Comments on WAPI Authors: February 2005 Date:

Slides:



Advertisements
Similar presentations
Doc.: IEEE /0122r0 Submission February 2005 DraftSlide 1 Comments on WAPI Date: Notice: This document has been prepared to assist IEEE.
Advertisements

Devices Interfering with Current Channel of AP
Use of KCK for TGr Management Frame Protection
LB84 General AdHoc Group Sept. Closing TGn Motions
LB84 General AdHoc Group Sept. Closing TGn Motions
[ Interim Meetings 2006] Date: Authors: July 2005
Resource Request/Response Discussion
TGn LB97 Frame Format Ad Hoc
IEEE White Space Radio Contribution Title
LB73 Noise and Location Categories
LB73 Noise and Location Categories
Waveform Generator Source Code
TGn LB97 Frame Format Ad Hoc
TGp Closing Report Date: Authors: July 2007 Month Year
3GPP Extended Date: Authors: July 2005 July 2005
[ Policies and Procedure Summary]
Requirements for Network Selection
3GPP liaison report May 2006 May 2006 Date: Authors:
Motion to accept Draft p 2.0
Protected SSIDs Date: Authors: March 2005 March 2005
3GPP liaison report July 2006
[place presentation subject title text here]
JTC1 Ad Hoc Closing Report
Motions Date: Authors: January 2006
JTC1 Chair’s Closing Report
January doc.: IEEE xx/xxxx January 2006
TGp Closing Report Date: Authors: March 2006 Month Year
Emergency Call Motion Date: Authors: January 2006
TGu-changes-from-d0-02-to-d0-03
Contribution on Location Privacy
Quick Beacon Impacts on LB 92
Diagnostics and Troubleshooting
JTC1 Ad Hoc Mid-week Report
R8E4 and XML Date: January 12th 2006 Authors: January 2006
TGp Closing Report Date: Authors: March 2006 Month Year
Reflector Tutorial Date: Authors: July 2006 Month Year
TGv Redline D0.07 Insert and Deletion
TGv Redline D0.06 Insert and Deletion
TGu Closing Report Date: Authors: September 2005
Solution for comment 32 Date: Authors: July, 2008
ADS Study Group Mid-week Report
Protection Assurance Method
TGu-changes-from-d0-01-to-d0-02
CCMP Nonce Construction
LB73 Noise and Location Categories
TGy draft 2.0 with changebars from draft 1.0
TGv Redline D0.10 Insert and Deletion
Response to ISO/IEC JTC1/SC6
WAPI Position Paper Sept 2005 Sept 2005 IEEE WG
Redline of draft P802.11w D2.2 Date: Authors:
Proposed Changes to Requirements
TGp Closing Report Date: Authors: March 2007 Month Year
TGr Proposed Draft Revision Notice
TGu-changes-from-d0-02-to-d0-03
[ Policies and Procedure Summary]
March Opening Report Date: Authors: March 2011
May 2005 CAPWAP AHC Closing Report
TKIP in w Date: Authors: September 2005 Month Year
Beamforming and Link Adaptation Motions
Draft P802.11s D1.03 WordConversion
TGu-changes-from-d0-04-to-d0-05
EAP Method Requirements for Emergency Services
Transition Nowhere Date: Authors: Sept 2005 Sept 2005
Motion for request of assigned numbers
TGu-changes-from-d0-03-to-d0-04
TGu Motions Date: Authors: May 2006 May 2006
Beamforming and Link Adaptation Motions for LB 84 Comment Resolutions
WAPI Position Paper Sept 2005 Sept 2005 IEEE WG
Use of KCK for TGr Management Frame Protection
Use of KCK for TGr Management Frame Protection
Presentation transcript:

Comments on WAPI Authors: February 2005 Date: 2005-02-15 Febrauary 2005 doc.: IEEE 802.11-05/0122r0 February 2005 Comments on WAPI Date: 2005-02-15 Authors: Notice: This document has been prepared to assist IEEE 802.11. It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. Release: The contributor grants a free, irrevocable license to the IEEE to incorporate material contained in this contribution, and any modifications thereof, in the creation of an IEEE Standards publication; to copyright in the IEEE’s name any IEEE Standards publication even though it may include portions of this contribution; and at the IEEE’s sole discretion to permit others to reproduce in whole or in part the resulting IEEE Standards publication. The contributor also acknowledges and accepts that this contribution may be made public by IEEE 802.11. Patent Policy and Procedures: The contributor is familiar with the IEEE 802 Patent Policy and Procedures <http:// ieee802.org/guides/bylaws/sb-bylaws.pdf>, including the statement "IEEE standards may include the known use of patent(s), including patent applications, provided the IEEE receives assurance from the patent holder or applicant with respect to patents essential for compliance with both mandatory and optional portions of the standard." Early disclosure to the Working Group of patent information that might be relevant to the standard is essential to reduce the possibility for delays in the development process and increase the likelihood that the draft publication will be approved for publication. Please notify the Chair <stuart.kerry@philips.com> as early as possible, in written or electronic form, if patented technology (or technology under patent application) might be incorporated into a draft standard being developed within the IEEE 802.11 Working Group. If you have questions, contact the IEEE Patent Committee Administrator at <patcom@ieee.org>. Draft Henry Ptasinski, Broadcom

Febrauary 2005 doc.: IEEE 802.11-05/0122r0 February 2005 Abstract This document contains technical comments regarding JTC1/SC6’s forwarding of the Chinese NB contribution (National Standard of China, GB15629.11) found in 6N12687 to the IEEE 802 (and specifically IEEE 802.11) for information. Draft Henry Ptasinski, Broadcom

Overview Statement GB15629.11 contains useful technology February 2005 Overview Statement GB15629.11 contains useful technology There are many issues to be resolved for successful integration of GB15629.11 into 802.11 and 8802-11 We believe that cooperation between China’s experts and the 802.11 Membership can successfully address all of these issues Draft

Backward Compatibility Concerns Febrauary 2005 doc.: IEEE 802.11-05/0122r0 February 2005 Backward Compatibility Concerns GB15629.11 omits provisions for backwards compatibility Its adoption would make all deployed implementations of 8802-11 non-compliant by removing all description of WEP. While WEP may have many failings, continued support to facilitate migration is essential. Removing WEP entirely represents an onerous economic burden on both users and vendors of 8802-11  Draft Henry Ptasinski, Broadcom

Forward Compatibility Concerns Febrauary 2005 doc.: IEEE 802.11-05/0122r0 February 2005 Forward Compatibility Concerns GB15629.11 does not consider forward compatibility It does not have any signaling mechanism to negotiate which cipher suite and authentication suite is used This makes future enhancements more difficult This blocks further innovation in the standard GB15629.11’s known incompatibilities include: IEEE Draft Std 802.11e IEEE Draft Stds 802.11k, 802.11u, and 802.11w IEEE Draft Std 802.11n IEEE Draft Std 802.11r IEEE Draft Std 802.11s No mechanism will assure forward compatibility other than collaborating with IEEE 802.11 Working Group Draft Henry Ptasinski, Broadcom

Interoperation Issues Febrauary 2005 doc.: IEEE 802.11-05/0122r0 February 2005 Interoperation Issues Interoperation between equipment built for different jurisdictions prevented by GB15629.11 Undesirable for a proposed international standard In contrast, IEEE Std 802.11i provides an extensible security mechanism If a jurisdiction wishes to add new authentication algorithms and encryption algorithms (such as WAPI), they can do so within 802.11i framework Without breaking interoperability with devices built for other jurisdictions Without consent of IEEE 802.11 Working Group And even without waiting for IEEE 802.11 Working Group to allocate one – use a vendor specific OUI Draft Henry Ptasinski, Broadcom

