Doc.: IEEE 802.11-01/147March 2000 TGe SecuritySlide 1 The Status of TGe S Draft Text Jesse Walker Intel Corporation (503) 712-1849.

Slides:



Advertisements
Similar presentations
Doc.: IEEE /398-r0 Submission July 2001 Vic Hayes, Agere SystemsSlide 1 Closing Report of Radio Regulations to Plenary Working Group meetings.
Advertisements

Doc.: IEEE /0006r0 Submission March 2005 Steve Shellhammer, Intel CorporationSlide 1 What is a CA document? Notice: This document has been prepared.
Doc.: IEEE /178 Submission July 2000 A. Prasad, A. Raji Lucent TechnologiesSlide 1 A Proposal for IEEE e Security IEEE Task Group.
Doc.: IEEE /087 Submission May, 2000 Steven Gray, NOKIA Jyri Rinnemaa, Jouni Mikkonen Nokia Slide 1.
Doc.: IEEE /0824r2 Submission July 2010 Carlos Cordeiro, Intel CorporationSlide 1 Response to ITU-R Liaison to IEEE on Multiple Gigabit Wireless.
Doc.: IEEE /1120r2 Submission September 2008 Guido R. Hiertz et al., PhilipsSlide 1 Terminology changes in a nutshell … Date: Authors:
Doc.: IEEE /0953r1 Submission November 2009 Adrian Stephens, Intel CorporationSlide TGmb Editor Report - Nov 2009 Date: Authors:
Doc.: IEEE /1012r0 Submission September 2009 Dan Harkins, Aruba NetworksSlide 1 Suite-B Compliance for a Mesh Network Date: Authors:
Doc.: IEEE /178r0 Submission March 2003 Bob O'Hara, Airespace, Inc. Slide m Meeting Report March 2003.
Doc.: IEEE /464r0 Submission November, 2001 John Barr, MotorolaSlide 1 Project: IEEE Working Group for Wireless Personal Area Networks.
Dynamic Symmetric Key Provisioning Protocol (DSKPP)
Doc.: IEEE /039 Submission January 2001 Haverinen/Edney, NokiaSlide 1 Use of GSM SIM Authentication in IEEE System Submitted to IEEE
Doc.: IEEE /0093r2 Submission NameAffiliationsAddressPhone Hitoshi MORIOKAAllied Telesis R&D Center Tenjin, Chuo-ku, Fukuoka
Doc.: IEEE /0578r0 Submission 2008 May Jarkko Kneckt, NokiaSlide 1 Forwarding in mesh containing MPs in power save Date: Authors:
Doc.: r0-I Submission July 22, 2003 Paul Lambert, Airgo NetworksSlide 1 Enabling Encryption in Hotspots by Decoupling the Privacy Field from.
ZTE corporation doc.: IEEE /1086r2 September 2012 Submission TIM Compression for No Buffered Unicast Traffic Date: Slide 1 Authors:
Doc.: IEEE xxx g Submission March 2011 Kuor Hsin Chang, Bob Mason (Elster Solutions) Project: IEEE P Working Group for Wireless.
Doc.: IEEE g Submission March 2011 Kuor Hsin Chang, Bob Mason (Elster Solutions) Project: IEEE P Working Group for Wireless.
Doc.: IEEE r6 Submission July 2008 Charles Fan,Amy Zhang, HuaweiSlide 1 Authentication and Key Management of MP with multiple radios Date:
Submission doc.: IEEE ai November 2012 Lei Wang, InterDigital CommunicationsSlide 1 Proposals for the FD Frame Capability, Security and.
Doc.: IEEE /630r4a Submission S. Choi, Philips Research January 2002 Slide 1 HC Recovery and Backoff Rules Sunghyun Choi and Javier del Prado.
Doc.: IEEE /037 Submission March 2000 Duncan Kitchin, Jesse Walker, Intel NIDSlide 1 Proposal for Enhanced Encryption Duncan Kitchin Jesse Walker.
Doc.: IEEE /0032r1 Submission January 2007 Donghee Shim et al, LG Electronics, Inc.Slide 1 Comments resolutions: Emergency call support in 11u.
