Doc.:IEEE 802.11-10/0313r1 Submission Robert Stacey (Intel) March 12, 2010 Slide 1 Rekeying Protocol Fix Authors: Date: 2010-03-12.

Slides:



Advertisements
Similar presentations
Doc.: IEEE /1021r1 Submission September 2008 Luke Qian etc.Slide 1 A Simplified Solution For Critical A-MPDU DoS Issues Date: Authors:
Advertisements

Doc.: IEEE /0833r2 Submission July 2008 Luke Qian etc, CiscoSlide 1 A Proposed Scaled-down Solution to A- MPDU DoS Related Comments in LB 129.
Doc.: IEEE /0018r0 Submission January 2010 Alexander Tolpin, Intel CorporationSlide 1 4 –Way Handshake Synchronization Issue Date:
Doc.: IEEE /0560r0 Submission May 2010 Ashish Shukla, MarvellSlide 1 TDLS TPK Handshake Date: Authors:
TCP - Part I Relates to Lab 5. First module on TCP which covers packet format, data transfer, and connection management.
Transmission Control Protocol (TCP)
1 TCP - Part I Relates to Lab 5. First module on TCP which covers packet format, data transfer, and connection management.
1 CS 4396 Computer Networks Lab Transmission Control Protocol (TCP) Part I.
Stream Control Transmission Protocol 網路前瞻技術實驗室 陳旻槿.
EE 4272Spring, 2003 Protocols & Architecture A Protocol Architecture is the layered structure of hardware & software that supports the exchange of data.
TinySec: Link Layer Security Chris Karlof, Naveen Sastry, David Wagner University of California, Berkeley Presenter: Todd Fielder.
1 Link Layer & Network Layer Some slides are from lectures by Nick Mckeown, Ion Stoica, Frans Kaashoek, Hari Balakrishnan, and Sam Madden Prof. Dina Katabi.
Error Checking continued. Network Layers in Action Each layer in the OSI Model will add header information that pertains to that specific protocol. On.
SEPT, 2005CSI Part 2.2 Protocols and Protocol Layering Robert Probert, SITE, University of Ottawa.
Submission doc.: IEEE 11-10/0745r2 May 2010 Matthew Fischer, BroadcomSlide 1 MFQ MMPDU MAC Sequence Numbering Date: Authors:
Submission August 2001 Nancy Cam-Winget, Atheros Slide 1 Rapid Re-keying WEP a recommended practice to improve WLAN Security Nancy Cam-Winget, Atheros.
1 Transport Layer Computer Networks. 2 Where are we?
1 Chapter 16 Protocols and Protocol Layering. 2 Protocol  Agreement about communication  Specifies  Format of messages (syntax)  Meaning of messages.
TCP Lecture 13 November 13, TCP Background Transmission Control Protocol (TCP) TCP provides much of the functionality that IP lacks: reliable service.
Transport Layer: UDP, TCP
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
TELE202 Lecture 5 Packet switching in WAN 1 Lecturer Dr Z. Huang Overview ¥Last Lectures »C programming »Source: ¥This Lecture »Packet switching in Wide.
Computer Networks with Internet Technology William Stallings
A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University.
Types of Service. Types of service (1) A network architecture may have multiple protocols at the same layer in order to provide different types of service.
1 Chapter Six - Errors, Error Detection, and Error Control Chapter Six.
Chapter 24 Transport Control Protocol (TCP) Layer 4 protocol Responsible for reliable end-to-end transmission Provides illusion of reliable network to.
Doc.: IEEE /1378r0 Submission November 2008 Darwin Engwer, Nortel NetworksSlide 1 Improving Multicast Reliability Date: Authors:
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Protocols and Architecture Slide 1 Use of Standard Protocols.
Doc.: IEEE /2977r0 Submission November 2007 Ganesh Venkatesan, Intel CorporationSlide 1 VTS SG PAR Scope Topics Date: Authors:
Queuing Delay 1. Access Delay Some protocols require a sender to “gain access” to the channel –The channel is shared and some time is used trying to determine.
© Jörg Liebeherr (modified by Malathi Veeraraghavan) 1 Overview Formats, Data Transfer, etc. Connection Management.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
Doc.: IEEE /0485r0 Submission May 2004 Jesse Walker and Emily Qi, Intel CorporationSlide 1 Management Protection Jesse Walker and Emily Qi Intel.
SubmissionJoe Kwak, InterDigital1 Simplified 11k Security Joe Kwak InterDigital Communications Corporation doc: IEEE /552r0May 2004.
1 Protocols and Protocol Layering. 2 Protocol Agreement about communication Specifies –Format of messages –Meaning of messages –Rules for exchange –Procedures.
Fall 2006CS 395: Computer Security1 Key Management.
Building A Network: Cost Effective Resource Sharing
McGraw-Hill Chapter 23 Process-to-Process Delivery: UDP, TCP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
INF3190 – Home Exam 2. Goal The goal of this exercise is to provide network layer reliability for the monitoring/administration tool presented in “home.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Transmission Control Protocol (TCP) TCP Flow Control and Congestion Control CS 60008: Internet Architecture and Protocols Department of CSE, IIT Kharagpur.
3. END-TO-END PROTOCOLS (PART 1) Rocky K. C. Chang Department of Computing The Hong Kong Polytechnic University 22 March
Protocols and layering Network protocols and software Layered protocol suites The OSI 7 layer model Common network design issues and solutions.
The Transport Layer Implementation Services Functions Protocols
Lecture (2).
Proposed Modifications to e-D4.0 Group ACK
Undetected Duplicate Frame Reception
5. End-to-end protocols (part 1)
TCP.
TCP - Part I Karim El Defrawy
Process-to-Process Delivery:
Beacon Protection Date: Authors: July 2018 July 2018
Beacon Protection Date: Authors: May 2018 January 2018
CCMP Nonce Construction
July 2008 doc.: IEEE /0833r0 July 2008 A Proposed Scale-down Solution to A-MPDU DoS Related Comments in LB 129 Date: Authors: Luke.
A Simplified Solution For Critical A-MPDU DoS Issues
Building A Network: Cost Effective Resource Sharing
Protocols and Protocol Layering
Rekeying Protocol Fix Date: Authors: Month Year
TCP - Part I Relates to Lab 5. First module on TCP which covers packet format, data transfer, and connection management.
A Simplified Solution For Critical A-MPDU DoS Issues
Beacon Protection Date: Authors: July 2018 July 2018
Beacon Protection Date: Authors: May 2018 January 2018
Computer Networks Protocols
Protocols and Protocol Layering
Revisiting Path Switch
Error Checking continued
July 2008 doc.: IEEE /0833r0 July 2008 A Proposed Scale-down Solution to A-MPDU DoS Related Comments in LB 129 Date: Authors: Luke.
Presentation transcript:

