Block Ack Security Date: Authors: May 2008 May 2008

Slides:



Advertisements
Similar presentations
Doc.: IEEE /1021r1 Submission September 2008 Luke Qian etc.Slide 1 A Simplified Solution For Critical A-MPDU DoS Issues Date: Authors:
Advertisements

Doc.: IEEE /0562r0 Submission May 2008 Adrian Stephens, Intel CorporationSlide 1 TGn LB124 – A detect and mitigate solution to the BA DoS problems.
Doc.: IEEE /0833r2 Submission July 2008 Luke Qian etc, CiscoSlide 1 A Proposed Scaled-down Solution to A- MPDU DoS Related Comments in LB 129.
Doc.: IEEE /1021r3 Submission September 2008 Luke Qian etc.Slide 1 A Simplified Solution For Critical A-MPDU DoS Issues Date: Authors:
Doc.: IEEE /0833r3 Submission July 2008 Luke Qian etc, CiscoSlide 1 A Proposed Scaled-down Solution to A- MPDU DoS Related Comments in LB 129.
Submission doc.: IEEE 11-10/0745r2 May 2010 Matthew Fischer, BroadcomSlide 1 MFQ MMPDU MAC Sequence Numbering Date: Authors:
Submission doc.: IEEE /1003r1 July 2011 Hiroki Nakano, Trans New Technology, Inc.Slide 1 Upper Layer Data on Management frames Date:
Target Wake Times Date: Authors: July 2012 Month Year
Doc.: IEEE /0485r0 Submission May 2004 Jesse Walker and Emily Qi, Intel CorporationSlide 1 Management Protection Jesse Walker and Emily Qi Intel.
Doc.:IEEE /0313r1 Submission Robert Stacey (Intel) March 12, 2010 Slide 1 Rekeying Protocol Fix Authors: Date:
Doc.: IEEE /0150r11 Submission July 2015 Ganesh Venkatesan (Intel Corporation)Slide 1 GCR using SYNRA for GLK Date: Authors:
Doc.: IEEE /0615r0 Submission May 2008 Naveen K. Kakani, Nokia IncSlide 1 Multicast Transmission in WLAN Date: Authors:
Submission doc.: IEEE /0961r0 July 2016 Hanseul Hong, Yonsei UniversitySlide 1 Consideration on Multi-STA BlockAck Optimization Date:
Flow control for EDMG devices
Security Enhancement to FTM
Undetected Duplicate Frame Reception
LB97 20/40 BSS Coexistence Date: Authors: July 2007
Flow control for EDMG devices
Implementation for Intra-AC Differentiated Services
Protected LTF Using PMF in SU and MU Modes
Proposed Modifications to
EDMG BlockAck Retransmission
Groupcast discussion Date: Authors: Mar 2009 Month Year
Harmonizing Multicast/Broadcast Proposals
Requirements and Implementations for Intra-flow/Intra-AC DiffServ
Requirements and Implementations for Intra-flow/Intra-AC DiffServ
Block Ack Security Authors: May 2008 Date: May 2008
RSC Pools for Mgmt Frames
Multicast/Broadcast Communication With Acknowledge
Secure WUR frames Date: Authors: January 2018
Secure Ranging Measurement
EDCA and BlockAck Extensions for Reliable Multicast/Broadcast Services
July 2002 QoS Interactions Interaction of AES Message Integrity Check Processing with Quality of Service Paul Lambert, Woodside Networks, Inc.
MAC Clarifications Date: Authors: September 2016
Beacon Protection Date: Authors: July 2018 July 2018
Beacon Protection Date: Authors: May 2018 January 2018
Regarding HE fragmentation
CCMP Nonce Construction
July 2008 doc.: IEEE /0833r0 July 2008 A Proposed Scale-down Solution to A-MPDU DoS Related Comments in LB 129 Date: Authors: Luke.
A Simplified Solution For Critical A-MPDU DoS Issues
CCMP Nonce Construction
BSS parameters update notification
Rekeying Protocol Fix Date: Authors: Month Year
Long Slot Directive Matthew Fischer Broadcom
Group Block Acknowledgements for Multicast Traffic
Signaling of intolerance for 40 MHz transmissions
A Simplified Solution For Critical A-MPDU DoS Issues
Requirements and Implementations for Intra-flow/Intra-AC DiffServ
Beacon Protection Date: Authors: July 2018 July 2018
Aggregate Block-ACK definition
Signaling of intolerance for 40 MHz transmissions
802.11e EDCA-APSD TXOP Handoff September 2003
TXBF FB Vector Sanctity
Interference Signalling Enhancements
Beacon Protection Date: Authors: May 2018 January 2018
Regarding HE fragmentation
EHT Multi-link Operation
Efficient TIM element supporting multiple BSSIDs
Requirements and Implementations for Intra-flow/Intra-AC DiffServ
More Reliable GroupCast Proposal Presentation
GCR using SYNRA for GLK Date: Authors: July 2015 Month Year
Review of n A-MPDU DoS Issues – Progress and Status
Unsolicited Block ACK Extension
July 2008 doc.: IEEE /0833r0 July 2008 A Proposed Scale-down Solution to A-MPDU DoS Related Comments in LB 129 Date: Authors: Luke.
Multi-Link Architecture and Requirement Discussion
Indicating NGV Capabilities in MAC Header
Multi-link BA Operation
BA Setup for Multi-Link Aggregation
Multi-Link Architecture and Requirement Discussion
BA Setup for Multi-Link Aggregation
Presentation transcript:

Block Ack Security Date: 2008-03-19 Authors: May 2008 May 2008 doc.: IEEE 802.11-08/0537r0 May 2008 Block Ack Security Date: 2008-03-19 Authors: Matthew Fischer, Broadcom Matthew Fischer, Broadcom

May 2008 doc.: IEEE 802.11-08/0537r0 May 2008 Abstract An introduction to some security issues with the existing BA mechanism and a proposed set of modifications to reduce and/or eliminate the security problems. Matthew Fischer, Broadcom Matthew Fischer, Broadcom

Block Ack Security problems May 2008 Block Ack Security problems The following security problems exist: The SN values of data packets are not protected – yet, SN values of data packets can be used to adjust the RX Buffer LE value. A single forged SN value can cause the recipient to move the LE value too far forward, thereby causing the recipient to discard frames below the new LE that should not have been discarded. Data is lost at the recipient. A single forged SN value in a data packet can also cause the recipient to place the received frames in an incorrect order, which can cause problems both when the security layer examines the sequence of PN values in the MAC SN-ordered frames and when the frames are passed to the next layer for processing. A single forged SN value in a data packet can cause RX scorecard information to be updated, and a subsequent transmission of a BA frame in response to a legitimate AMPDU can include this bogus scorecard information. A captured and replayed packet cannot be detected except by replay detection in the security layer. If the RX buffer reordering is performed before this check, then the SN in that replayed packet can cause incorrect RX Buffer LE movement. The BAR frame is not protected – yet the BAR frame SSN value is used to adjust the RX Buffer LE value. A single forged SN value can cause the recipient to move the LE value too far forward, thereby causing the recipient to discard frames below the new LE that should not have been discarded. Data is lost at the recipient. The BA frame is not protected – yet the BA frame SSN value is used to adjust the originator’s TX scorecard LE value. Forged BA frames can cause false adjustments to the LE value that result in some data packets not being transmitted to the recipient, since they now have SN values below the new LE value. Data is lost. Forged BA frames can suppress retransmission of frames that were not successfully received (even without moving LE at TX)‏ Matthew Fischer, Broadcom

BA security solution May 2008 A solution to this security problem is: doc.: IEEE 802.11-08/0537r0 May 2008 BA security solution A solution to this security problem is: Protect the SN value of the MAC header of the data packets by including the SN value as part of the PN value Either include the FRAG bits in PN, or disallow fragmentation Modify the setup of the security agreement that is negotiated between the originator and the recipient so that the originator and recipient can negotiate the use of the new PN scheme Use a new protected form of the BAR frame to convey BAR information, and allow this protected BAR frame to cause RX Buffer LE movement while forbidding unprotected BAR frames from making RX Buffer LE changes Use a new protected form of the BA frame to convey BA information, disallow acceptance of unprotected BA frame, except optionally, after SIFS Allow alternative architectural ordering of Block Ack Reordering AFTER MPDU decryption, and include a new Block Ack Replay Detection function just before the Block Ack Reordering but preserve existing ordering option as well for legacy implementation Matthew Fischer, Broadcom Matthew Fischer, Broadcom

