July 2010 doc.: IEEE 802.11-10/0903r0 A proposal for next generation security in 802.11 built on changes in 802.11ac 23 August 2012 Authors: Name Company.

Slides:



Advertisements
Similar presentations
Doc.: IEEE /1012r0 Submission September 2009 Dan Harkins, Aruba NetworksSlide 1 Suite-B Compliance for a Mesh Network Date: Authors:
Advertisements

Doc.: IEEE /770r0 Submission July 2009 Slide 1 TGs Authenticated Encryption Function Date: Authors: Russ Housley (Vigil Security), et.
Doc.: IEEE r1 Submission July 2011 Dan Harkins, Aruba NetworksSlide 1 Prohibiting Technology Date: Authors:
Submission doc.: IEEE 11-12/1253r1 November 2012 Dan Harkins, Aruba NetworksSlide 1 Why Use SIV for 11ai? Date: Authors:
Cryptography and Network Security (CS435) Part Ten (Hash and MAC algorithms)
Doc.: IEEE /0946r3 Submission August 2012 A proposal for next generation security in built on changes in ac 23 August 2012 Slide.
Doc.: IEEE /1341r0 Submission September 2011 Andrew Myles, CiscoSlide 1 JTC1 SC September Closing Report 22 Sept 2011 Authors: Meeting.
Doc.: IEEE r0 Submission July 2011 Dan Harkins, Aruba NetworksSlide 1 Prohibiting Technology Date: Authors:
Doc.: IEEE e Submission Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Security.
Doc.: IEEE /0315r4 Submission July 2009 Dan Harkins, Aruba NetworksSlide 1 Enhanced Security Date: Authors:
Requirements and Selection Process for RADIUS Crypto-Agility December 5, 2007 David B. Nelson IETF 70 Vancouver, BC.
Doc.: IEEE /0946r1 Submission July 2012 A proposal for next generation security in built on changes in ac 16 July 2012 Slide 1 Authors:
Doc.: IEEE /0099r2 Submission Jan 2013 A resolution proposal comments related to for next generation security in built on changes in ac.
History and Implementation of the IEEE 802 Security Architecture
History and Implementation of the IEEE 802 Security Architecture
Enhanced Security Date: Authors: May 2009 May 2009
Enhanced Security Features for
July 2010 doc.: IEEE /0903r0 A resolution proposal comments related to for next generation security in built on changes in ac 14.
802.11ax in 2.4 GHz Date: Authors: July 2015
IEEE 802 Process for Interactions with ISO/IEC JTC 1/SC 6
Enhanced Security Features for
July 2010 doc.: IEEE /0xxxr0 A summary of draft LS from 3GPP in response to IEEE 802 LS in March May 2017 Authors: Name Company Phone.
Pre-association Security Negotiation for 11az SFD Follow up
March 2018 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [SG SECN PAR & CSD Comment resolution March.
Directed Multicast Service (DMS)
IEEE 802 JTC1 Standing Committee July 2018 opening report for EC
<month year> doc.: IEEE < e> <May 2018>
doc.: IEEE xxx Bob Beach Symbol Technologies
July 2010 doc.: IEEE /0xxxr0 Revised shorter presentation to TGax relating to coexistence efforts in Coexistence SC 12 Sept 2017 Authors: Name.
Pre-association Security Negotiation for 11az SFD Follow up
Key Descriptor Version in EAPOL Key Frames
Discovery Assistance for ay
IEEE 802 JTC1 Standing Committee May 2018 (Warsaw) closing report
<month year> doc.: IEEE < e> <May 2018>
Enhancements to Mesh Discovery
July 2010 doc.: IEEE /0xxxr0 Responses to JTC1 NBs to comments made on FDIS ballots on IEEE ac & IEEE af 17 July 2015 Authors: Name.
Discovery Assistance for ay
IEEE PDED ad hoc closing report in Daejeon in May 2017
IEEE Coexistence SC closing report in San Diego in July 2018
July 2010 doc.: IEEE /0xxxr0 Responses to JTC1 NBs to comments made on FDIS ballots on IEEE ac & IEEE af 17 July 2015 Authors: Name.
Mesh Frame Formats Date: Authors: July 2007 March 2007
IEEE 802 JTC1 Standing Committee July 2018 opening report for EC
Multi-band Discovery Assistance for ay (CR on CID 1771)
IEEE 802 JTC1 Standing Committee July 2018 (San Diego) closing report
Report and Minutes of the QoS Extensions Study Group
December 2015 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Security considerations for 15.3e] Date.
Directed Multicast Service (DMS)
IEEE 802 JTC1 Standing Committee Mar 2017 closing report
AP Power Down Notification
Multi-band Discovery Assistance for ay (CR on CID 1771)
AP Power Down Notification
July 2010 doc.: IEEE /0xxxr0 A summary of draft LS from 3GPP in response to IEEE 802 LS in March May 2017 Authors: Name Company Phone.
Discovery Assistance for ay
doc.: IEEE /454r0 Bob Beach Symbol Technologies
GCMP Restriction Date: Authors: January 2011 May 2010
CID#89-Directed Multicast Service (DMS)
Lecture 4.1: Hash Functions, and Message Authentication Codes
Straw Polls and Motions on 256 QAM and BW: Optional-Mandatory Features
Time Features Date: Authors: May 2009 Month Year
Clause 7 Comment Resolutions
Link Adaptation Subfield for VHT
Channelization for China’s Spectrum
Directed Multicast Service (DMS)
July 2010 doc.: IEEE /0903r0 A resolution proposal comments related to for next generation security in built on changes in ac 14.
draft-ietf-dtn-bpsec-06
IEEE 802 JTC1 Standing Committee Mar 2017 closing report
TGu/TGv Joint Meeting Date: Authors: May 2008 Month Year
Multi-link Operation Framework
80 MHz Channelization Date: Authors: July 2010 Month Year
Multi-link Operation Framework
Presentation transcript:

