Integrity Check for Disassociate/Associate/Re-associate

Slides:



Advertisements
Similar presentations
IEEE i: A Retrospective Bernard Aboba Microsoft March 2004.
Advertisements

Doc.: IEEE /275 Submission September 2000 David Halasz, Cisco Systems, Inc.Slide 1 IEEE 802.1X for IEEE David Halasz, Stuart Norman, Glen.
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
IEEE Wireless Local Area Networks (WLAN’s).
S A B D C T = 0 S gets message from above and sends messages to A, C and D S.
Wireless Security Issues David E. Hudak, Ph.D. Senior Software Architect Karlnet, Inc.
Point-to-Point Protocol (PPP) Security Connecting to remote access servers (RASs) PPP authentication PPP confidentiality Point-to-Point Tunneling Protocol.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
Security using Encryption Security Features Message Origin Authentication - verifying that the sender is who he or she says they are Content Integrity.
Web Services Quality Model V2.0 Business Value Quality Group Business Value Quality Cost Suitability Effect Service Measurement Quality Group Service Level.
WEP Protocol Weaknesses and Vulnerabilities
Doc.: IEEE /1572r0 Submission December 2004 Harkins and AbobaSlide 1 PEKM (Post-EAP Key Management Protocol) Dan Harkins, Trapeze Networks
Doc.: IEEE /034r1 Submission March 2000 Dan Simon, Bernard Aboba, Tim Moore, Microsoft IEEE Security and 802.1X Dan Simon
(c) Mitsubishi Electric Corp. 1 User Scenarios & Security Considerations in APPAGG part 2/ Nobuhiro Electric.
Protecting Satellite Networks from Disassociation DoS Attacks Protecting Satellite Networks from Disassociation DoS Attacks (2010 IEEE International Conference.
Doc.: IEEE /035 Submission March 2000 Bernard Aboba, Tim Moore, MicrosoftSlide 1 IEEE 802.1X For Wireless LANs Bernard Aboba, Tim Moore, Microsoft.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
Doc.: IEEE /551r0 Submission September 2002 Moore, Roshan, Cam-WingetSlide 1 TGi Frame Exchanges Tim Moore Microsoft Pejman Roshan Nancy Cam-Winget.
Doc.: IEEE /562r1 Submission November 2001 Tim Moore, Bernard Aboba/Microsoft Authenticated Fast Handoff IEEE Tgi Tim Moore Bernard Aboba.
Lecture 24 Wireless Network Security
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 24 “Wireless Network Security”.
Doc.: IEEE /610r0 Submission November 2001 Tim Moore, Microsoft 802.1X and key interactions Tim Moore.
Wireless security Wi–Fi (802.11) Security
Wireless Network Security CSIS 5857: Encoding and Encryption.
802.11: Introduction Reference: “IEEE : moving closer to practical wireless LANs”; Stallings, W.; IT Professional, Volume: 3 Issue: 3, May- June.
CIA AAA. C I A Confidentiality I A Confidentiality Integrity A.
Doc.: IEEE /610r0 Submission November 2001 Tim Moore, Microsoft 802.1X and key interactions Tim Moore.
Services Distribution Services (for APs) – Association – mobile stations connect themselves to base stations – Reassociation – a station may change.
SECURITY IN MOBILE NETWORKS Bharat Bhargava CERIAS and Computer Sciences Departments Purdue University, W. Lafayette, IN Supported.
Erik Nicholson COSC 352 March 2, WPA Wi-Fi Protected Access New security standard adopted by Wi-Fi Alliance consortium Ensures compliance with different.
Submission doc.: IEEE /313r1 March 2016 Guido R. Hiertz, Ericsson et al.Slide 1 The benefits of Opportunistic Wireless Encryption Date:
af-Secure-Enabelement-and-CVS-without-Association Submission June 2011 Secure Enablement and CVS without Persistent Association Slide 1Qualcomm.
Wireless LAN Security Oleh: R. Muhamad Ramadan. Ancaman Thd Keamanan Wireless 1 Unauthorized Access War Drivers Find “open” network, use them to gain.
1. Introduction In this presentation, we will review ,802.1x and give their drawbacks, and then we will propose the use of a central manager to replace.
Proposed solutions to comments on section 7
Robust Security Network (RSN) Service of IEEE
History and Implementation of the IEEE 802 Security Architecture
WEP & WPA Mandy Kershishnik.
A Wireless LAN Security Protocol
Kerberos Kerberos is a network authentication protocol and it is designed to provide strong authentication for client server applications. It uses secret.
802.1X and key interactions Tim Moore November 2001
BACK SOLUTION:
– Chapter 5 (B) – Using IEEE 802.1x
Wireless LAN Security 4.3 Wireless LAN Security.
MAC Address Hijacking Problem
Cyber Security Authentication Methods
Seminar class presentation Student: Chuming Chen & Xinliang Zheng
Kerberos.
Use of EAPOL-Key messages during pre-auth
PEKM (Post-EAP Key Management Protocol)
EAP State Machines IETF 56 - March 19, 2003
802.11i MIB variable name fixes
Protocol Details John Bellardo UCSD.
July 2002 Threat Model Tim Moore Tim Moore, Microsoft.
© 2010 Emerson Human Capital Consulting, Inc. All Rights Reserved.
CS 465 Terminology Slides by Kent Seamons Last Updated: Sep 7, 2017.
Proposed Modifications to e-D4.0 Direct Link Protocol
Wireless Access Points
Roaming timings and PMK lifetime
Challenge-Response Authentication
Roaming timings and PMK lifetime
Tim Moore Microsoft Pejman Roshan Nancy Cam-Winget Cisco Systems, Inc
Use of EAPOL-Key messages
Sept 2003 PMK “sharing” Tim Moore Tim Moore, Microsoft.
Pre-Authentication with 802.1X
Cryptography Fundamentals
Roaming timings and PMK lifetime
Group Key Optimizations
IEs in 4-way handshake description
Presentation transcript:

Integrity Check for Disassociate/Associate/Re-associate March 2002 Integrity Check for Disassociate/Associate/Re-associate Tim Moore Microsoft Tim Moore, Microsoft

Problem Disassociate, etc messages are not integrity checked March 2002 Problem Disassociate, etc messages are not integrity checked Denial of service attacks Tim Moore, Microsoft

Solutions Integrity check the disassociate, etc. message March 2002 Solutions Integrity check the disassociate, etc. message Disallow disassociate message when in 802.1X authenticated state Do not allow assoicate/reassoicate messages to affect DS Tim Moore, Microsoft

Integrity check Use data framing for disassociate, etc message March 2002 Integrity check Use data framing for disassociate, etc message Not encrypted when no keys Needed because disassociate is used before authenticate Encrypted when keys available Tim Moore, Microsoft

802.1X With changes requested of 802.1X yesterday March 2002 802.1X With changes requested of 802.1X yesterday EAP-Logoff is authenticated Require stations send an EAP-Logoff before disassociating Tim Moore, Microsoft