Download presentation
Presentation is loading. Please wait.
Published byJustin MacGregor Modified over 11 years ago
1
doc.: IEEE 802.11-08/0562r0 Submission May 2008 Adrian Stephens, Intel CorporationSlide 1 TGn LB124 – A detect and mitigate solution to the BA DoS problems Date: 2008-05-09 Authors:
2
doc.: IEEE 802.11-08/0562r0 Submission May 2008 Adrian Stephens, Intel CorporationSlide 2 Summary BA DoS attacks do exist Two complementary types of solution exist –Harden Prevents attack from being effective – i.e. no DoS from BA attacks (other less targeted DoS attacks still exist) May require hardware changes Requires support from both peers –Detect & Mitigate Detects attack after it has occurred Some MSDUs will be lost for each attack Effective with Draft 2.0 devices as recipient Driver-level modifications may suffice – may be capable of being retrofitted?
3
doc.: IEEE 802.11-08/0562r0 Submission May 2008 Adrian Stephens, Intel CorporationSlide 3 Detection Draft 2.0 recipients –An attack leaves WinStart_R in an anomalous state –A BA will be generated with a SSN that is later than the originators window. This suffices to detect the event. –But this is ineffective when the recipient uses partial state, and the partial state is flushed following the attack, but before a BA has been sent. Draft 5.0 recipients –In addition to the above, the recipient can detect an attack in a number of ways, within: scoreboard, re-ordering buffer MIC check and replay detection. –After detecting an attack, a draft 5.0 recipient sends a BA-SYNC- REQUEST frame to the originator. (Could be protected, non-real- time. Could re-use DELBA with reason BA DoS attack.)
4
doc.: IEEE 802.11-08/0562r0 Submission May 2008 Adrian Stephens, Intel CorporationSlide 4 Mitigation Draft 2.0 recipients –There are a number of ways to reset state, including: sending 2**12/winsize dummy data frames to push the winstart_B to a known position. (preferrred) Send a DELBA followed by ADDBA to recreate the BA agreement in a known state. –Either solution will cause the loss of up to a windows worth of data. Draft 5.0 recipients –Add a new protected management action frame BA-SYNC, which carries a new SSN. –Recipient advances the SSN to just past its current window. –Will loose up to a windows worth of data
5
doc.: IEEE 802.11-08/0562r0 Submission May 2008 Adrian Stephens, Intel CorporationSlide 5 Negotiation The only negotiation necessary is for the originator to know whether it is dealing with a draft 2.0 recipient or not. As the BA DoS vulnerability is not strictly a HT issue, we can add to the extended capabilities field a bit called Supports BA re-sync, which indicates support for the new BA management frames and associated behavior.
6
doc.: IEEE 802.11-08/0562r0 Submission May 2008 Adrian Stephens, Intel CorporationSlide 6 Straw Polls Vote yes or no for each in turn A: Do you think BA DoS is an issue we should fix in TGn? B: Do you support (in concept) a mitigation & detect (only) solution? C: Do you support (in concept) both mitigation & detect and hardening solutions? D: Do you support (in concept) only a hardening solution?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.