doc.:IEEE /0313r1 Submission Robert Stacey (Intel) March 12, 2010 Slide 1 Rekeying Protocol Fix Authors: Date:

doc.:IEEE /0313r1 Submission Robert Stacey (Intel) March 12, 2010 Problem Statement (1) Key installation after M4 is not precisely defined Differences in install timing between Authenticator and Supplicant can result in packet loss

doc.:IEEE /0313r1 Submission Robert Stacey (Intel) March 12, 2010 Problem Statement (2) Difference in key install times between supplicant and authenticator can result in packet loss –One side transmits using new key while other side is still decrypting using old key –One side transmits using old key while other side is decrypting using new key High packet loss causes –Video streaming disruption –TCP slow start Use of new PN sequence may be detected as replay attack –Erodes the security value of statistics on potential attacks –May result in disassociation

doc.:IEEE /0313r1 Submission Robert Stacey (Intel) March 12, 2010 Implementation issues Key management messages and control incur variable implementation delay from –Queuing delays –Key management/encryption engine control path architecture E.g. messaging passing vs direct write –OS scheduling latencies Inline control is possible on transmit side, but doesn’t help on receive side RSNA Key Management mux data Priority Queues RSNA Key Management demux data Queue & Reorder buffers encryptdecrypt Key management control