July 2010 doc.: IEEE 802.11-10/0903r0 A proposal for next generation security in 802.11 built on changes in 802.11ac 23 August 2012 Authors: Name Company Phone email Joe Salowey Cisco +1 206 3100596 jsalowey @cisco.com Stephen Orr +1 408 8948756 sorr@cisco.com Brian Hart +1 408 5253346 brianh@cisco.com Andrew Myles +61 418 656587 amyles@cisco.com Dan Harkins Aruba +1 408 227 4500 dharkins at arubanetworks dot com Salowey et al (Cisco), Harkins (Aruba) Andrew Myles, Cisco

LB188 contains comments requesting the inclusion of updated security options in 802.11ac Number 6198 from Brian Hart (Cisco) 6513 from Dan Harkins (Aruba) Comment 11ac does not seem to have a sufficiently rich set of security options to meet Suite-B requirements Add support for GCM-256 and Suite B Proposed change Define a sufficient security toolkit for 11ac so that 11ac can meet Suite B requirements, including any transitional measures if required Adopt the changes specified in document 11-12/0711rX, where X is any revision (currently at zero) Now at r1 Salowey et al (Cisco), Harkins (Aruba)

It is proposed that TGac consider inclusion of next generation security features in 802.11ac in Sept Security mechanisms are evolving due to advances in computing & cryptographic science 802.11 is missing next generation security mechanisms that will be required in the near future 802.11ac should include new mechanisms that support next generation requirements The inclusion of features like AES-GCMP will align 802.11ac with mechanisms used by other standards The integrity of 802.11 & interoperability will be threatened unless the work is undertaken by 802.11 Two suites of mechanisms A set of mechanisms to expedite delivery of strong security to the industry (important for transition) A set of mechanisms to align with NSA suite B The proposed path for approval is discussion until September and consideration for inclusion into D4.0 at the Palm Springs meeting Salowey et al (Cisco), Harkins (Aruba)

