Doc.: IEEE 802.11-07/0508r0 Submission May 2007 Matthew Gast, Trapeze NetworksSlide 1 EAP Method Requirements for Emergency Services Notice: This document.

Slides:



Advertisements
Similar presentations
Doc.: IEEE /0256r0 Submission February 2007 A. Centonza, D. StephensonSlide 1 Limitations on the Use of EBR Notice: This document has been prepared.
Advertisements

Doc.: IEEE /1096r0 Submission November 2005 Mike Moreton, STMicroelectronicsSlide 1 Emergency Call Support Notice: This document has been prepared.
Doc.: IEEE /0270r2 Submission March 2007 Matthew Gast, Dave StephensonSlide 1 Emergency Call Setup Procedure Notice: This document has been prepared.
Doc.: IEEE /0866r1 Submission September 2005 Michael Montemurro, Chantry NetworksSlide 1 Mobility Domain Definition and Description Notice: This.
Doc.: IEEE /0270r0 Submission March 2007 Matthew Gast, Dave StephensonSlide 1 Emergency Call Setup Procedure Notice: This document has been prepared.
Doc.: IEEE /2032r0 Submission July 2007 Stephen McCann, Nokia Siemens NetworksSlide 1 IEEE 802 ES Ad Hoc Notice: This document has been prepared.
Doc.: IEEE /90r0 Submission Nov., 2012 NICTSlide b NICT Proposal IEEE P Wireless RANs Date: Authors: Notice: This document.
Doc.: IEEE /0930r0 Submission July 2006 Nancy Cam-Winget, Cisco Slide 1 Editor Updates since Jacksonville Notice: This document has been prepared.
Doc.: IEEE /1867r1 Submission November r Security TeamSlide 1 TGr Security Requirements Notice: This document has been prepared to.
Doc.: IEEE /0094r0 Submission November 2009 Steve Shellhammer, QualcommSlide 1 Comments on PAR Notice: This document has been prepared.
Doc.: IEEE /2237r0 Submission July 2007 Emily Qi, Intel CorporationSlide 1 TGv Redline D1.0 Insert and Deletion Notice: This document has been.
Doc.: IEEE /0072r0 Submission January 2009 Slide 1 Proxy ARP Issue for Direct Link Setup Notice: This document has been prepared to assist IEEE.
Doc.: IEEE /0448r0 Submission March, 2007 Srinivas SreemanthulaSlide 1 Joiint TGU : Emergency Identifiers Notice: This document has been.
Doc.: IEEE /1212r0 Submission TGT and MEF Liaison Notice: This document has been prepared to assist IEEE It is offered as a basis for.
Doc.: IEEE /86r2 Submission March, 2010 Gabor BajkoSlide 1 Location Proxy Notice: This document has been prepared to assist IEEE It is.
Doc.: IEEE /0667r0 Submission July 2005 Mike Moreton, STMicroelectronicsSlide 1 Multiple Networks Notice: This document has been prepared to assist.
Doc.: IEEE /0028r0 Submission January 2005 Eleanor Hepworth, Siemens Roke ManorSlide 1 Definitions and Terminology Notice: This document has been.
Doc.: IEEE /0197r0 Submission March 2005 Nancy Cam-Winget et alSlide 1 TAP & JIT Merge Process Notice: This document has been prepared to assist.
Doc.: IEEE /0460r1 Submission March 2006 Fujio Watanabe, DoCoMo USA LabsSlide 1 Japanese Emergency Call Regulation Notice: This document has been.
Doc.: IEEE /1006r0 Submission September 2005 Andrew McDonald, Siemens Roke ManorSlide 1 Initial Network Selection Concept Notice: This document.
Doc.: IEEE /0652r1 Submission May 2007 Emily Qi, Intel CorporationSlide 1 TGv Redline D0.12 Insert and Deletion Notice: This document has been.
[ Interim Meetings 2006] Date: Authors: July 2005
TGu/TGv Joint Session Date: Authors: July 2005 July 2005
London TGu Motions Authors: January 2007 Date: Month Year
LB73 Noise and Location Categories
LB73 Noise and Location Categories
Waveform Generator Source Code
TGu Closing Report Date: Authors: November 2005
March 2014 Election Results
TGp Closing Report Date: Authors: July 2007 Month Year
Attendance and Documentation for the March 2007 Plenary
[ Policies and Procedure Summary]
3GPP liaison report May 2006 May 2006 Date: Authors:
Motion to accept Draft p 2.0
Protected SSIDs Date: Authors: March 2005 March 2005
3GPP liaison report July 2006
[place presentation subject title text here]
(Presentation name) For (Name of group) (Presenter’s name,title)
Pre-Authentication Authentication of Management Frames
Emergency Call Motion Date: Authors: January 2006
On Coexistence Mechanisms
TGu-changes-from-d0-02-to-d0-03
Contribution on Location Privacy
On Coexistence Mechanisms
Reflector Tutorial Date: Authors: July 2006 Month Year
TGv Redline D0.07 Insert and Deletion
TGv Redline D0.06 Insert and Deletion
Experimental DTV Sensor
IEEE P Wireless RANs Date:
TGu-changes-from-d0-01-to-d0-02
LB73 Noise and Location Categories
TGy draft 2.0 with changebars from draft 1.0
TGv Redline D0.10 Insert and Deletion
WAPI Position Paper Sept 2005 Sept 2005 IEEE WG
Redline of draft P802.11w D2.2 Date: Authors:
TGu-changes-from-d0-02-to-d0-03
[ Policies and Procedure Summary]
3GPP2 Liaison Report Date: Authors: May 2006 May 2006
May 2005 CAPWAP AHC Closing Report
Draft P802.11s D1.03 WordConversion
Questions to the Contention-based Protocol (CBP) Study Group
Motion to go to Letter Ballot
EC Motions – July 2005 Plenary
TGu-changes-from-d0-04-to-d0-05
EAP Method Requirements for Emergency Services
Transition Nowhere Date: Authors: Sept 2005 Sept 2005
TGu-changes-from-d0-03-to-d0-04
TGu Motions Date: Authors: May 2006 May 2006
TGu Draft Revision Procedure
WAPI Position Paper Sept 2005 Sept 2005 IEEE WG
Presentation transcript:

doc.: IEEE /0508r0 Submission May 2007 Matthew Gast, Trapeze NetworksSlide 1 EAP Method Requirements for Emergency Services Notice: This document has been prepared to assist IEEE It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. Release: The contributor grants a free, irrevocable license to the IEEE to incorporate material contained in this contribution, and any modifications thereof, in the creation of an IEEE Standards publication; to copyright in the IEEE’s name any IEEE Standards publication even though it may include portions of this contribution; and at the IEEE’s sole discretion to permit others to reproduce in whole or in part the resulting IEEE Standards publication. The contributor also acknowledges and accepts that this contribution may be made public by IEEE Patent Policy and Procedures: The contributor is familiar with the IEEE 802 Patent Policy and Procedures, including the statement "IEEE standards may include the known use of patent(s), including patent applications, provided the IEEE receives assurance from the patent holder or applicant with respect to patents essential for compliance with both mandatory and optional portions of the standard." Early disclosure to the Working Group of patent information that might be relevant to the standard is essential to reduce the possibility for delays in the development process and increase the likelihood that the draft publication will be approved for publication. Please notify the Chair as early as possible, in written or electronic form, if patented technology (or technology under patent application) might be incorporated into a draft standard being developed within the IEEE Working Group. If you have questions, contact the IEEE Patent Committee Administrator at. ieee802.org/guides/bylaws/sb-bylaws.pdf Date: Authors:

doc.: IEEE /0508r0 Submission May 2007 Matthew Gast, Trapeze NetworksSlide 2 Abstract This presentation discusses requirements for the EAP method for use with emergency calls over networks, and is intended to serve as a basis for asking the IETF to recommend an EAP method for such a deployment scenario.

doc.: IEEE /0508r0 Submission May 2007 Matthew Gast, Trapeze NetworksSlide 3 Types of Emergency Calls in u Unencrypted calls on networks using the Emergency Services Only (ESO) bit for signaling –APs advertising the ESO bit will accept any non-AP STA without L2 security –Network responsible for enforcing access control to only VoIP services with VLANs, ACLs, etc. Encrypted calls using public credentials –Network is shared with other uses –Default Emergency Services NAI gives non-AP STAs a user name to send in 802.1X/EAPOL to get access to emergency services –Key exchange for L2 data security requires a PMK, which must be exchanged by either PSK or EAP method Regulatory requirements may require use of link encryption, which forces use of the public credential case

doc.: IEEE /0508r0 Submission May 2007 Matthew Gast, Trapeze NetworksSlide 4 Why not just use a PSK? The PSK must be widely known –It should be the same for every network in the world, so that a phone can be used in any network for emergency services –The only practical way to get this to happen is to put the PSK into the standard, where everybody can read it PSKs can have poor DoS resistance

doc.: IEEE /0508r0 Submission May 2007 Matthew Gast, Trapeze NetworksSlide 5 EAP Issues with Emergency Calls Negotiating compatible method may take time –This is a problem for TGu to solve Existing EAP methods were designed for closed networks –OK to have pre-configured trust relationships, and important to get cryptography right May depend on reachability of AS –Should be an optional implementation choice for AP vendor to do something simple

doc.: IEEE /0508r0 Submission May 2007 Matthew Gast, Trapeze NetworksSlide 6 Requirement #1: No Pre-configured Trust Relationship Every network that uses public credentials for emergency services needs to identify itself –Credentials (PSK or certificate) should not be published –PSK has scaling problems and potential security issues –Implementations should not require multiple certificate chains to validate trust because many devices will have small storage (e.g. phones); single certificate may be challenging Anonymous cryptography is acceptable, since the network will need to manage access rights as part of allowing session establishment

doc.: IEEE /0508r0 Submission May 2007 Matthew Gast, Trapeze NetworksSlide 7 Requirement #2: “Small” Number of Messages Emergency calls are a lower security bar –Users are anonymous at L2 in this scenario – user accounts not required –Acceptable to eliminate some crypto features (e.g. perfect forward secrecy) to reduce message count and handshake time –Implementation of L2 security within AP should be possible; some networks may look up access rights via AS Each round-trip message adds latency –Wireless latency is small, AP-to-AS latency can be larger depending on deployment