Doc.: IEEE 802.11-11/0792r0 Submission May 2011 IEEE 802.11 WGSlide 1 IEEE 802.11i is Secure Date: 2010-05-11 Authors:

Slides:



Advertisements
Similar presentations
Doc.: IEEE /0413r0 Submission March 2009 Dan Harkins, Aruba NetworksSlide 1 A Study Group for Enhanced Security Date: Authors:
Advertisements

Doc.: IEEE /0006r0 Submission March 2005 Steve Shellhammer, Intel CorporationSlide 1 What is a CA document? Notice: This document has been prepared.
Doc.: IEEE /087 Submission May, 2000 Steven Gray, NOKIA Jyri Rinnemaa, Jouni Mikkonen Nokia Slide 1.
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec Title: IEEE r Fast BSS Transition – A Study Date Submitted: September 21, 2009 Present.
Doc.: IEEE /0095r0 Submission Jan 2012 Konstantinos Georgantas, HIITSlide 1 HIP DEX for Fast Initial Authentication in Date:
Doc.: IEEE /0559r0 Submission May 2008 Terry L Cole, AMDSlide 1 WG Technical Editors Opening Report (May) Date: Authors:
Doc.: VC1_ _EC_P&P_Update-opening_r0.ppt Submission EC Update on LMSC Governance Date: November 16 th, 2009 Author: Matthew Sherman 1 st Vice Chair,
The IEEE and International Standards Steve Mills July 2006 IEEE 802 Plenary.
Doc.: IEEE /081r0 Submission January 2001 Shoemake, Texas InstrumentsSlide 1 Project: IEEE P Working Group for Wireless Personal Area Networks.
Starting Planning for the 2010 Policy Key Issues Notes for the TAC Executive Committee April 8, 2009 Phil Hattis, AIAA VP for Public Policy.
Doc.: IEEE /0836r2 Submission July 2008 Dan Harkins, Aruba NetworksSlide 1 Changes to SAE State Machine Date: Authors:
Doc.: IEEE /0908r1 Submission July 2013 Andrew Myles, CiscoSlide 1 IEEE 802 JTC1 SC closing report (July 13) Date: Authors:
Doc.: IEEE /0424r0 Submission March 2014 Osama Aboul-Magd, Huawei TechnologiesSlide 1 HEW SG PAR and CSD Comments and Resolutions Date:
Doc.: IEEE tvws Submission September 2009 Stanislav Filin et al, NICTSlide 1 Comments to WS coexistence draft PAR Notice: This document.
Doc.: 18-11/58r0 Submission July 2011 John Notor, Notor ResearchSlide 1 Summary of ITU-R Documents Notice: This document has been prepared to assist IEEE.
Doc.: IEEE /095r0 Submission January 2003 Dan Harkins, Trapeze Networks.Slide 1 Fast Re-authentication Dan Harkins.
Doc.: IEEE wng0 Submission November, 2013 Pat Kinney, Kinney ConsultingSlide 1 Project: IEEE P Working Group for Wireless Personal.
Doc.: IEEE /1007r0 Submission September 2005 Fred Haisch, Proxim WirelessSlide 1 Alternative Lock-up Solution Notice: This document has been prepared.
Doc.: IEEE /1125r0 Submission September 2010 Marc Emmelmann, Fraunhofer FOKUSSlide 1 How does the (new) Fast Initial Link Set- Up PAR address.
Doc.: IEEE /0756r0 Submission May 2011 Robert Moskowitz, VerizonSlide 1 IP Address Assignment in FIA Date: Authors: NameCompanyAddressPhone .
Doc.: IEEE /0495r1 Submission May 2009 Bruce Kraemer, MarvellSlide 1 +1 (321) Marvell Lane, Santa Clara, CA, Name Company.
Doc.: IEEE /0792r1 Submission May 2011 IEEE WGSlide 1 IEEE i is Secure Date: Authors:
Doc.: IEEE /1205r0 Submission Sept 2013 Andrew Myles, CiscoSlide 1 IEEE 802 JTC1 SC closing report (Sept 13) Date: Authors:
Doc.: IEEE /0495r3 Submission May 2009 Bruce Kraemer, MarvellSlide 1 +1 (321) Marvell Lane, Santa Clara, CA, Name Company.
Doc.: IEEE /0674r0 Submission June 2009 Bruce Kraemer, Marvell; Adrian Stephens, Intel Corporation Slide 1 P802.11n report to EC on request for.
Doc.: IEEE /0021r2 Submission July 2008 Jing Zhu, Intel CorporationSlide 1 IEEE 802 Air-Interface Support for Co- Located Coexistence Notice:
Doc.: IEEE /0877r0 Submission June WG Slide 1 TGs response to CN NB comments Date: Authors:
Doc.: IEEE /1345r0 Submission November 2013 Jiamin Chen, HuaweiSlide 1 Dynamic Channel Transfer(DCT) Procedure for IEEE aj ( 60GHz New Technique.
Doc.: IEEE /0552r1 Submission May 2014 Slide 1 IEEE WG responses to SC6 on FDIS ballots on aa/ad/ae 13 May 2014 Authors: NameCompanyPhone .
Doc.: Submission1 IEEE Motions in November Plenary DCN: Title: Request for EC Conditional Approval Date Submitted:
Doc.: IEEE /0035r0 Submission Jan 2005 Jon Edney InTalk2kSlide 1 Retiring the DS – a proposal Notice: This document has been prepared to assist.
Doc.: IEEE /0983r0 Submission September 2008 Carl Kain, Noblis/USDOTSlide 1 Response to Various Clause 17 Comments LB 125 Date: Authors:
Doc.: IEEE /0564r0 Submission May 2014 Marc Emmelmann, SelfSlide 1 Results of LB 201 on TGai D2.0 Date: Authors:
Doc.: IEEE /0782r0 Submission July 2010 Daewon Lee, LG ElectronicsSlide 1 STA MU-MIMO Group Management Signaling Design Date: Authors:
Doc.: IEEE /0440r1 Submission July 2013 Jiamin Chen, HuaweiSlide 1 Dynamic Channel Transfer(DCT) procedure for IEEE aj ( 60GHz ) Date:
March 2015 Doc.: IEEE NNN Submission Karen Randall, Randall Consulting Slide 1 IEEE 802 Response to comments on IEEE 802.1Q-2014 and IEEE 802.1Xbx-2014.
Doc.: IEEE /2913r0 Submission November 2007 Kapil Sood, Intel CorporationSlide 1 Protecting Associations Attacks – Some Considerations Date:
Doc.: IEEE /1454r7 Submission March 2013 IEEE 802 JTC1 Standing Committee Proposal for SC6 contribution process 20 March 2013 Haasz et al, IEEESlide.
Doc.: IEEE /1341r0 Submission September 2011 Andrew Myles, CiscoSlide 1 JTC1 SC September Closing Report 22 Sept 2011 Authors: Meeting.
Submission February 2014 Slide 1 IEEE 802 Response to FDIS comments on IEEE 802.1AR 20 March 2014 Authors: NameCompanyPhone .
Doc.: IEEE /1068r0 Submission Sept 08 Andrew Myles (Cisco)Slide 1 Discussion of issues related to the submission of D13.0 to RevCom.
Doc.: IEEE /1063r0 Submission Nov 2005 Jon Edney, NokiaSlide 1 The Lock-out Problem - an Analysis Notice: This document has been prepared to assist.
Doc.: IEEE /0795r2 Submission July 2014 The China NB contributed a variation on the “usual comment” on IEEE China NB comment on
Doc.: IEEE /0315r4 Submission July 2009 Dan Harkins, Aruba NetworksSlide 1 Enhanced Security Date: Authors:
Doc.: IEEE /0147r0 Submission January 2012 Rolf de Vegt (Qualcomm)) Slide ai Spec Development Process Update Proposal Date:
September 2004 doc.: IEEE Submission Slide 1 Jack Pardee, INNOV8RS, LLC Project: IEEE Working Group for Wireless Personal Area Networks.
SubmissionJoe Kwak, InterDigital1 Simplified 11k Security Joe Kwak InterDigital Communications Corporation doc: IEEE /552r0May 2004.
Doc.: IEEE k Submission July 2004 Bernard Aboba, MicrosoftSlide 1 IEEE k Security: A Conceptual Model Bernard Aboba Microsoft.
Doc.: IEEE /1212r0 Submission September 2011 IEEE Slide 1 The Purpose and Justification of WAPI Comparing Apples to Apples, not Apples to.
Doc.: IEEE /1145r1 Submission August WG Slide 1 Mutual Authentication Date: Authors: Slide 1.
Doc.: IEEE /0452r0 Submission Mar 2016 Myles & Ecclesine, CiscoSlide 1 Recommendation on disposal of liaison from ISO/IEC JTC1/SC25/WG3 relating.
Doc.: IEEE /1454r0 Submission Jan 2013 IEEE 802 JTC1 Standing Committee Proposal for SC6 contribution process 15 January 2013 Haasz et al, IEEESlide.
Response to Official Comments
IEEE 802 JTC1 Standing Committee Proposal for SC6 contribution process
IEEE 802 JTC1 Standing Committee Proposal for SC6 contribution process
Working Group November Plenary EC Closing Motion
Working Group November Plenary EC Closing Motion
IEEE 802 JTC1 Standing Committee Proposal for SC6 contribution process
Mutual Authentication
Procedural review of initial WG ballot on P802.1CF
IEEE 802 JTC1 Standing Committee Proposal for SC6 contribution process
20th January 2011 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Comprehensive rebuttal of proposed.
Mutual Authentication
July 2010 doc.: IEEE /0xxxr0 Proposed liaison presentation to SC6 in relation to liaisons between IEEE WG and ISO/IEC JTC1/SC 9 May 2011.
July 2010 doc.: IEEE /0xxxr0 Proposed liaison presentation to SC6 in relation to liaisons between IEEE WG and ISO/IEC JTC1/SC 9 May 2011.
Motions for 2007/05 Date: Authors: May 2007 Month Year
Response to ISO/IEC JTC1/SC6
Project: IEEE Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Response to the No Comments Involving Time To Market.
IEEE 802 JTC1 Standing Committee Proposal for SC6 contribution process
Response to Official Comments
Presentation transcript:

