Doc.: IEEE 802.11-08/0755r1 Submission March 2008 Luke Qian etc, Cisco Systems, IncSlide 1 Review of 802.11n A-MPDU DoS Issues – Progress and Status Authors:

Slides:



Advertisements
Similar presentations
Doc.: IEEE /309r0 Submission 2/8/2014 Michael Livshitz, MetalinkSlide 1 Issues With Off-channel TDLS Date: Authors:
Advertisements

Doc.: IEEE /272a Submission June 2001 S. Choi, Philips Research Slide 1 Problems with IEEE (e) NAV Operation and ONAV Proposal Javier del.
Doc.: IEEE /0465r0 Submission March 2011 Mark RISON, CSRSlide 1 A-MPDUs with U-APSD Authors:
Doc.: IEEE /0623r1 Submission May 2009 Jon Rosdahl, CSRSlide 1 Proposal for P&P Change - # Date: Authors:
Doc.: IEEE /2163r0 Submission July 2007 Cam-Winget, Smith, WalkerSlide 1 A-MPDU Security Issues Notice: This document has been prepared to assist.
A-MPDU Delimiter Changes
Doc.: IEEE /0703r0 Submission March 2008 Luke Qian etc, Cisco Systems, IncSlide 1 Issues and Solutions to IEEE n A-MPDU Denial of Service.
Doc.:IEEE /540ar0 Submission November 2001 Albert Young, Bob OHara Slide 1 A Re-Key Proposal Albert Young 3Com Corporation Santa Clara, CA
Doc.: IEEE /1021r1 Submission September 2008 Luke Qian etc.Slide 1 A Simplified Solution For Critical A-MPDU DoS Issues Date: Authors:
Doc.: IEEE /0562r0 Submission May 2008 Adrian Stephens, Intel CorporationSlide 1 TGn LB124 – A detect and mitigate solution to the BA DoS problems.
Doc.: IEEE /0833r2 Submission July 2008 Luke Qian etc, CiscoSlide 1 A Proposed Scaled-down Solution to A- MPDU DoS Related Comments in LB 129.
Doc.: IEEE /1021r3 Submission September 2008 Luke Qian etc.Slide 1 A Simplified Solution For Critical A-MPDU DoS Issues Date: Authors:
Doc.: IEEE /0114r1 Submission January 2009 Tony Braskich, MotorolaSlide 1 A vendor specific plan for centralized security Date: Authors:
Doc.: IEEE /0833r3 Submission July 2008 Luke Qian etc, CiscoSlide 1 A Proposed Scaled-down Solution to A- MPDU DoS Related Comments in LB 129.
Doc.: IEEE /0527r0 Submission March 2010 Slide 1 A Periodic 5 MHz Measurement Pilot for Channel Scan Date: Authors:
Doc.: IEEE c Submission March, 2008 Inha Univ.Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)
Doc.: IEEE c Submission March, 2008 Inha Univ.Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)
Doc.: IEEE /0026r0 Submission Dec Luke Qian, Doug Smith Cisco Systems, IncSlide 1 BA Reordering for A-MPDU Notice: This document has been.
Doc.: IEEE /301R0 Submission May 2002 Terry Cole, AMDSlide 1 A More Efficient Protection Mechanism Terry Cole AMD Fellow +1.
Doc.: IEEE /0445r0 Submission May 2009 Adrian Stephens, Intel CorporationSlide TGn Editor Report May 2009 Date: Authors:
Doc.: IEEE /082r0 Submission January 2001 Anuj Batra et al., Texas InstrumentsSlide 1 Project: IEEE P Working Group for Wireless Personal.
Doc.: IEEE /081r0 Submission January 2001 Shoemake, Texas InstrumentsSlide 1 Project: IEEE P Working Group for Wireless Personal Area Networks.
Doc.: IEEE /0836r2 Submission July 2008 Dan Harkins, Aruba NetworksSlide 1 Changes to SAE State Machine Date: Authors:
Doc.:IEEE /0859r0 July 2012 Simone Merlin, Qualcomm Inc Short Block Ack Date: Authors:
Sliding window protocols:  Window: subset of consecutive frames  only frames in window can be sent.
1 November, 2002 doc:.: /480r0 Daniel V. Bailey, Ari Singer, NTRU 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)
Doc.: IEEE /095r0 Submission January 2003 Dan Harkins, Trapeze Networks.Slide 1 Fast Re-authentication Dan Harkins.
Doc.: IEEE /080r1 Submission January 2001 Jie Liang, Texas InstrumentsSlide 1 Jie Liang Texas Instruments Incorporated TI Blvd. Dallas,
Doc.: IEEE /0085r2 Submission July 2011 Gerald Chouinard, CRCSlide Response to Comments received on the proposed a PAR and 5C Date:
Submission doc.: IEEE Comment #1 from WG Comment: In Section 5.2.b two examples of spectrum resource measurements are given: PER and.
Doc.: IEEE /0578r0 Submission 2008 May Jarkko Kneckt, NokiaSlide 1 Forwarding in mesh containing MPs in power save Date: Authors:
Doc.: IEEE /0315r1 Submission Mar 2008 Hart (Cisco Systems) Slide 1 Coexistence Mechanisms at 5 GHz Date: Authors:
Doc.: IEEE /0640r0 Submission Jun Li, Thomson Inc..Slide 1 Requirements and Implementations for Intra-flow/Intra-AC DiffServ Date:
Doc.: IEEE /0877r0 Submission June WG Slide 1 TGs response to CN NB comments Date: Authors:
Doc.: IEEE /1731r0 Submission November 2006 Eldad Perahia (Intel)Slide 1 Green Field Compromise Notice: This document has been prepared to assist.
Doc.: IEEE /0983r0 Submission September 2008 Carl Kain, Noblis/USDOTSlide 1 Response to Various Clause 17 Comments LB 125 Date: Authors:
Doc.: IEEE /0517r0 May 2013 Submission Slide 1 Authors: Combining Process in Virtual CS Mechanism for ah Date: Lv kaiying, ZTE.
Slide 1 doc.: IEEE /1092r0 Submission Simone Merlin, Qualcomm Incorporated September 2010 Slide 1 ACK Protocol and Backoff Procedure for MU-MIMO.
Doc.: IEEE /0018r0 Submission January 2010 Alexander Tolpin, Intel CorporationSlide 1 4 –Way Handshake Synchronization Issue Date:
Network Attacks Mark Shtern.
Submission doc.: IEEE 11-10/0745r2 May 2010 Matthew Fischer, BroadcomSlide 1 MFQ MMPDU MAC Sequence Numbering Date: Authors:
Doc.: IEEE /1434r0 Submission November 2013 Slide 1 CID 1376: NDP BlockAck Bitmap Protection Date: Authors: Alfred Asterjadhi, et.
1 Semester 2 Module 10 Intermediate TCP/IP Yuda college of business James Chen
Doc.: IEEE /0633r0 Submission May 2008 Andrew Myles (Cisco)Slide 1 Discussion of 40Mhz coexistence with 20MHz BSS in secondary channel Date:
A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University.
Doc: IEEE g TG4g Submission Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title:[Summary.
Doc: IEEE g TG4g Submission Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title:[Summary.
Doc.: IEEE /0485r0 Submission May 2004 Jesse Walker and Emily Qi, Intel CorporationSlide 1 Management Protection Jesse Walker and Emily Qi Intel.
SubmissionJoe Kwak, InterDigital1 Simplified 11k Security Joe Kwak InterDigital Communications Corporation doc: IEEE /552r0May 2004.
Doc.:IEEE /0313r1 Submission Robert Stacey (Intel) March 12, 2010 Slide 1 Rekeying Protocol Fix Authors: Date:
Doc.: IEEE /250r0 Submission, Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: IEEE :
Doc.: IEEE /0150r11 Submission July 2015 Ganesh Venkatesan (Intel Corporation)Slide 1 GCR using SYNRA for GLK Date: Authors:
Doc.: IEEE /0615r0 Submission May 2008 Naveen K. Kakani, Nokia IncSlide 1 Multicast Transmission in WLAN Date: Authors:
EDMG BlockAck Retransmission
Link Metric for High Throughput Mesh
Block Ack Security Authors: May 2008 Date: May 2008
Link Metric for High Throughput Mesh
Multicast/Broadcast Communication With Acknowledge
July 2008 doc.: IEEE /0833r0 July 2008 A Proposed Scale-down Solution to A-MPDU DoS Related Comments in LB 129 Date: Authors: Luke.
<month year> <doc.: IEEE doc> September 2010
A Simplified Solution For Critical A-MPDU DoS Issues
Block Ack Security Date: Authors: May 2008 May 2008
Rekeying Protocol Fix Date: Authors: Month Year
A Simplified Solution For Critical A-MPDU DoS Issues
WUR Security Proposal Date: Authors: September 2017
WUR Security Proposal Date: Authors: September 2017
Congestion Control Comments Resolution
Review of n A-MPDU DoS Issues – Progress and Status
Use of More Data Field Date: Authors: Jan 2006 Jan 2006
July 2008 doc.: IEEE /0833r0 July 2008 A Proposed Scale-down Solution to A-MPDU DoS Related Comments in LB 129 Date: Authors: Luke.
Presentation transcript:

doc.: IEEE /0755r1 Submission March 2008 Luke Qian etc, Cisco Systems, IncSlide 1 Review of n A-MPDU DoS Issues – Progress and Status Authors:

doc.: IEEE /0755r1 Submission March 2008 Luke Qian etc, Cisco Systems, IncSlide 2 Objective Provide a brief review of the current status and evolvement of A-MPDU Deny of Service (DoS) Issues for the convenience of further discussion in TGn for an acceptable solution. We also propose an approach to going forward.

doc.: IEEE /0755r1 Submission March 2008 Luke Qian etc, Cisco Systems, IncSlide 3 Status of A-MPDU DoS Issues New types of DoS identified ( /0703r0 ) and acknowledged since LB115 They possess a set of unique characteristics than regular DoS. Can cause performance degradation and network service disruption Will not exacerbate network security A number of comments raised by various commenters during LBs. Numerous proposals have been made by various parties. Remain unaddressed as of LB 129. More work is needed for broadly supported solutions to the issues.

doc.: IEEE /0755r1 Submission March 2008 Luke Qian etc, Cisco Systems, IncSlide 4 The A-MPDU DoS Issues n devices with A-MPDU are exposed to a number of newly identified types of DOS attack associated with the use of Block ACK (BA) and the BA reordering buffer and window. These DOS attacks include: 1) Forged packets with advanced Sequence Numbers (SN) 2) Captured and Replayed packets with modified SN. 3) Captured and Replayed packets with advanced SN without modification. 4) False Block ACK Request (BAR) with advanced SN. 5) False BA to prevent retransmission. For detailed description of these DoS, please see /0703r0

doc.: IEEE /0755r1 Submission March 2008 Luke Qian etc, Cisco Systems, IncSlide 5 Uniqueness of the A-MPDU DoS Issues Hit-and-run type of attack as only one packet is needed to cause the DoS. So an attacker does not need to be at the spot to launch attacks persistently, making it hard to identify or catch the attackers. Significantly long period of DoS for a single attack At the order of tens of seconds. Can cause disassociations or dropped sessions, especially problematic for tcp sessions and voice connections A regular DoS, CTS with excessive NAV setting for example, can only cause a DoS for a period of tens of ms, several order of magnitudes less than that of an A-MPDU DoS, and will have to repeatedly launch the attacks.

doc.: IEEE /0755r1 Submission March 2008 Luke Qian etc, Cisco Systems, IncSlide 6 Proposals for the Issues A number of proposals have been submitted by various parties to address the issues: – /2163r0 A-MPDU Security Issues – /0026r0 BA Reordering for A-MPDU – /0703r0 Issues and Solutions to IEEE n A- MPDU Denial of Service Attacks – /0562r0 A detect and mitigate solution to the BA DoS problems – /0665r0 Block Ack Security None of them reached 75% consensus.

