Use of EAPOL-Key messages Month 2002 doc.: IEEE 802.11-04/xxxr0 May 2004 Use of EAPOL-Key messages Tim Moore Microsoft Tim Moore, Microsoft
May 2004 Introduction 802.11i defines how and when key material is available for protection and encryption 802.1X and EAPOL-Key frames 802.11i EAPOL-Key frame is extendable Any IEs can be sent using EAPOL-Key messages and be protected (and encrypted) Non IEs can be sent using EAPOL-Key messages as KDEs. New KDEs can be added (5 are defined by 802.11i) There is already a EAPOL-Key frame format that doesn’t send keys EAPOL-Key frames can also be used without security Tim Moore, Microsoft
Secure channel exists between STA and AP as soon as PTK is available May 2004 Secure channel exists between STA and AP as soon as PTK is available Either add an IE or KDE to an existing EAPOL-Key message Send an EAPOL-Key message with the IE or KDE STA can send an EAPOL-Key message not in respond to the AP by setting the Request bit Tim Moore, Microsoft
Requesting for information May 2004 Requesting for information 802.11d defines an IE to request for IEs Request Information IE Used in probe requests Define a KDE for action frame content Add entry to Table 26 (11i) Limited to action frames 255 octets in size Tim Moore, Microsoft
Examples AP advertising information AP querying for an IE from the STA May 2004 Examples AP advertising information Send an EAPOL-Key message, may or may not be encrypted AP querying for an IE from the STA Send an EAPOL-Key message containing a Request KDE sending the request required Tim Moore, Microsoft
Conclusion Do not need a new encryption mechanism for 802.11k May 2004 Conclusion Do not need a new encryption mechanism for 802.11k Put IEs in an EAPOL-Key frame Define a KDE for sending measurement requests Tim Moore, Microsoft