Light Weight Access Point Protocol (LWAPP) Pat R. Calhoun draft-ohara-capwap-lwapp-01.txt.

Slides:



Advertisements
Similar presentations
Secure Socket Layer.
Advertisements

Transport Layer Security (TLS) Protocol Introduction to networks and communications(CS555) Prof : Dr Kurt maly Student:Abhinav y.
Doc.: IEEE tg9-proposed-document-changes Submission Nov 2013 Robert Moskowitz, VerizonSlide 1 Project: IEEE P Working Group for.
Chapter 13 IPsec. IPsec (IP Security)  A collection of protocols used to create VPNs  A network layer security protocol providing cryptographic security.
Internetworking Different networks –Different bit rates –Frame lengths –Protocols.
Chapter 13 Mobile IP. Outline  ADDRESSING  AGENTS  THREE PHASES  AGENT DISCOVERY  REGISTRATION  DATA TRANSFER  INEFFICIENCY IN MOBILE IP.
Light Weight Access Point Protocol (LWAPP) Pat R. Calhoun Bob O’Hara Rohit Suri Nancy Cam Winget Scott Kelly Michael Williams Sue Hares draft-ohara-capwap-lwapp-03.txt.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
VLAN Trunking Protocol (VTP) W.lilakiatsakun. VLAN Management Challenge (1) It is not difficult to add new VLAN for a small network.
OSI Model Routing Connection-oriented/Connectionless Network Services.
CAPWAP Editor’s Report Pat R. Calhoun Cisco Systems, Inc.
Light Weight Access Point Protocol (LWAPP) IETF 57 Pat Calhoun, Airespace.
VLAN Trunking Protocol (VTP)
Speaker:Yi-Jie Pan Advisor:Dr. Kai-Wei Ke 2014/04/28
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
Yang Shi, Chris Elliott, Yong Zhang IETF 73 rd 18 Nov 2008, Minneapolis CAPWAP WG MIB Drafts Report.
Lecture 14 ISAKMP / IKE Internet Security Association and Key Management Protocol / Internet Key Exchange CIS CIS 5357 Network Security.
Doc.: IEEE /0158r2 Submission TGaq Pre-Association Discovery Protocol for ANDSF Discovery Service Date: May 2014 Joe Kwak, InterDigitalSlide.
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.
March 2007 CAPWAP Protocol Specification Editors' Report March 2007
Topic #1 DTLS Related Issues Pat R. Calhoun. Issue 226: Transition to Join State Current CAPWAP state machine requires knowledge of DTLS state machine.
CAPWAP Taxonomy Recommendations Pat R. Calhoun, Cisco Systems Bob O’Hara, Cisco Systems Inderpreet Singh, Chantry Networks.
Doc.: IEEE r Submission November 2004 Bob Beach, Symbol TechnologiesSlide 1 Fast Roaming Using Multiple Concurrent Associations Bob.
Lecture 24 Wireless Network Security
March 2006 CAPWAP Protocol Specification Update March 2006
Security Support for Multi-cast Traffic in M2M communication Document Number: IEEE C802.16p-10/0032 Date Submitted: Source: Inuk Jung, Kiseon.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
Wireless Network Security CSIS 5857: Encoding and Encryption.
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: ID Definition Date Submitted: July 14, 2006 Presented at IEEE session in San.
July 2007 CAPWAP Protocol Specification Editors' Report July 2007
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
Doc.: IEEE /0263r1 SubmissionJae Seung Lee, ETRI Spec Framework Proposal: Selection of the AP for Scanning Date: Slide 1 March 2012.
Doc.: IEEE /0896r0 SubmissionJae Seung Lee, ETRISlide 1 Probe Request Filtering Criteria Date: July 2012.
Issue EAPoL-Key message generation at WTP or AC Issue 199, summarized as:...the WTP maintains the KeyRSC while the AC requires this information to.
Doc.: IEEE Submission, Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Communicating.
LonWorks Introduction Hwayoung Chae.
COMP2322 Lab 1 Introduction to Wireless LAN Weichao Li Apr. 8, 2016.
Omniran CF00 1 Key Concepts of Association and Disassociation Date: Authors: NameAffiliationPhone Max RiegelNokia
FILS Reduced Neighbor Report
Topic #3 DTLS/CAPWAP Interactions
PANA Discussion and Open Issues (draft-ietf-pana-pana-01.txt)
TGaq Service Transaction Protocol for ANDSF Discovery Service
IEEE 802.1AS REV D5.0 Review Comments
Topic #1 & #5 “All that has to do with header formats”
Peer Aware Communication MAC Frame Structure
TGaq Transaction Protocol (update)
TGaq Transaction Protocol
May 2018 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Considerations on general MAC frame] Date Submitted:
Enhancements to Mesh Discovery
Issue Discussion: KeyRSC (43)
Protocol Details John Bellardo UCSD.
FILS Reduced Neighbor Report
Robert Moskowitz, Verizon
Robert Moskowitz, Verizon
Robert Moskowitz, Verizon
Robert Moskowitz, Verizon
Robert Moskowitz, Verizon
November 2018 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [SG SECN Amendment text] Date Submitted:
Nov 2013 Robert Moskowitz, Verizon
doc.: IEEE /454r0 Bob Beach Symbol Technologies
doc.: IEEE <doc#>
May 2018 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Considerations on general MAC frame] Date Submitted:
IEEE MEDIA INDEPENDENT HANDOVER
TGaq Service Transaction Protocol for ANDSF Discovery Service
Address [No.865 Changning Road, Shanghai, , China]
FILS Frame Content Date: Authors: February 2008
Use of EAPOL-Key messages
Counter With Cipher Block Chaining-MAC
Presentation transcript:

Light Weight Access Point Protocol (LWAPP) Pat R. Calhoun draft-ohara-capwap-lwapp-01.txt

Introduction Components of protocol: –Discovery phase –Control Channel Management Join (binding phase) –Creates LWAPP security association Watchdog Key Update –WTP Configuration WTP initiated Configuration Request AC initiated Configuration Update WTP Config Clear

Introduction (cont.) Components of protocol: –Device Management Operations WTP Reset WTP Firmware Download WTP Event Notification (Unsolicited events, such as statistics) –Mobile Management Create forwarding policies on WTP –IEEE Technology Binding WLAN (service) Configuration

WTP/AC Communication Discovery Phase Join Phase Security Association Established – encryption enabled WTP Configuration AP Advertises service Image Data Transfer AP Reboots with new firmware Either: 1) or 2) WTPAC

New LWAPP State Machine / \ | v | | C| Idle | | | / | C| Run | | Key Update | | | / | r | | b | Reset | | | |d f| ^ | Configure | > | | | | | p ^ | |e v | | ^ ^ | | v |i |k 2| | | C| Sulking | | | C| Join |--->| Join-Confirm | | | g z | | |h m| 3| |4 | | | | | v |o |\ | | | \\ / \ >| Image Data |C \ / n

New LWAPP State Machine State machine is now consistent with text throughout the document New text in -01 now has explicit text about state machine behavior, for instance: Idle to Discovery (a): This is the initialization state. WTP: The WTP enters the Discovery state prior to transmitting the first Discovery Request (see Section 5.1). Upon entering this state, the WTP sets the DiscoveryInterval timer (see Section 12). The WTP resets the DiscoveryCount counter to zero (0) (see Section 13). The WTP also clears all information from ACs (e.g., AC Addresses) it may have received during a previous Discovery phase. AC: The AC does not need to maintain state information for the WTP upon reception of the Discovery Request, but it MUST respond with a Discovery Response (see Section 5.2).

Technology Bindings Added text about how to add new technology bindings (section 2.1) Moved and renamed all specific protocol components to binding (section 11) Defined IEEE specific message elements in binding section –Mobile Config Request (section ) –WTP Event Request (section )

Technology Bindings (cont.) Introduced IEEE specific commands –IEEE WLAN Config Request –IEEE WLAN Config Response –IEEE WTP Event Many IEEE specific message elements are defined in section 11

LWAPP Transport LWAPP is transport agnostic. Specification defines IP/UDP and IEEE –New text (01) now a single transport header IEEE and IP/UDP refer back to single header figure |VER| RID |C|F|L| Frag ID | Length | | Status/WLANs | Payload... |

Division of Labor – Split MAC WTP – control protocol – beacons – probe responses –802.11e frame queuing –802.11i frame encryption AC – MAC management e.g., Association, Action – Data Frames –802.11e resource reservation –802.11i Auth/Key Exchange Local MAC behavior will be added in -03.

LWAPP Data Frames –LWAPP defines the following format for the IEEE technology binding: |Transport Header | LWAPP Header [C=0] | Frame

LWAPP Control Messages LWAPP defines a specific header for Control messages: | Message Type | Seq Num | Msg Element Length | | Session ID | | Msg Element [0..N] |

LWAPP Messages Increased the readability of every LWAPP Control message: –Section now includes all message elements allowed: 5.2 Discovery Response AC Address AC Descriptor AC Name WTP Manager Control IP Address –Includes complete instructions on WTP and AC behavior, and ties back into state machine –Refers to all necessary timers and variables (sections 12 and 13)

Message Elements Significant formatting changes –Removed large message element table –Each message element now includes identifier number and length Discovery Type The Discovery message element is used to configure an WTP to operate in a specific mode | Discovery Type| Type: 58 for Discovery Type Length: 1 Discovery Type: An 8-bit value indicating how the AC was discovered. The following values are supported: 0 - Broadcast 1 - Configured

Security Significant cleanup in text detailing certificate based LWAPP security –Message elements clearly spell out their contents Introduction of PSK –State machine changes –Changes to certain message elements to handle both modes of operation –Specific text detailing DH/PRF security approach AC Advertises security modes supported in AC Descriptor (section 5.2.2) New Security Considerations section for both modes of operation.

Certificate Based Security Join request (WTP-Cert, SID) Join Response (AC-Cert, SID, cipher-text) AC Creates session keys (KeyMaterial) Data = E-wtp{Kpub, PKCS1(KeyMaterial)} Cipher-text = E-ac{Kpriv, SID|Data} WTPAC Data = D-ac{Kpub, Cipher-text} PKCS1(KeyMaterial) = D-ac{Kpriv, data} AES-CCM Encrypted Control Channel

PSK Based Security Join request (DH-Params(g, p, g^x mod p), WNonce, SID) Join Response (DH-Params(g^y mod p), SID, ANonce, PSK-MIC) AC chooses exponent y and creates ANonce PMS = LEN_16(Z) | Z | LEN_16(PSK) | PSK KeyMaterial = PRF(PMS, "master secret", Wnonce + Anonce) Key Material is split into K1 (KCK), K2 (KEK) and K3 (Rekey key) WTPAC WTP computes key PSK-MIC validation provides key confirmation AES-CCM Encrypted Control Channel Join ACK (SID, PSK-MIC) Join Confirm (SID, PSK-MIC) PSK-MIC validation provides key confirmation Authenticated Join Confirm closes the state machine loop AC chooses exponent x and creates WNonce