doc.: IEEE /0755r1 Submission March 2008 Luke Qian etc, Cisco Systems, IncSlide 7 Relating Comments and Resolutions in LB 115 (Jan 2008) CID 5899 for example: There is a potential DoS attack identified on the receiving side of the data plane Proposed solution: BA Reordering for A-MPDU" /0026r0, Jan, 2008 Resolution MAC: :17:55Z Reject - as follows: It is accepted that a denial of service (DoS) attack exists in which a forger generates Data MPDUs with an arbitrary SN, forcing a STA to consider validly sent MPDUs to be outside its BA window. The proposed change correctly addresses this attack. However, the same DoS attack also exists as a replay attack. In this case the hacker captures a single encrypted Data MPDU addressed to the victim. It then replays this MPDU as much as it wants to, while changing its SN field. Because the SN field is not part of the AAD, this MPDU continues to pass through the integrity check logic, and will still cause the Block Ack receiver buffer to be flushed. Eventually the problematic MPDU reaches the replay logic, where it is discarded - but not before the damage to the BlockAck buffer has been done. Given that the proposed solution does not fully address the attack on the block ack reordering buffer. Request a more complete solution.

doc.: IEEE /0755r1 Submission March 2008 Luke Qian etc, Cisco Systems, IncSlide 8 Relating Comments and Resolutions in LB 124 (May 2008) Comments: CID 6232, 6233, 6070, 6071 etc Proposed solutions: " Issues and Solutions to IEEE n A-MPDU Denial of Service Attacks, by Cisco, /0703r0, merged with 11-08/0665, 0537 A detect and mitigate solution to the BA DoS problems, by Intel, 11-08/0562r0 "Block Ack Security", 11-08/0665, 11-08/0537, by Broadcomm and Cisso, proposed as a merged solution and was rejected. Resolution "GEN: :35:58Z Reject - While the described DoS attack is a potential vulnerability, the additional complexity and cost of implementation of the jointly developed solutions in 08/0665r4 was considered to be unacceptable. " Request a less complex solution.

doc.: IEEE /0755r1 Submission March 2008 Luke Qian etc, Cisco Systems, IncSlide 9 Relating Comments in LB 129 (June 2008) Comments: CID 8075, 8076 Essentially the same comments carried over from the previous LBs. Proposed approach to going forward: –the resolution in LB 115 requests a more complete solution than /0026r0 –the resolution in LB 124 requests a less complex solution than /0665r0 –The TG seems to suggest finding a solution in the middle ground of the above two in terms of complexity. –To going forward, we propose: prioritize these DoS attacks on their severity, address only those more severer than regular DoS Limit the fix to reducing the damages by DoS to regular DoS attacks. Will work within TGn for an acceptable solution.

doc.: IEEE /0755r1 Submission March 2008 Luke Qian etc, Cisco Systems, IncSlide 10 Prioritizing the A-MPDU DoS Attacks Sort the A-MPDU DoS Types on their ease of launching: 1) Forged packets with advanced Sequence Numbers (SN) easy to launch, can be addressed, e.g., by reversing the order of BA reordering and decryption. 4) False Block ACK Request (BAR) with advanced SN. easy to launch, can be addressed, e.g., by protecting the BAR by wrapping it in an encrypted management frame, an 11w mechanism. 2) Captured and Replayed packets with modified SN. more difficult, can be addressed by encrypting the SN, ( drop this one ?) 3) Captured and Replayed packets with advanced SN without modification. more difficult, less likely to be successful, can be addressed by, e.g., a replay check before BA reordering, ( drop this one?) 5) False BA to prevent retransmission. less likely be successful, not unique since regular ACK can cause similar DoS., (drop this one?)

doc.: IEEE /0755r1 Submission March 2008 Luke Qian etc, Cisco Systems, IncSlide 11 Recommendation Focus solutions on addressing only these two most severer DoS: 1) Forged packets with advanced Sequence Numbers (SN). 4) False Block ACK Request (BAR) with advanced SN. with a simplified version of /0665r0 Block Ack Security or adopt other proposals.