doc.: IEEE /0792r0 Submission May 2011 IEEE WGSlide 1 IEEE i is Secure Date: Authors:

doc.: IEEE /0792r0 Submission May 2011 IEEE WGSlide 2 Abstract This document outlines the IEEE 802 response to ISO/JTC1/SC6 on the WAPI NP process

doc.: IEEE /0792r0 Submission May 2011 IEEE WGSlide 3 IEEE 802 provided input into the WAPI NP proposal voting and resolution process D ONDJFMAMJJASONDJFMAMJ Oct 09: N14123 WAPI NP proposal Feb 10: N14228 WAPI NP voting results Oct 10: N14436 Initial WAPI NP disposition Mar 11: N14620 Revised WAPI NP disposition Dec 09: N14142 IEEE 802 comments on WAPI NP proposal Jan 11: N14551 IEEE 802 comments on WAPI NP disposition J2011 Timeline of IEEE 802 participation

doc.: IEEE /0792r0 Submission Unfortunately, that input was ignored and is now being rejected May 2011 IEEE WGSlide 4 D ONDJFMAMJJASONDJFMAMJ Oct 09: N14123 Justification of WAPI NP based on assertion that i is insecure Feb 10: N14228 Apparently IEEE 802 input was not considered in WAPI NP vote Oct 10: N14436 IEEE 802 input is ignored, incorrect claims about i are repeated Mar 11: N14620 IEEE 802 input is dismissed on the basis that it is too late! Dec 09: N14142 IEEE 802 rebuts all assertions regarding the claim of i insecurity Jan 11: N14551 IEEE 802 again rebuts all assertions regarding the claim o f i insecurity J2011 Timeline of IEEE 802 participation

doc.: IEEE /0792r0 Submission May 2011 IEEE WGSlide 5 N14123: WAPI NP justification entirely based on assertion that i is insecure Single assertion to justify WAPI NP: –“It is a well known fact that current WLAN international standards contain serious security loopholes which need to be dealt with by enhanced security mechanisms.” Evidence to support this assertion: –“Can your neighbors router make yours sick?”– Hu, et al, 2008 –“A Wi-Fi virus outbreak? Researchers say it’s possible”– article in Network World, 2008 –“Practical Attacks Against WEP and WPA”– Beck and Tews, 2008 –“A Practical Message Falsification Attack on WPA”– Ohigashi and Morii, 2009

