110 likes | 126 Views
This review explores the essential functionality and operation of IBSS networks, focusing on security measures, key distribution, and interoperability with ESS modes. Proposed motions aim to improve the baseline specifications for seamless network integration.
E N D
IBSS and ESN Bob Beach Symbol Technologies Bob Beach
IBSS and ESN • Current baseline really does not address IBSS networks • Most of the assumptions of baseline are absent in IBSS • No AP to advertise/negotiate cypher and authentication suites • No AP to respond to probes (any station can respond) • No associations – stations can transmit whenever they like • No place for 802.1x port control • Assume manual configuration for IBSS is not sufficient • E.g. write cypher suite and encryption key on blackboard and have each user enter the information manually • Maximize commonality between IBSS and ESS modes Bob Beach
Review of IBSS Operation • In 1999 specification only Station Services supported • Authentication, Deauthentication, Privacy, MSDU delivery • IBSS is indicated by bit in capability field of beacon • WEP is also so indicated • All stations in an IBSS generate a beacon on regular basis • First STA in IBSS sets beacon interval • Stations update local configuration based upon last beacon received • Stations may generate probe requests • Station that transmitted last beacon responds to probe • Stations can transmit whenever they want per DCF Bob Beach
Desired Functionality for ESN IBSS • Key Distribution • All stations use same session key • May have separate broadcast key • Key Derivation • Need to derive actual keys for AES use from session • Yields set of keys per station pair • Cypher Suite • Assumption: one suite for all stations Bob Beach
Basic Model -1 • Per baseline, no MAC layer Authentication • E.g. no authentication, deauthentication services • Any station can send data packets whenever it wants • Most of 802.1x functionality is not used • No entity to act as port controller • Request/response packets are used to carry authentication packets • One station acts as Security Coordinator for IBSS • Specifies Cypher suite and authentication suite for IBSS • Allocates encryption key using authentication suite Bob Beach
Basic Model -2 • Stations use Probe/Probe Response messages to derive AES keys much like BSS model uses association packets • Done between each pair of stations that want to exchange data Bob Beach
Security Coordinator (SC) -1 • Any station can perform the SC functions • Need not be station that instantiates the IBSS • Application that runs above the MAC layer • Generates beacons as do other stations in IBSS but they contain additional information • Only its beacons contain ESN bit (other stations’ beacons don’t) • Contain cypher suite and authentication suite for IBSS using elements defined in ESN • Specifies only one option for each. Use of indicated suites is mandatory for particular IBSS Bob Beach
Security Coordinator (SC) -2 • Key Distribution uses authentication algorithm • Authentication packets are carried inside 802.lx request and response packets • Addressed to station generating ESN tagged beacon • Baseline authentication algorithm is used (e.g. Kerberos) Bob Beach
Kerberos Usage in IBSS • Security Coordinator station operates as Mini-KDC • Stations do regular Kerberos handshake using information in ESN tagged beacons • Mini-KDC allocates same session key to all stations using Kerberos packet exchanges • Users share common password distributed manually or agree upon some password derivation model (password = username) • SC application may have user interface that allows manual user approval • I.e. authenticate “George”? “Yes/no ?” • Allows membership in IBSS to be known Bob Beach
Key Derivation • Need to derive AES keys from session key • Add nonce to probe/probe response packets • When a station needs to send a data packet to another station for the first time it sends a probe packet to it containing the nonce. • The target station replies with a probe response containing its nonce • Both stations compute AES key using the contents of the probe/probe response packets Bob Beach
Proposed Motions • Proposed: The model of IBSS ESN operation contained in this document be added to the Tgi baseline. • Proposed: Tgi instruct the author of this document to prepare text for incorporation into the next revision of the Draft specification. Bob Beach