1 / 16

Fast Roaming Compromise Proposal

Fast Roaming Compromise Proposal. Tim Moore, Microsoft Nancy Cam-Winget, Cisco Systems Clint Chaplin, Symbol Technologies Donald Eastlake, Motorola Laboratories Dan Harkins, Trapeze Networks Fred Stivers, Texas Instruments Jesse Walker, Intel. Voice Requirements for reassociation.

yama
Download Presentation

Fast Roaming Compromise Proposal

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Fast Roaming Compromise Proposal Tim Moore, Microsoft Nancy Cam-Winget, Cisco Systems Clint Chaplin, Symbol Technologies Donald Eastlake, Motorola Laboratories Dan Harkins, Trapeze Networks Fred Stivers, Texas Instruments Jesse Walker, Intel Cam-Winget et. al.

  2. Voice Requirements for reassociation • ITU guidance on TOTAL hand-off latency is that it should be less than 50 ms. Cellular networks try to keep it less than 35 ms. Cam-Winget et. al.

  3. Key Management Requirements • Explicitly identify the PMK and PMK type being used • Minimize computational load on all device types • Support multiple back-end infrastructures • Minimize the number of messages required while roaming. • Minimize time dependencies in key mgmt • Allow PTK pre-computation to accommodate highly constrained devices Modifications to the information in the 4-way handshake can be made to address 1, 2 and 3 but not in 4, 5 and 6 Cam-Winget et. al.

  4. Why not replace 4-way handshake? • Because: • Generic mechanism for supporting PSK is needed • Industry is already deploying 4-way handshake and must be retained for backward compatibility • Define an optional proposal that allows coexistance with current TGi AKMs Cam-Winget et. al.

  5. Compromise Proposal Cam-Winget et. al.

  6. RSN Security Association • Defines the context to make the PTK usage meaningful • Default RSN SA is defined by • AP’s BSSID and STA’s MAC address • PTK derived using the 4-Way Handshake. • ANonce, SNonce • The SA expiry, i.e., the conditions causing this SA to expire. • Alternate RSN SA is defined by • MKID, AP’s BSSID and STA’s MAC address • R-PMK and R-PMK Counter used for PTK derivation • The SA expiry, i.e., the conditions causing this SA to expire. Cam-Winget et. al.

  7. Roaming Key Hierarchy PMK-EAP =f(MSK) EMSK is unused Default Key Hierarchy Roaming Key Hierarchy (RKH) Unspecified means for generating AP unique PMK’s Root SA MKID Base Roam Key (BRK) Pairwise Master Key (PMK) = Current radius derivation Roaming Pairwise Master Key (R-PMK) Pairwise Master SA R-PTK PTK = Current PTK derivation RSN SA KCK KEK TK Cam-Winget et. al.

  8. Fast Roam negotiation: new AKMs Cam-Winget et. al.

  9. RSN IE: Supports other back-end infrastructures Cam-Winget et. al.

  10. Pairwise Key Hierarchies Cam-Winget et. al.

  11. R-PMK, MKIDSTA, Counter1 R-PMK, MKIDAP, Counter2 Re-assoc Resp ( RKH IE(MKID, Counter2, Srand, Arand, RSC, EKMEK(GTK), MIC, RSN IEBSSID)) EAPOL-Key( Arand, MIC) AP Rekeying Re-association STA Counter1 = Counter1 + 1, R-PTK = KMIK|KMEK | TK = Roaming-PRF() Re-assoc Req (RSN IE(AKMP), RKH IE(MKID, Counter1 , Srand, MIC, RSN IESTA)) Install TK for Rx Install TK Install TK for Tx Counter2 = Counter1 Cam-Winget et. al.

  12. Rekeying Reassociations (2): Roaming Key Hierarchy IE Cam-Winget et. al.

  13. Initial Association: 3-way handshake STA AP MKID = AES-Encrypt(PMK, 0) Counter1 = Counter1 + 1, PTK-R = KMIK|KMEK | TK = Roaming-PRF() APKM EAPOL Key** (0, 1, 1, 0, 0, 1, MKID, SNonce, MIC, RSNIESTA) Install TK for Rx Install TK APKM EAPOL Key** (1, 1, 1, 1, 0, 1, MKID, SNonce, ANonce, MIC, RSNIEBSSID) Install TK for Tx APKM EAPOL-Key** ( 1, 1, 0, 1, 0, 1, ANonce, MIC, 0) Counter2 = Counter1 Initiate GTK handshake **APKM EAPOL Key is as defined in 8.5.2 and uses Version Type 3 or 4 Cam-Winget et. al.

  14. Motions • Move to adopt draft text in 03/241r3 • Move to request IEEE 802.11 Working Group Chair to forward the letter titled “Input to IETF AAA Working Group on Keying Distribution Methods” to the IETF Chair Cam-Winget et. al.

  15. Feedback? Cam-Winget et. al.

  16. Measured WPA values in ms Measurements were taken using Cisco 1200 APs with Intersil and Atheros NIC’s and MS and FUNK WPA Supplicants under ideal conditions (e.g. single client and little to no load on AP) Cam-Winget et. al.

More Related