Doc.: IEEE 802.11-02/689r0 Submission November 2002 Dan Harkins, Trapeze Networks.Slide 1 Re-authentication when Roaming Dan Harkins.

Slides:



Advertisements
Similar presentations
Doc.: IEEE /1186r0 Submission October 2004 Aboba and HarkinsSlide 1 PEKM (Post-EAP Key Management Protocol) Bernard Aboba, Microsoft Dan Harkins,
Advertisements

Doc.: IEEE /553r0 Submission September 2001 Tim Moore, Bernard Aboba/Microsoft Authenticated Fast Handoff IEEE Tgi Tim Moore Bernard Aboba.
Doc.: IEEE /410 Submission November 2000 Duncan Kitchin, IntelSlide 1 A Network Enrollment Protocol Duncan Kitchin, Intel.
Doc.:IEEE /540ar0 Submission November 2001 Albert Young, Bob OHara Slide 1 A Re-Key Proposal Albert Young 3Com Corporation Santa Clara, CA
Doc.: IEEE /0413r0 Submission March 2009 Dan Harkins, Aruba NetworksSlide 1 A Study Group for Enhanced Security Date: Authors:
Doc.: IEEE /1021r1 Submission September 2008 Luke Qian etc.Slide 1 A Simplified Solution For Critical A-MPDU DoS Issues Date: Authors:
Doc.: IEEE /1021r3 Submission September 2008 Luke Qian etc.Slide 1 A Simplified Solution For Critical A-MPDU DoS Issues Date: Authors:
Doc.: IEEE /1263r0 Submission November 2008 Dan Harkins, Aruba NetworksSlide 1 A Modest Proposal…. Date: Authors:
Doc.: IEEE /087 Submission May, 2000 Steven Gray, NOKIA Jyri Rinnemaa, Jouni Mikkonen Nokia Slide 1.
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec Title: IEEE r Fast BSS Transition – A Study Date Submitted: September 21, 2009 Present.
Submission Page 1 August 2002 doc.: IEEE /503r0 Daryl Kaiser, Cisco Systems Radio Measurement: A Candidate Approach Daryl Kaiser (Cisco Systems)
Doc.: IEEE /080r0A Submission January 2003 Black/Kasslin/Sinivaara, NokiaSlide 1 A Framework for RRM Simon Black, Mika Kasslin, Hasse Sinivaara.
Doc.: IEEE /301R0 Submission May 2002 Terry Cole, AMDSlide 1 A More Efficient Protection Mechanism Terry Cole AMD Fellow +1.
Doc.: IEEE /1012r0 Submission September 2009 Dan Harkins, Aruba NetworksSlide 1 Suite-B Compliance for a Mesh Network Date: Authors:
Doc.: IEEE /252 Submission May 2001 Bernard Aboba, MicrosoftSlide 1 Issues with the 802.1X State Machine IEEE 802.1X Revision PAR Bernard Aboba.
IEEE P802 Handoff ECSG Submission July 2003 Bernard Aboba, Microsoft Detection of Network Attachment (DNA) and Handoff ECSG Bernard Aboba Microsoft July.
Doc.: IEEE /516r0-I Submission September 2002 Robert Moskowitz, ICSALabsSlide 1 RADIUS Client Kickstart Robert Moskowitz, ICSALabs John Vollbrecht,
Submission doc.: IEEE 11-12/0553r0 May 2012 Jarkko Kneckt, NokiaSlide 1 Response Criteria of Probe Request Date: Authors:
Doc.: IEEE /039 Submission January 2001 Haverinen/Edney, NokiaSlide 1 Use of GSM SIM Authentication in IEEE System Submitted to IEEE
Doc.: IEEE /1097r1 Submission Sep 2012 Timo Koskela, Renesas Mobile CorporationSlide 1 Reserve Channel List in ah Date: Authors:
Doc.: IEEE /380r0 Submission May 2002 Duncan Kitchin, IntelSlide WG Assigned Numbers Authority Duncan Kitchin Intel Corporation.
Doc.: IEEE /095r0 Submission January 2003 Dan Harkins, Trapeze Networks.Slide 1 Fast Re-authentication Dan Harkins.
Submission doc.: IEEE /1167r0 August 2011 Hiroki Nakano, Trans New Technology, Inc.Slide 1 Upper Layer Data IE Date: Authors: NameAffiliationsAddressPhone .
Doc.: IEEE /688r0 Submission September 2003 Stephen McCann, Siemens Roke ManorSlide 1 Interworking Update II Stephen McCann, Siemens Roke Manor.
Doc.: IEEE /243r0 Submission March 2002 James Kempf, DoCoMo LabsSlide and IP James Kempf Seamoby WG Co-chair DoCoMo Labs USA
Doc.: IEEE /684R2 Submission November 2002 Martin Lefkowitz, Trapeze NetworksSlide 1 Extended Keymap ID Martin Lefkowitz Trapeze Networks.
Doc.: IEEE /0578r0 Submission 2008 May Jarkko Kneckt, NokiaSlide 1 Forwarding in mesh containing MPs in power save Date: Authors:
Doc.: IEEE /1521r2 Submission January 2012 Marc Emmelmann, FOKUSSlide 1 AP and Network Discovery Enhancements Date: Authors:
Doc.: IEEE /2441r2 Submission SA Teardown Protection for w Date:
Doc.: r0-I Submission July 22, 2003 Paul Lambert, Airgo NetworksSlide 1 Enabling Encryption in Hotspots by Decoupling the Privacy Field from.
Doc.: IEEE /1345r0 Submission November 2013 Jiamin Chen, HuaweiSlide 1 Dynamic Channel Transfer(DCT) Procedure for IEEE aj ( 60GHz New Technique.
Doc.: IEEE /0342r0 SubmissionLiwen Chu Etc.Slide 1 Power Efficient PS Poll Date: Authors: Date: March, 2012.
Doc.: IEEE /0608r2 Submission May 2012 Shoukang Zheng et. al, I2R, SingaporeSlide 1 Low-Power PS-Poll Date: Authors:
Doc.: IEEE /0283r0 Submission March 2009 Dan Harkins, Aruba NetworksSlide 1 Suggested Changes to the Abbreviated Handshake Date: Authors:
Doc.: IEEE / 0052r0 Submission January 2011 Slide 1 Max Nss for SU BF Date: Authors: Sameer Vermani, Qualcomm.
Submission doc.: IEEE ai November 2012 Lei Wang, InterDigital CommunicationsSlide 1 Proposals for the FD Frame Capability, Security and.
Doc.: IEEE /108r0 Submission January 2003 Adrian Stephens, IntelSlide 1 Some proposed motions for HT SG Adrian P Stephens
Doc.: IEEE /1176r0 Submission Sep 2013 Reza Hedayat (Cisco Systems) Slide 1 Some Simulation Scenarios for HEW NameAffiliationPhone Reza HedayatCisco.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential 1 IEEE u Overview Klaas Wierenga TF-Mobility Loughborough, May 7, 2009.
Doc.: IEEE ai Submission Paul Lambert, Marvell TGai Discovery Proposal Author: Abstract Short high-level proposal for discovery techniques.
Doc.: IEEE /0374r0 Submission March 2010 Dan Harkins, Aruba NetworksSlide 1 Clarifying the Behavior of PMK Caching Date: Authors:
Submission doc.: IEEE 11-12/0281r0 March 2012 Jarkko Kneckt, NokiaSlide 1 Recommendations for association Date: Authors:
Submission doc.: IEEE 11-14/0062r0 January 2014 Dan Harkins, Aruba NetworksSlide 1 PMK Caching for FILS Date: Authors:
Doc.: IEEE /684r0 Submission November 2002 Martin Lefkowitz, Trapeze NetworksSlide 1 Extended Keymap ID Martin Lefkowitz Trapeze Networks.
Doc.: IEEE r Submission November 2004 Bob Beach, Symbol TechnologiesSlide 1 Fast Roaming Using Multiple Concurrent Associations Bob.
Submission doc.: IEEE /1034r4 September 2012 Jeongki Kim, LG ElectronicsSlide 1 Enhanced scanning procedure for FILS Date: Authors:
Doc.: IEEE /1306r0 Submission November 2015 Tim Godfrey (EPRI)Slide 1 Use Case for LRLP and Full Function in STA. Date: Authors:
Doc.: IEEE /230r0 Submission Robert Moskowitz, Trusecure/ICSALabsSlide 1 March 2002 Proxied Preauthorized Roaming Robert Moskowitz Trusecure Corporation.
Doc.: IEEE /403r0 Submission July 2001 Albert Young, 3Com, et alSlide 1 Supplementary Functional Requirements for Tgi ESS Networks Submitted to.
Doc.: IEEE /0896r0 SubmissionJae Seung Lee, ETRISlide 1 Probe Request Filtering Criteria Date: July 2012.
Doc.: IEEE /558r0 Submission John Kowalski, Sharp November 2001 Slide 1 Enabling Hybrid Coordinator Mobility John Kowalski Sharp Labs of America.
Doc.: IEEE /1212r0 Submission September 2011 IEEE Slide 1 The Purpose and Justification of WAPI Comparing Apples to Apples, not Apples to.
Doc.: IEEE /1145r1 Submission August WG Slide 1 Mutual Authentication Date: Authors: Slide 1.
Submission doc.: IEEE r1 March 2012 Dan Harkins, Aruba NetworksSlide 1 The Pitfalls of Hacking and Grafting Date: Authors:
Authentication and Upper-Layer Messaging
TSN Architecture Mike Moreton, STMicroelectronics
Jesse Walker and Emily Qi Intel Corporation
Security Properties Straw Polls
doc.: IEEE /454r0 Bob Beach Symbol Technologies
Fast Roaming Compromise Proposal
Roaming timings and PMK lifetime
Fast Roaming Compromise Proposal
Fast Roaming Compromise Proposal
Dan Harkins Trapeze Networks
Roaming timings and PMK lifetime
doc.: IEEE /1072r0 Dan Harkins Trapeze Networks
doc.: IEEE /1072r0 Dan Harkins Trapeze Networks
Beacon Protection Date: Authors: May 2018 January 2018
Thinking About the Site Report
Roaming timings and PMK lifetime
Presentation transcript:

doc.: IEEE /689r0 Submission November 2002 Dan Harkins, Trapeze Networks.Slide 1 Re-authentication when Roaming Dan Harkins

doc.: IEEE /689r0 Submission November 2002 Dan Harkins, Trapeze Networks.Slide 2 Roaming in 2.5 Section describes 2 schemes for roaming: –If the AP supports pre-authentication the STA is expected to pre-authenticate prior to roaming. –If the AP does not support pre-authentication the STA is forced to go through a complete 802.1X authentication.

doc.: IEEE /689r0 Submission November 2002 Dan Harkins, Trapeze Networks.Slide 3 Roaming in 2.5 Section (3): “When a STA (re)associates with an AP without a (recent enough) pre- authentication, the AP has no cryptographic keys configured for the STA. In this case, the AP’s Authenticator will force a full 802.1X authentication.”

doc.: IEEE /689r0 Submission November 2002 Dan Harkins, Trapeze Networks.Slide 4 Roaming in 2.5 Problems with this “either-or” approach: A STA can only pre-authenticate with APs it notices during its MLME-SCAN. Depending on how often MLME-SCAN is done a moderately mobile user may move faster than she can pre-authenticate. Unless there is a sufficient amount of coverage overlap everywhere pre-authentication may not be possible. Pre-authentication necessarily creates more security associations than needed. Could be problematic in a large, mobile environment.

doc.: IEEE /689r0 Submission November 2002 Dan Harkins, Trapeze Networks.Slide 5 A Third Way It is possible for the AP to have the cryptographic keys (namely the PMK) for the STA when it roams. One such context transfer protocol would be a proposal from IEEE , IAPP. There are others (SEAMOBY). Unfortunately, i/D2.5 does not mention any way to take advantage of this!

doc.: IEEE /689r0 Submission November 2002 Dan Harkins, Trapeze Networks.Slide 6 The Third Way The AP announces its support for re- authentication in the RSN Capabilities bitfield in the RSN Information Element AP supports pre-authentication AP and STA support re-authentication Bit 0 Bit 1 Bit 2 Bits =yes 0=no reserved STA supports pairwise keys 1=yes 0=no 1=yes 0=no

doc.: IEEE /689r0 Submission November 2002 Dan Harkins, Trapeze Networks.Slide 7 The Third Way When a STA re-associates with an AP that supports re-authentication and with which it has not pre-authenticated it sends an empty EAPOL key message (with the request bit set) indicating a desire to begin the 4 way handshake. AP retrieves the client’s cryptographic state using the cryptographic context transfer protocol.

doc.: IEEE /689r0 Submission November 2002 Dan Harkins, Trapeze Networks.Slide 8 The Third Way Upon receipt of the PMK the STA shares with the “old AP” the “new AP” begins the 4 way handshake. Security association, including session keys bound to the MAC addresses of the “new AP” and STA, is created. If the 4 way handshake fails the STA must disassociate from the “new AP”.

doc.: IEEE /689r0 Submission November 2002 Dan Harkins, Trapeze Networks.Slide 9 Benefits of Re-Authentication No interoperability impact on existing deployed base. –If the “re-authentication” bit is not set in the RSNE the assumption from (3) stands. –A client that does not support “re-authentication” will merely do a full 802.1X authentication with an AP which does. An addition, not an alternative to “pre- authentication”. Agnostic on the particular cryptographic context transfer protocol.

doc.: IEEE /689r0 Submission November 2002 Dan Harkins, Trapeze Networks.Slide 10 Benefits of Re-Authentication No violation of the single use requirement on the PMK. No security issues: –Proof of possession of the PMK authenticates the STA to the AP under the identity retrieved from the cryptographic context transfer protocol. –Proof of possession of the PMK authenticates the AP to the STA as part of a trusted system. –All of the security requirements are on the cryptographic context transfer protocol and the devices that speak it to make up the trusted system.

doc.: IEEE /689r0 Submission November 2002 Dan Harkins, Trapeze Networks.Slide 11 An Idea, Not A Motion Add support for “re-authentication” to 2.5: Description of “re-authentication” as a 3rd scheme in New section to define “re- authentication” Modify the Informative analysis of Modify the RSNE in section This would make a good motion, hint, hint :-)