Doc.: IEEE /02r0 Submission January 2013 Ranga Reddy, SelfSlide 1 January 2013 TGa Review IEEE P Wireless RANs Date: Authors:
March 2006 CAPWAP Protocol Specification Update March 2006
Doc.: IEEE Submission September 16, 2004 Poor & Struik / Ember & CerticomSlide 1 Project: IEEE P Working Group for Wireless Personal.
Doc.: IEEE /296r1 SubmissionMitch Buchman May 2001 Slide 1 TGi Draft 1Clause Comments IEEE P802.11E Security/D1.0 Letter Ballot# 25.
Doc.: IEEE /0281r1 Submission James D. Allen (Appairent Technologies, Inc.) Project: IEEE P Working Group for Wireless Personal Area Networks.
Doc.: IEEE /494r0 Submission July 2001 Michael Fischer, Intersil (TGe Editor)Slide 1 Provisional Tge Ballot Comment Resolutions from the May,
Doc.: IEEE /054r0 Submission January 2003 Dr. John R. Barr, MotorolaSlide 1 Project: IEEE Working Group for Wireless Personal Area Networks.
Doc.: IEEE /0308r0 Submission March 2005 J. Walker, Intel Corporation, D. Stanley, Agere SystemsSlide 1 March 2005 ADS Closing Report Notice:
21-07-xxxx IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: Addressing Comment #2142 Date Submitted: March, 18, 2008 Presented.
Doc.: IEEE /0467r1 Submission May 2005 Richard Paine, BoeingSlide 1 11k LB73 Security Resolutions Notice: This document has been prepared to assist.
1 IEEE MEDIA INDEPENDENT HANDOVER DCN: sec Title: ERP proposal Date Submitted: October 13, 2011 Authors or Source(s): Fernando Bernal-Hidalgo,
Doc.: IEEE /034r0 Submission January 2002 Matthew B. Shoemake, TGg ChairpersonSlide 1 TGg Report to the IEEE Working Group Matthew B. Shoemake.
Doc.: IEEE /2179r0 Submission July 2007 Steve Emeott, MotorolaSlide 1 Summary of Updates to MSA Overview and MKD Functionality Text Date:
Proposed solutions to comments on section 7
January 2005 doc.: IEEE b January 2006
Proposed solutions to comments on section 7
doc.: IEEE xxx Bob Beach Symbol Technologies
doc.: IEEE <doc#>
Discussion on CID2199 Date: Authors: Jan 2014 Name Company
Mesh Frame Formats Date: Authors: July 2007 March 2007
Summary of Unresolved General Comments for 2/14 TGs Telecon
Submission Title: [Comment Resolutions for #345, #347, #348, and #349]
Proposed PRF Text Changes
Security for Measurement Requests and Information
Security for Measurement Requests and Information
Overview of Changes to Key Holder Frame Formats
doc.: IEEE /454r0 Bob Beach Symbol Technologies
RA-OLSR Comment Resolution
Discussion on CID2199 Date: Authors: Jan 2014 Name Company
Responses to Clause 5 Comments
P802.11p Recent Changes Date: Authors: July 2005 Month Year
Submission Title: [Comment Resolutions for #345, #347, #348, and #349]
Suggested comment resolution on Power save clause
Submission Title: [WG-TG3 Opening Report Mar02]
RA-OLSR Comment Resolution
Clause 7 Comment Resolutions
TGi Draft 1 Clause – 8.5 Comments
TGn PHY Ad Hoc Submission on Selected Comments
Comment Resolution Actions
doc.: IEEE <doc# >
doc.: IEEE <doc# >
Mesh Frame Formats Date: Authors: July 2007 March 2007
draft-ietf-dtn-bpsec-06
TGi Draft 1 Clause – 8.5 Comments
RA-OLSR Comment Resolution
Report on Date: Authors: May 2019 July 2013
Comment Resolution Motions
Presentation transcript:

doc.: IEEE /147March 2000 TGe SecuritySlide 1 The Status of TGe S Draft Text Jesse Walker Intel Corporation (503)