Secure Block Ack Rules Part 1 May 2008 Secure Block Ack Rules Part 1 *1 – unencrypted BAR is not used to shift recipient LE Encrypted BAR can shift recipient LE Unencrypted BAR can still be used to cause a BA to be generated *2 – unsolicited unencrypted BA is not used to shift originator LE SIFS-response unencrypted BA may be used to shift originator LE Encrypted BA may be used to shift originator LE at any time 3 – PN is modified to include SN and is tracked per TID RX Buffer reorder based on protected SN *4 - recipient sends BA using partial state BA of SSN is based on immediately preceding MPDU(s) SIFS separation requires JAM for attacker to succeed BA SSN mismatch to AMPDU SNs can be used to detect weak attack Some of these precautions can be followed by STA not using a protected SN, such steps are marked as * Matthew Fischer, Broadcom

Secure Block Ack Rules Part 2 May 2008 Secure Block Ack Rules Part 2 5a - Recipients that are incapable of verifying SN values before crafting a BA (i.e. within SIFS) employ “ephemeral” state operation I.e. WINSTART_R and scorecard information is deleted after BA transmission Incorrect RX scoreboard information that is due to rogue MPDU SN values will not survive This is less stateful than partial state operation Shall not send an encrypted BA after SIFS Because encrypted information is based on potentially rogue SN info WINSTART_R moves do not matter E.g. those generated by rogue BAR or rogue MPDU SN WINSTART_B moves are based on protected SN values Implies reversal of reordering and decryption steps Matthew Fischer, Broadcom

Secure Block Ack Rules Part 3 May 2008 Secure Block Ack Rules Part 3 5b - Recipients that are capable of verifying SN values before crafting a BA extract the SN from the IV Either examine one of the FRAG bits or use TA lookup result may use any of partial-partial state, regular partial state or full state WINSTART_R moves are based on protected SN values WINSTART_B moves are based on protected SN values *5c - Recipients that are incapable of verifying SN values at all (i.e. not participating in the new protocol) employ ephemeral state operation incorrect RX scoreboard information that is due to rogue MPDU SN values will not survive WINSTART_R moves do not matter WINSTART_B moves will be based on potentially faulty SN values, but at least relative ordering can be established by examining PN values 6 – Only the new protected MGMT frame can be used to perform BAR-style RX BUFFER pointer moves *7 – use only AMPDU, even if wishing to send a single MPDU i.e. do not use non-AMPDU for single frame transmission, since it will elicit ACK which can be jammed Matthew Fischer, Broadcom

New PN value generation – Per TID May 2008 doc.: IEEE 802.11-08/0537r0 May 2008 New PN value generation – Per TID UpperBits MAC SN FRAG 32 bits 12 bits 4 bits Each stream is identified by {TA,RA,TID} Non-QOS frames need not apply PN is assigned per TID The TID within the frame is protected by the Nonce Use MAC SN and FRAG for the low order bits of the new PN value Ensures that the PN values appear in increasing sequence at the recipient, otherwise the replay detection in the security processing section would declare a replay error. Some values skipped if FRAG does not use all 16 values. The new PN is treated as a single value, within each TID I.e. When the MAC SN value reaches 0xFFF, then the next value of SN will be 0x000 again. When SN wrap occurs, the UpperBits field of the new PN is incremented by one. If any one of the TID PN spaces uses all 2^48 PN values (minus any initial offset), then a new key must be used for this RA/TA pair I.e. for the existing security protocol, once the PN number space has been exhausted, a new key must be used before the PN sequence can be restarted. Each TID has its own PN space, so when any is exahausted, all must start over. SN values can continue where they left off (some loss of PN space is incurred, but it is quite small) – STA can optionally reset the SN Each TID for a given RA/TA pair has a PN space to use that is equivalent in size to the original PN If any one of the TID PN spaces runs through all possible 2^48 PN values which belong to that TID, then the RA/TA key must be replaced. MGMT Type frames get their own PN space Matthew Fischer, Broadcom Matthew Fischer, Broadcom