“Secret” Encryption Algorithm Concerns Febrauary 2005 doc.: IEEE 802.11-05/0122r0 February 2005 “Secret” Encryption Algorithm Concerns GB15629.11 is incomplete, as it does not specify an encryption algorithm to use Implementation of the standard by all parties is not possible. Each vendor must be able to implement the encryption scheme An international standard must specify all the algorithms needed for its implementation In general almost no commercial market will trust or accept unknown ciphers It is infeasible to maintain the secrecy of any algorithm in mainstream commercial products Methods that effectively hinder reverse engineering of either hardware or software implementations too expensive for products in the consumer space Private algorithms can only go in controlled products instead of commercial products to remain secret, e.g., military-only Nations can maintain private algorithms, but only for non-standard modes of operation Draft Henry Ptasinski, Broadcom

Authentication Concerns (1) Febrauary 2005 doc.: IEEE 802.11-05/0122r0 February 2005 Authentication Concerns (1) GB15629.11 fails to consider global market requirements for authentication Different WLAN market segments require different authentication mechanisms Enterprises plan to use EAP-TLS, PEAP, and TTLS, to leverage investment in RADIUS databases 3GPP plans to use EAP-SIM, to leverage investment in GSM-SIM China Mobile plans to use CAVE, to leverage its pre-existing authentication investment Consumer electronics plans to use pre-shared keys, because homes do not have IT departments to manage on-line trusted third party servers Draft Henry Ptasinski, Broadcom

Authentication Concerns (2) Febrauary 2005 doc.: IEEE 802.11-05/0122r0 February 2005 Authentication Concerns (2) JTC1 already has an adopted digital certificate format—X.509. Why does it need another for 8802-11? No rationale given for GB15629.11 specific certificate formats Certificate design known to be fraught with difficulty GB15629.11 certificate is missing all the extensions that have been added to X.509 over the last decade to address obvious interoperability and operational problems E.g., design does not consider ASU key expiry E.g., design does not consider cross certification E.g., design does not consider certificate chains longer than two certificates Why is certificate design a WLAN specification issue? Why is back-end infrastructure a WLAN specification issue? It is true the back-end design must be considered to understand the system security, but it is not part of the WLAN Draft Henry Ptasinski, Broadcom

Other Technical Comments (1) Febrauary 2005 doc.: IEEE 802.11-05/0122r0 February 2005 Other Technical Comments (1) A STA can't distinguish a WAPI-enabled AP from a legacy AP An AP can’t distinguish a WAPI-enabled STA from a legacy STA As in 802.11i, authentication and key negotiation take place after association, leading to service disruption during AP-to-AP transition GB15629.11 is incompatible with 802.11r, so cannot utilize the fast roaming features developed by IEEE 802.11r Draft Henry Ptasinski, Broadcom

February 2005 Security Issues In an ad-hoc network, the same key is used by all STAs for all traffic. This is a security defect All STAs initialize the PN to the same value Frames sent by different STAs will be protected with the same key and PN. Since OFB is a stream cipher, this replicates WEP’s known IV reuse defect Uses plain CBC-MAC for MIC, a security defect CBC-MAC is not secure when used with variable length messages See Bellare, Killian, and Rogaway, “The Security of the Cipher Block Chaining Message Authentication Code,” CRYPTO ’94 Proceedings Either reverse order of encryption and message integrity (this must be done with care to work), or else need a different message integrity code Transmit and Receive addresses unprotected from forgery Draft

Summary Forward and backward compatibility have to be provided February 2005 Summary Forward and backward compatibility have to be provided Interoperation issues needed to be resolved The following concerns should be addressed: “Secret” Encryption Algorithm Concerns Performance and Cost Concerns Authentication Concerns A number of security issues in GB15629.11 must be addressed None of these issues are insurmountable if China’s security experts work with the IEEE 802.11 Working Group to integrate GB15629.11 into ISO/IEC 8802-11 via IEEE 802.11 Working Group Draft