doc.: IEEE /147March 2000 TGe SecuritySlide 2 Agenda Introduction and Goals Major Revisions Open Issues Summary

doc.: IEEE /147March 2000 TGe SecuritySlide 3 Introduction and Goals Review contents of doc.: IEEE /018r3 Review changes Review open problems Goals: Help everyone understand what the document says Solicit comments to improve text and close remaining issues Identify any further changes needed before initiating TG ballot

doc.: IEEE /147March 2000 TGe SecuritySlide 4 Agenda Introduction and Goals Major Revisions Open Issues Summary

doc.: IEEE /147March 2000 TGe SecuritySlide 5 Changes from r2 to r3 Sought to resolve comments Figures finally completed and brought up to date

doc.: IEEE /147March 2000 TGe SecuritySlide 6 Comment Resolution (1) Comment: Clearer separation of crypto and key management wanted –Resolution: Clause 8 reorganized now describes Upper Layer authentication 8.2 renumbered to permit WEP2 and AES to be moved into 8.2 as and Description of crypto algorithm negotiation written as 8.2.4

doc.: IEEE /147March 2000 TGe SecuritySlide 7 Comment Resolution (2) Comment: Negotiation steps unclear and inconsistent –Resolution: Clause rewritten, and a new clause written describes how ESN bit of Capability Information used to control when negotiation for Enhanced Security permitted gives rules for when an ESN-capable system rolls back to legacy authentication provides rules for negotiating Upper Layer Authentication explains parallel decisions for cipher suite selection

doc.: IEEE /147March 2000 TGe SecuritySlide 8 Comment Resolution (3) Comment: Nonce, Realm, Principal name specific to AES –Resolution: Clauses 7, 8, and 9 revised to make these concepts more general and applicable to other authentication mechanisms Comment: ESN Negotiation elements should be optional –Resolution: Language in Clauses 7 and 8 has changed to allow this, where appropriate

doc.: IEEE /147March 2000 TGe SecuritySlide 9 Comment Resolution (4) Comment: Need better discussion of IV selection –Resolution: This has been done in clause 8.2 Comment: The AES key derivation scheme doesnt work –Resolution: Replaced with a PMAC based scheme Comment: Probe Response format not updated to include Enhanced Security elements. –Resolution: There were added to

doc.: IEEE /147March 2000 TGe SecuritySlide 10 Agenda Introduction and Goals Major Revisions Open Issues Summary

doc.: IEEE /147March 2000 TGe SecuritySlide 11 Open Issues (1) : Are Deauthentication not used with Enhanced Security? –Recommendation: No, not used 6.1.3: Interaction of Replay Protection and QoS –Recommendation: to be resolved in discussion with TGe Q Monterey editing instructions called for removing rows used by legacy authentication mechanisms –Recommendation: Add text to say these rows may be omitted when peer assert Enhanced Security

doc.: IEEE /147March 2000 TGe SecuritySlide 12 Open Issues (2) notes we have never defined a Multicast key distribution mechanism –Recommendation: Since this clause is descriptive, outline use of 802.1X EAP-Key message for this notes OCB mode may infringe on an IBM patent. –Status: Working with Stuart Kerry to get IP statements

doc.: IEEE /147March 2000 TGe SecuritySlide 13 Open Issues (3) and 8.2.5: Notes a race condition between key negotiation and key usage –Recommendation: Solve this by adding a was- encapsulated parameter to MA- DATAUNIT.indication? Editor missed Kerberos specific language for Nonce, Realm, Principal in Clause 10 –Recommendation: Editor just fixes this : Does SetKeys support multicast keys? How do SetKeys language relate to existing MAC keys mechanisms?

doc.: IEEE /147March 2000 TGe SecuritySlide 14 Open Issues (4) : Do we need to update Beacon format to include ESN elements, or do we get these automatically from d?

doc.: IEEE /147March 2000 TGe SecuritySlide 15 Agenda Introduction and Goals Major Revisions Open Issues Summary

doc.: IEEE /147March 2000 TGe SecuritySlide 16 Summary Draft text written faithful to baseline All sections have text, and all Figures up to date Open issues list is limited and focused on limited number of issuess