Clint Chaplin, Symbol Technologies

Slides:



Advertisements
Similar presentations
January 2004doc.: IEEE /008r3 Clint Chaplin, Symbol TechnologiesSlide 1Submission Security Standing Committee Clint Chaplin, Symbol Technologies.
Advertisements

January 2004doc.: IEEE /008r1 Clint Chaplin, Symbol TechnologiesSlide 1Submission Security Standing Committee Clint Chaplin, Symbol Technologies.
January 2004doc.: IEEE /008r2 Clint Chaplin, Symbol TechnologiesSlide 1Submission Security Standing Committee Clint Chaplin, Symbol Technologies.
Doc.: IEEE /1454r0 Submission Jan 2013 IEEE 802 JTC1 Standing Committee Proposal for SC6 contribution process 15 January 2013 Haasz et al, IEEESlide.
A Proposed Timeline for IEEE ba TG
Relevant Rules on Recirculation
doc.: IEEE /xxxr0 Subir Das sdas at appcomsci dot com
Subir at research dot telcordia dot com
IEEE 802 JTC1 Standing Committee Proposal for SC6 contribution process
IEEE P Working Group for Wireless Personal Area Networks
IEEE r: Fast BSS Transition TG
Co-existence Beacon Element
Fast Roaming Study Group Closing Report May 2004
doc.: IEEE <doc#>
IEEE 802 JTC1 Standing Committee Proposal for SC6 contribution process
Proposal for Task Group Deliverables May 9, 2004
Proposal for Task Group Deliverables May 9, 2004
IEEE 802 JTC1 Standing Committee Proposal for SC6 contribution process
Operating Rules Update
doc.: IEEE <doc#>
July 2010 doc.: IEEE /0xxxr0 Responses to JTC1 NBs to comments made on FDIS ballots on IEEE ac & IEEE af 17 July 2015 Authors: Name.
IETF Liaison Report March 2004 Dorothy Stanley – Agere Systems
July 2010 doc.: IEEE /0xxxr0 Responses to JTC1 NBs to comments made on FDIS ballots on IEEE ac & IEEE af 17 July 2015 Authors: Name.
IEEE 802 JTC1 Standing Committee Proposal for SC6 contribution process
doc.: IEEE <doc#>
doc.: IEEE <doc#>
doc.: IEEE /xxxr0 Subir Das
Security Standing Committee
Changes From D8.00 to D9.00 Date: Authors: January 2008
IEEE Liaison to CableLabs
Stephen McCann, Siemens Roke Manor
doc.: IEEE /xxxr0 Subir Das sdas at appcomsci dot com
Tentative Association May 12, 2004
Adaption PAR Process IEEE OpMan Section Process for adoption of non-IEEE Standards Sponsor identification A Sponsor, as defined by subclause.
NTT Access Network Service Systems Laboratories
doc.: IEEE /xxxr0 Subir Das sdas at appcomsci dot com
15 Day Letter Ballot #58 Final Results
doc.: IEEE <doc#>
TGr Closing Report July 2004
TGr Closing Report July 2004
TGi Security Agenda and Status
TGr Closing Report July 2004
Report on Date: Authors: March 2016 July 2013
doc.: IEEE /xxxr0 Subir Das sdas at appcomsci dot com
TGn Chair’s Status Update
TGr Closing Report November 2004
Report on Date: Authors: January 2019 July 2013
LMSC Policy and Procedures Update
Subir at research dot telcordia dot com
IEEE Revision Timeline
IEEE Task Group r (Fast Roaming) Opening Report May 2008
IETF-IEEE Meeting Summary
Report on Date: Authors: January 2016 July 2013
Changes From D6.00 to D7.00 Date: Authors: July 2007
JEDEC JC-61 Liaison Report
Tge draft ballot information
doc.: IEEE /xxxr0 Subir Das sdas at appcomsci dot com
IEEE 802 JTC1 Standing Committee Proposal for SC6 contribution process
Stephen McCann, Siemens Roke Manor
Fast Roaming Study Group Closing Report March 2004
Liaison Report Date: Authors: September 2010
Liaison Report Date: Authors: July 2010
NTT Access Network Service Systems Laboratories
TGr Closing Report for March 2008
Liaison Report Date: Authors: September 2010
EC Closing Report on Rules
SG Operating Rules Anybody can vote, present, and make motions
SG Operating Rules Anybody can vote, present, and make motions
doc.: IEEE /xxxr0 Subir Das sdas at appcomsci dot com
Clint Chaplin, Symbol Technologies
Presentation transcript:

Clint Chaplin, Symbol Technologies January 2002 doc.: IEEE 802.11-02/xxxr0 July 2003 Security Maintenance Clint Chaplin, Symbol Technologies Clint Chaplin, Symbol Technologies John Doe, His Company

July 2003 What is Security? Security is hard. (W. Arbaugh: “Wireless Security is Different”, IEEE Computer, August 2003, p99) Security is not a value-added feature (not like e.g. QoS). Security is all or nothing. Security is untestable. Broken security is non-obvious. Clint Chaplin, Symbol Technologies

January 2002 doc.: IEEE 802.11-02/xxxr0 July 2003 Problem Once TGi finishes their task and has a good secure solution in 802.11, how do we make sure that this security will persist? Subsequent amendments and revisions may accidentally ruin security. According to Bernard Aboba, 802.11f is already broken securitywise. Clint Chaplin, Symbol Technologies John Doe, His Company

Appropriate Forum? IEEE 802.11, IEEE 802, IEEE SA? July 2003 Clint Chaplin, Symbol Technologies

Wait until letter ballot, and then comment about security problems. July 2003 Possible Solution 1 Wait until letter ballot, and then comment about security problems. This may be too late in the development process. In many cases, it is impossible to bolt security onto an existing proposal. As a modification, have a special comment category for security issues, and treat the resolution in a different manner. Clint Chaplin, Symbol Technologies

July 2003 Possible Solution 2 Require security to be a consideration for all subsequent amendments and revisions Like IETF requirement for all I-Ds and RFC to have a section on security Unfortunately, cannot be imposed on existing Task Groups In practice, this doesn’t work for IETF Clint Chaplin, Symbol Technologies

Standing Committee to vet work for Security considerations July 2003 Possible Solution 3 Standing Committee to vet work for Security considerations Standing committee rules allow everybody to vote, not just members (is this a problem?) Clint Chaplin, Symbol Technologies

Maintenance Task Group July 2003 Possible Solution 4 Maintenance Task Group Task Group can only create one standard, and then dies A long time between problem and resolution, so the security hole will exist for a while Clint Chaplin, Symbol Technologies