doc.: IEEE /0792r0 Submission N14142: IEEE 802 rebuts all claims of i insecurity “Can your neighbor’s router make yours sick?” –Assumes either no security, or WEP, on an AP. WEP has been deprecated in favor of i! Says nothing about i. “A Wi-Fi Virus Outbreak? Researchers say it’s possible” –Refers to paper by Hu et al– i.e. no security or WEP, not i “Practical Attacks against WEP and WPA” –WPA attack is against TKIP and its MIC, Michael, which is not a one-way function, and whose security is not assumed strong. TKIP was designed in 2003 with a 5 year expectation of validity. Paper says nothing about mandatory aspects of i (i.e. it addresses WPA not WPA2). “A Practical Message Falsification Attack Against WPA” –An improvement on paper above-- it’s WPA, no mention of WPA2 May 2011 IEEE WGSlide 6

doc.: IEEE /0792r0 Submission N14228: Significant Lack of Consideration of IEEE 802 rebuttal during WAPI NP vote US NB –Two comments made challenging the statement that i is insecure (apparent consideration of IEEE 802 rebuttal). –Seven other substantive comments submitted. UK NB –Comments alluding to technical concerns. –Mostly focused on “standalone security issue”. No other NB submitted comments –Silence implies the rebuttal was not considered. May 2011 IEEE WGSlide 7

doc.: IEEE /0792r0 Submission N14436: Repeats, and extends, invalid claims regarding i security IEEE 802 rebuttal of previous claims are completely ignored. Asserts that “Security loopholes in the current IS (ISO/IEC ) have been reported in the security literature”. Additional, new, unsubstantiated claims –WAPI can protect against fake STA/AP attacks and i cannot. –In N14123, N14399, N14402 and N14410 all “comprehensively address weaknesses in existing network security”. –Specific security problems were asserted during i fast track ballot in May 2011 IEEE WGSlide 8

doc.: IEEE /0792r0 Submission N14551: IEEE 802 Rebuts New Claims of i insecurity Repetition of N14123 –Already addressed by N14142! Unfortunately N14142 was ignored. N14410 refers to IEEE Security Issues: A Survey –This notes that security was not designed into IEEE , says nothing about IEEE (or ISO/IEC )! N14399, N14402 and N14410 make claims on lack of mutual authentication between STA, AP and AS –RFC4017-compliant EAP methods perform mutual authentication, the AP/AS distinction is logical and in many deployments does not apply, the 4-way Handshake confirms AS has disclosed PMK to AP and provides implicit authentication. Claims made during Fast Track Balloting of i –Same sort of non-mutual authentication assertions. May 2011 IEEE WGSlide 9

doc.: IEEE /0792r0 Submission N14620: IEEE 802 Objections and Rebuttal of invalid claims of insecurity dismissed After ignoring comments, they are dismissed on the basis that the comment disposition is no longer concerned with the WAPI NP proposal! –“This comment is focusing on the Justification of ISO/IEC 20011, but it should be noted that the NP ballot has passed; the main comment and contribution in this state should be focused and changed to the editing and commenting of WD text.” Comments are ignored for an extended period of time and then dismissed as invalid because they are made too late! –This improper behavior is an insult to IEEE 802. May 2011 IEEE WGSlide 10

doc.: IEEE /0792r0 Submission IEEE 802’s Current View of the Process is Best Summarized in Conclusion of N14551 IEEE 802 respectfully requests consideration: –… the fundamental justification for a WAPI NP in SC6 is based on the assertion that there are security loopholes or flaws in mandatory security components included in (and its amendments). However, no valid or credible evidence has been provided to support this assertion. The reality is that mandatory security components included have no known “security loopholes”. This statement is practically supported by the use of in millions of systems worldwide, in high security applications, by governments, financial institutions, telecommunications providers, enterprises and consumers. IEEE 802 requests SC6 do not consider any assertions that mandatory security components included in (and its amendments) are insecure when deciding whether to authorize the WAPI NP proposal. Alternatively, IEEE 802 invites any SC6 NB to provide valid and credible evidence to the WG of “serious security loopholes”. May 2011 IEEE WGSlide 11

doc.: IEEE /0792r0 Submission IEEE 802 Requests SC6 to Undertake Further Action Remove all existing, and unsubstantiated allegations regarding the security of i from official SC6 documents –Particularly the WAPI NP proposal and all associated comment dispositions. Provide credible evidence of security issues with mandatory features of i –Stop accepting unsubstantiated assertions regarding i security. Halt any new project activity whose justification relies on invalid assertions of security issues with i May 2011 IEEE WGSlide 12

doc.: IEEE /0792r0 Submission May 2011 IEEE WGSlide 13 References