authentication (Open System) Authentication (Open System) Association Request Access Request Access Response Association Response (Accept) Hiroki Nakano, Trans New Technology, Inc.

Supposed Service Model January 2010 Supposed Service Model Authentication Server (Service Provider) Non-AP STA (Customer) AP (Infrastructure) Contract to provide wireless access to users specified by Authentication Server (i.e. Service Provider) Set up secure communication channel to exchange information about users Contract to provide wireless access via AP infrastructure. Share information to identify each other properly, e.g. username, password, digital certificate, etc. Real wireless communication channel Provide wireless access in request of Service Provider Hiroki Nakano, Trans New Technology, Inc.

Technical Prerequisite January 2010 Technical Prerequisite Information shared - to identify each other and - to exchange data securely Station (non-AP STA) Authentication Server (AS) Wireless communication Access Point (AP) Secure communication pipe - Information shared to identify each other Hiroki Nakano, Trans New Technology, Inc.

Association and Authentication Procedure January 2010 Association and Authentication Procedure STA  AP Auth. Server Selector = name of Auth. Server User Information pack passed through AP toward Auth. Server User Identifier and a kind of digital signature Encrypted session key Countermeasure against replay attack AP  AS User Information pack AP  AS Plain (decrypted) session key STA  AP Proof of AP having legitimate session key Group key Hiroki Nakano, Trans New Technology, Inc.

Frame Exchange for Authentication January 2010 Frame Exchange for Authentication User Information pack - User Identifier - a kind of digital signature - Encrypted session key - Countermeasure against replay attack 1 Station (non-AP STA) Authentication Server (AS) Auth. Server Selector Access Point (AP) - Proof of AP having legitimate session key - Group key Plain (decrypted) session key 3 2 Hiroki Nakano, Trans New Technology, Inc.

An Example Implemetation January 2010 An Example Implemetation OS: NetBSD 5.0.1 (i386) Upper MAC Layer: NetBSD’s net80211 WLAN Chipset: Atheros Communications AR5212 Add about 200 lines in C. Hiroki Nakano, Trans New Technology, Inc.

January 2010 Difference from 802.11-2007 Additional state transition to skip Open System Auth. Figure 11-6—Relationship between state variables and services Two additional elements to Table 7-26 Element IDs Authentication Server Selector (240 temporally) User Information Pack (241 temporally) RSN with key obtained by new FastAKM framework 7.3.2.25 RSN information element (for beacon and probe resp.) Both Group and Pairwise Cipher Suites are set to CCMP. AKM Suite is set to the brand-new one! Define new AKM Suite (00-d0-14-01 is used temporally.) Assign officially on Table 7-34 AKM suite selectors in future… Hiroki Nakano, Trans New Technology, Inc.

Conclusion Not-so-many changes enables FastAKM framework. January 2010 Conclusion Not-so-many changes enables FastAKM framework. We need more technical discussion to build and verify authentication method about any effect of changing standard to write down detailed specification Hiroki Nakano, Trans New Technology, Inc.

January 2010 Straw Poll “Does WNG think that we need tutorial session exploring the need for support for mobile communication ?” Yes: No: 0 Don’t Care: Hiroki Nakano, Trans New Technology, Inc.