AAD construction AAD construction is unchanged May 2008 doc.: IEEE 802.11-08/0537r0 May 2008 AAD construction AAD construction is unchanged But PN construction is modified SN value is used in the PN construction This protects the SN Matthew Fischer, Broadcom Matthew Fischer, Broadcom

Management frame change May 2008 doc.: IEEE 802.11-08/0537r0 May 2008 Management frame change Modified PN will not be recognized by legacy STA Existing devices will not function properly if the modified PN value is used Therefore, it is necessary to negotiate the use of the new protocol through a modified management exchange New bits added to the Extended Capabilities information element To signal capability To signal requirements Matthew Fischer, Broadcom Matthew Fischer, Broadcom

Extended Capabilities Element changes May 2008 Extended Capabilities Element changes HT Info Exch Sp On-Demand Beacon Ext Chnl Switching WAVE Indication Resv EBAC UNBAI USBAI EBRC UBRI PSNC PSNR Resv ANA B0 B1 B2 B3 B4 B5 B6 B7 B8 B9 B10 B11 B12 B14 B15 EBAC – Encrypted BA Capable UNBAI – Unencrypted Non-SIFS BA Ignored USBAI – Unencrypted SIFS BA Ignored EBRC – Encrypted BAR Capable UBRI – Unencrypted BAR Ignored PSNC – Protected SN Capable PSNR – Protected SN Required Matthew Fischer, Broadcom

Encrypted BAR frame New Action frame Encrypted according to TGw May 2008 Encrypted BAR frame New Action frame Category = Block Ack Action = BAR Body = BAR Control, BAR Information (see TGn draft) Multi-TID version allowed Uncompressed? Encrypted according to TGw Matthew Fischer, Broadcom

Encrypted BA frame New Action frame Encrypted according to TGw May 2008 Encrypted BA frame New Action frame Category = Block Ack Action = BA Body = BAR Control, BAR Information (see TGn draft) Multi-TID version allowed Uncompressed? Optionally includes recipient RX Buffer LE value To allow originator to synch its TX Buffer with RX Buffer Encrypted according to TGw Matthew Fischer, Broadcom

Specification change for order of operations May 2008 Specification change for order of operations Allow alternative ordering of Block Ack Reordering AFTER A new Block Ack Replay Detection function, but preserve existing ordering option as well for legacy implementations. Add a BlockAck Replay Detection function here Move MPDU Decryption and Integrity Function to here Matthew Fischer, Broadcom

Add Replay Detection within Block Ack Reordering block May 2008 Add Replay Detection within Block Ack Reordering block Add new parameter WinPN_B at recipient, per TID, WinPN_B and WinStart_B operations are as follows: Initialize WinPN_B = SSN from ADDBA WinPN_B = next higher value of PN that has SN portion that matches ADDBA-SSN from current WinPN_B value If RX DATA packet fails decryption Discard If RX PN < WinPN_B If RX PN = WinPN_B + 1 WinPN_B = highest PN in RX Buffer in sequence starting with WinPN_B+1 Note that “false holes” may exist in the sequence when the protected MORE FRAGS bit appears in MPDUs which have a FRAG bit value of less than 0xF “Next in sequence” determination skips these holes Move WinStart_B to equal the SN portion of adjusted WinPN_B Accept the packet If RX PN > WinPN_B + WinSize_B * 16 WinPN_B = WinStart_B = PN – WinSize_B * 16 + 1 If WinPN_B + 1 < RX PN <= WinPN_B + WinSize_B * 16 No change to WinStart_B or WinPN_B If secure BAR passes decryption WinStart_B = WinPN_B = SSN from secure BAR Note that WinSize_B is expressed in terms of MSDUs, but PN values track fragments, hence the factor of 16 Matthew Fischer, Broadcom

May 2008 References Matthew Fischer, Broadcom