doc.:IEEE /0313r1 Submission Robert Stacey (Intel) March 12, 2010 Protocol issues The specification is not clear on exactly when key installation occurs after Message 4 is sent or received Message 4 may be aggregated with other data frames in the same A-MPDU –Does key switch-over occur mid A-MPDU? Message 4 may be retransmitted –Does transmitter install after transmitting Message 4 or after message 4 is acknowledged? Block Ack may be in use; Message 4 may only be acknowledged after additional data messages have been sent

doc.:IEEE /0313r1 Submission Robert Stacey (Intel) March 12, 2010 Proposed Solution Use different Key ID with each new key installation Need to increase Key ID space for unicast traffic –Currently: Key ID = 0 used for unicast traffic Key ID = 1, 2, 3 used for broadcast/multicast traffic –Change to: Key ID = 0, 1 to be used for unicast Key ID = 0, 1, 2, 3 to be used for broadcast/multicast At recipient distinguish key space based on receive address in packet: –Unicast address  Key ID indexes pairwise key –Broadcast/multicast address  Key ID indexes group key Ensure that Tx key use at sender occurs after Rx key install at recipient –Previously installed key remains valid during transition Capability exchange required to ensure that both ends support the new mechanism

doc.:IEEE /0313r1 Submission Robert Stacey (Intel) March 12, 2010 PTKSA (Key ID = 0) Rekeying procedure using 2 keys 4whs PTKSA (Key ID = 0) PTKSA lifetime Rekeying period (several hours) time PTKSA (Key ID = 1) Transition to new key PTKSA (Key ID = 1) PTKSA = Pairwise Transient Key Security Association Keys remain in place (for receive processing) for 2 handshake periods PTKSA lifetime is 2 handshake periods New key installation replaces old key with same Key ID Having two active keys permits a smooth, timing relaxed transition from one PTKSA to the next

doc.:IEEE /0313r1 Submission Robert Stacey (Intel) March 12, 2010 Protocol Changes (1) Authenticator installs new key for Rx before sending M3 Supplicant installs new key for Rx after receiving M3 but before sending M4 Supplicant starts using new key for Tx after sending M4 Authenticator starts using new key for Tx after receiving M4 Install New Key for Rx Start using New Key for Tx Start using New Key for Tx

doc.:IEEE /0313r1 Submission Robert Stacey (Intel) March 12, 2010 Protocol Changes (2) Protocol (Authenticator) –Calculate key on receiving Message 2 –Install new key for Rx Ensure installation prior to transmitting Message 3 –Transmit Message 3 –Receive Message 4 –Install new key for Tx (send MPDUs using new key) Timing is relaxed; use of new key for tx occurs any time after message 4 arrives at receive antenna, allowing for software processing delays Protocol (Supplicant) –Calculate new key on receiving Message 3 –Install new key for Rx Ensure installation prior to transmitting Message 4 –Transmit Message 4 –Install new key for Tx (send MPDUs using new key) Timing is relaxed; some data MPDUs may still be sent using old key after Message 4 is transmitted

doc.:IEEE /0313r1 Submission Robert Stacey (Intel) March 12, 2010 Summary of Specification Changes Permit Key IDs 0 and 1 to be used for unicast traffic Add Extended Key ID for Unicast capability bit in RSNE Add Key ID KDE to pairwise 4-way handshake –Associates generated key with a Key ID Separate installation of key for Rx from installation of key for Tx –Modify description of 4-way handshake to define when installation occurs –Modify MLME-SETKEYS primitive to independently install key for Rx and Tx

doc.:IEEE /0313r1 Submission Robert Stacey (Intel) March 12, 2010 Conclusion Proposed solution eliminates race condition in rekeying procedure Precisely defines (with reference to message exchange) points at which new key installation occurs Maintains relaxed timing for flexibility in implementation –No real-time coupling of when messages appear on-air and when key installation occurs –Allows key exchange messages to be treated as data messages by lower layers