Security mechanisms are evolving due to advances in computing & cryptographic science Security mechanisms are not static – they evolve over time due to advances in computing and cryptographic science e.g. DES was deprecated and replaced by AES e.g. SHA-1 will be disallowed by NIST after 2013, MD5 already is disallowed The “Suite B” profile defined by the USG NSA defines a consistent set of cryptographic algorithms to provide one of two levels of security 128-bit: SHA256 for hashing, P256 for key derivation, AES-128 for encryption 192-bit: SHA384 for hashing, P384 for key derivation, AES-256 for encryption Similar profiles are likely be demanded by non-governmental and governmental organizations in the near future Governments, e.g. US, Canadian and other governments are all known to want a higher bar Security orgs, e.g. NATO, military Industry orgs, e.g. financial services & health Salowey et al (Cisco), Harkins (Aruba)

The inclusion of next generation security will align 802 The inclusion of next generation security will align 802.11ac with mechanisms used by other standards Standard Algorithms IPSEC AES-CBC-256, AES-CBC-128 (RFC 3602) AES-GCM-256, AES-GCM-128 (RFC 4106) TLS AES-CBC-256, AES-CBC-128 (RFC 5246) AES-GCM-256, AES-GCM-128 (RFC 5288) IEEE 802.1AE AES-GCM-256, AES-GCM-128 Salowey et al (Cisco), Harkins (Aruba)

802.11ac should include new mechanisms that support next generation security requirements Same mode as 802.11-2012. Can be enabled on some existing hardware. Algorithm Set IEEE 802.11-2012 Next Generation Security for Industry Transition Suite B alignment Encryption AES-128-CCMP AES-256-CCMP AES-256-GCMP MAC AES-128-CMAC AES-256-CMAC AES-256-GMAC Hash for PRF SHA256 SHA384 SHA384 There are efficiency arguments for GCMP at the highest 802.11ac rates Salowey et al (Cisco), Harkins (Aruba)

A transition to next generation requirements should support improved security on older hardware Not all hardware in existing APs or clients (802.11a/b/g/n) can support new cipher mode (GCM) requirements … … and yet there is a desire to support next generation security in even these devices It is known that some existing hardware can support AES-CCMP-256, and the standard should take advantage of this as part of a transition path Salowey et al (Cisco), Harkins (Aruba)

The integrity of 802.11 & interoperability will be threatened unless the work is done by 802.11 The 802.11 WG could decide to not undertake this work The “world will not end” because 802.11i based security will still be sufficient for many use cases However, increasingly it will not be sufficient in some use cases. In these situations there is a risk, if next generation security features are not included in 802.11ac, that: Other organisations will attempt to define variants of the 802.11 standard to meet this need … … threating the integrity of the 802.11 standard Some companies will define proprietary solutions … … threatening the on-going interoperability of 802.11 based systems Salowey et al (Cisco), Harkins (Aruba)

The proposed path forward is discussion until Sept & consideration for inclusion into D4.0 in Palm Springs We are here D3.0 LB Brian Hart comments San Diego Socialisation of proposal Teleconferences Discussion & straw polls Palm Springs Motion on inclusion A slot convenient for all interested security folk for discussion Revise draft based on community input for inclusion in 802.11ac Overview of draft changes in 11-12-0946r0 & 11-12-711r1 Salowey et al (Cisco), Harkins (Aruba)

Q&A A BSS advertises the “Advanced Security” suite but my client HW doesn’t support this suite. What happens? This capability is enabled by IT departments with stringent security requirements, so the only devices that support the advanced security capabilities would gain access to the BSS. The AP’s physical box may advertise multiple BSSs with different levels of security and access. Your client HW would still have access to a lower security (perhaps guest) SSID for instance. Why doesn’t 11-12/0711r1 include support for 11r? This is under discussion Salowey et al (Cisco), Harkins (Aruba)