Pre-Authentication Authentication of Management Frames

Slides:



Advertisements
Similar presentations
Beacon Measurement on Pilot Frames
Advertisements

Use of KCK for TGr Management Frame Protection
LB84 General AdHoc Group Sept. Closing TGn Motions
[ Interim Meetings 2006] Date: Authors: July 2005
Resource Request/Response Discussion
IEEE White Space Radio Contribution Title
TGu/TGv Joint Session Date: Authors: July 2005 July 2005
London TGu Motions Authors: January 2007 Date: Month Year
LB73 Noise and Location Categories
LB73 Noise and Location Categories
Waveform Generator Source Code
TGu Closing Report Date: Authors: November 2005
March 2014 Election Results
TGp Closing Report Date: Authors: July 2007 Month Year
Attendance and Documentation for the March 2007 Plenary
Attendance and Documentation for the March 2007 Plenary
[ Policies and Procedure Summary]
3GPP liaison report May 2006 May 2006 Date: Authors:
Motion to accept Draft p 2.0
Protected SSIDs Date: Authors: March 2005 March 2005
3GPP liaison report July 2006
[place presentation subject title text here]
TGp Motions Date: Authors: November 2005 Month Year
TGp Closing Report Date: Authors: March 2006 Month Year
Emergency Call Motion Date: Authors: January 2006
TGu-changes-from-d0-02-to-d0-03
TGp Closing Report Date: Authors: May 2007 Month Year
TGu Motions Date: Authors: September 2006 September 2006
TGp Closing Report Date: Authors: March 2006 Month Year
Reflector Tutorial Date: Authors: July 2006 Month Year
TGv Redline D0.07 Insert and Deletion
TGu Timeline Date: Authors: January 2005 January 2005
TGv Redline D0.06 Insert and Deletion
TGu Closing Report Date: Authors: September 2005
ADS Study Group Mid-week Report
TGu Timeline Date: Authors: July 2005 July 2005
TGu-changes-from-d0-01-to-d0-02
LB73 Noise and Location Categories
TGy draft 2.0 with changebars from draft 1.0
TGv Redline D1.04-D1.0 Insert and Deletion
TGv Redline D0.10 Insert and Deletion
WAPI Position Paper Sept 2005 Sept 2005 IEEE WG
Redline of draft P802.11w D2.2 Date: Authors:
Document Motions Date: Authors: November 2005 November 2005
802.11u Bootstrap Procedure with
TGu-changes-from-d0-02-to-d0-03
[ Policies and Procedure Summary]
3GPP2 Liaison Report Date: Authors: May 2006 May 2006
TGu Motions Date: Authors: May 2006 May 2006
TGu Closing Report Date: Authors: January 2006 January 2006
Draft P802.11s D1.03 WordConversion
Questions to the Contention-based Protocol (CBP) Study Group
Motion to go to Letter Ballot
TGu-changes-from-d0-04-to-d0-05
Location Capability Negotiation
Transition Nowhere Date: Authors: Sept 2005 Sept 2005
Motion for request of assigned numbers
TGu-changes-from-d0-03-to-d0-04
TGu Timeline Date: Authors: January 2005 January 2005
TGu Motions Date: Authors: May 2006 May 2006
TGu Draft Revision Procedure
TGu Timeline Date: Authors: May 2005 May 2005
TGu Timeline Date: Authors: July 2005 July 2005
WAPI Position Paper Sept 2005 Sept 2005 IEEE WG
Use of KCK for TGr Management Frame Protection
Use of KCK for TGr Management Frame Protection
Use of Nonces in Fast Transitioning Flows
TGu Timeline Date: Authors: July 2005 July 2005
TGr Proposed Draft Revision Notice
TGp Motions Date: Authors: January 2006 Month Year
Presentation transcript:

Pre-Authentication Authentication of Management Frames Month Year doc.: IEEE 802.11-06/1655r0 November 2006 Pre-Authentication Authentication of Management Frames Date: 2006-11-12 Authors: Notice: This document has been prepared to assist IEEE 802.11. It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. Release: The contributor grants a free, irrevocable license to the IEEE to incorporate material contained in this contribution, and any modifications thereof, in the creation of an IEEE Standards publication; to copyright in the IEEE’s name any IEEE Standards publication even though it may include portions of this contribution; and at the IEEE’s sole discretion to permit others to reproduce in whole or in part the resulting IEEE Standards publication. The contributor also acknowledges and accepts that this contribution may be made public by IEEE 802.11. Patent Policy and Procedures: The contributor is familiar with the IEEE 802 Patent Policy and Procedures <http:// ieee802.org/guides/bylaws/sb-bylaws.pdf>, including the statement "IEEE standards may include the known use of patent(s), including patent applications, provided the IEEE receives assurance from the patent holder or applicant with respect to patents essential for compliance with both mandatory and optional portions of the standard." Early disclosure to the Working Group of patent information that might be relevant to the standard is essential to reduce the possibility for delays in the development process and increase the likelihood that the draft publication will be approved for publication. Please notify the Chair <stuart.kerry@philips.com> as early as possible, in written or electronic form, if patented technology (or technology under patent application) might be incorporated into a draft standard being developed within the IEEE 802.11 Working Group. If you have questions, contact the IEEE Patent Committee Administrator at <patcom@ieee.org>. Matthew Gast, Trapeze Networks Matthew Gast, Trapeze Networks

Month Year doc.: IEEE 802.11-06/1655r0 November 2006 Abstract This presentation describes the management frame signature extensions in 11-06/1641. Matthew Gast, Trapeze Networks Matthew Gast, Trapeze Networks

Month Year doc.: IEEE 802.11-06/1655r0 November 2006 Motivation 802.11w-D1.0 only protects management frames post-association Prior to association, some security-relevant tasks occur, mainly network selection Post-association transitions are protected by existing draft and 11k Network selection may use either Probe frames or Action frames Probe Request and Probe Response still used for initial join Action frames may also be used in current TGu draft Network selection is time-critical for emergency calls Matthew Gast, Trapeze Networks Matthew Gast, Trapeze Networks

Month Year doc.: IEEE 802.11-06/1655r0 November 2006 High-Level Approach Provide optional Signature Request and Signature Response information elements Per-Beacon signatures are difficult because they change frequently; restricting them to Probe frames reduces the load Both a pre-shared key and a public/private key pair specified, so there are options for varying environments Not all operations require this level of security; leave choices to client implementations Leverage existing PSK and certificate implementations in supplicants To do 802.11i handshake, either a PSK or certificate must exist Add certificate exchange protocol Matthew Gast, Trapeze Networks Matthew Gast, Trapeze Networks

Month Year doc.: IEEE 802.11-06/1655r0 November 2006 Signature Request IE Included in Probe Request or Action when STA requests a signature by the AP Specifies list of IEs STA wants validated Nonce provides liveness proof of response Can be used to request a particular signing key Matthew Gast, Trapeze Networks Matthew Gast, Trapeze Networks

Month Year doc.: IEEE 802.11-06/1655r0 November 2006 Signature Response IE Confirms signed elements and key used for signing Appears at end of authenticated frame Matthew Gast, Trapeze Networks Matthew Gast, Trapeze Networks

MIC Calculation Protected contents Public/private key Shared Key Month Year doc.: IEEE 802.11-06/1655r0 November 2006 MIC Calculation Protected contents TA, RA, Frame Control (with some masking), Nonce, and IE list Public/private key SHA-1 over protected contents, signed by private key Shared Key HMAC-SHA-1 over protected contents, using shared key as the hash Matthew Gast, Trapeze Networks Matthew Gast, Trapeze Networks

Month Year doc.: IEEE 802.11-06/1655r0 November 2006 Certificate Exchange Rather than passing certificates, protocol uses certificate identifiers CN + serial number + fingerprint Client must obtain certificate before requesting public/private key pair signature Simple transfer procedure using Action frames Note: some external source of trust is required, e.g. CA certificate installation Matthew Gast, Trapeze Networks Matthew Gast, Trapeze Networks

References November 2006 Month Year doc.: IEEE 802.11-06/1655r0 Matthew Gast, Trapeze Networks Matthew Gast, Trapeze Networks