1 / 20

Requirements for Management Frame Protection Schemes

Requirements for Management Frame Protection Schemes. Fabrice Stevens, Sébastien Duré France Telecom March 2005. Objectives of this talk. First step in the definition of ADS protection schemes requirements Help refine the scope of the work

blaise
Download Presentation

Requirements for Management Frame Protection Schemes

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Requirements for Management Frame Protection Schemes Fabrice Stevens, Sébastien Duré France Telecom March 2005 Fabrice Stevens, Sébastien Duré

  2. Objectives of this talk • First step in the definition of ADS protection schemes requirements • Help refine the scope of the work • Raise discussion on the security needs for specific MF Fabrice Stevens, Sébastien Duré

  3. Outline • Overall design goals • Security Requirements • Some known attacks… • First analysis of specific management frames needs Fabrice Stevens, Sébastien Duré

  4. Overall design goals • Common basics • Support for legacy devices • Low upgrading costs • And on and on… Fabrice Stevens, Sébastien Duré

  5. Overall design goals • 802.11 specific • Not to reinvent nor replace 802.11i! • Pre 802.11i authentication? Post 802.11i authentication? • 802 11i solves half of the ADS problem • But a lot of frames are sent before the authentication … • Security implications… • Applicable to IBSS or not? • Handle both unicast and broadcast management frames? Fabrice Stevens, Sébastien Duré

  6. Overall design goals • 802.11 specific • Adaptable to future management frames? • PAR says "selected management frames"… • Per-IE protection? Per MF? • Maybe a different answer for each service (DOA, Confidentiality) • How much are we willing to pay? • Performance, architecture costs… Fabrice Stevens, Sébastien Duré

  7. Security Requirements • Dimensions mentioned in the PAR • Data origin authentication • Data integrity (provided by data origin authentication) • Confidentiality • Replay-protection Fabrice Stevens, Sébastien Duré

  8. Data origin authentication (1/3) • Management Frames can go both ways… • Uplink MF (STA  AP) • Downlink MF (AP  STA) • Some MF can be sent by APs and STAs… • Whose MF need to be authenticated? • the APs'? the clients'? both? • Protecting APs' MF still leaves some known DoS attacks from the clients • To make it harder… • We might want any client to be able to use our network • We certainly do not want clients to connect to a rogue AP Fabrice Stevens, Sébastien Duré

  9. Data origin authentication (2/3) • "State of the Art" • Pre 802.11i authentication • No authentication of any entity (!) • Post 802.11i authentication • Client is authenticated • But EAP currently provides no explicit AP authentication • Limited changes to the specs could provide what we need… Fabrice Stevens, Sébastien Duré

  10. Data origin authentication (3/3) • If we limit ourselves to a post-802.11i authentication protection scheme • Should we provide "better" authentication than 802.11i? • Should we assume that EAP methods will bring explicit AP authentication? • see IETF Draft draft-arkko-eap-service-identity-auth-01.txt • Is it just fine the way it is? Fabrice Stevens, Sébastien Duré

  11. Confidentiality • Do we care? • Location Configuration Information in .11k? • STA statistics? • Will we care? (out-of scope question?) • What do we want to protect? • each IE • the entire MF • (probably much more efficient) Fabrice Stevens, Sébastien Duré

  12. Replay protection • Estimation of the potential damage? • Desassociation and deauthentication frames • Could be troublesome • Ressource measurement action frames • Could be troublesome too • … see the table in the following slides for the others Fabrice Stevens, Sébastien Duré

  13. Summary of MF protection scheme requirements Note: these are requirements for proposals, not for protection policies… Fabrice Stevens, Sébastien Duré

  14. Some known attacks using MF… • Denial of Service • Disassociation/Deauthentication frames: trivial DoS (management frame) • Association Requests flooding (management frame) • Duration field (all 802.11 frames) • Man-in-the-Middle • MF spoofing • Session hijacking • (assuming there is no 802.11i auth…) • Most attacks exploit unauthenticated frames , Fabrice Stevens, Sébastien Duré

  15. Threats • What are today's most important threats? • DoS? • Keep in mind that we'll never protect DoS due to radio jamming… • But deauth/deassoc make it trivial • MITM? • Assumes that there was no 802.11i auth • Still applicable to most hotspots… • Session-hijacking? • Same as MITM • Others? • What are the threats brought by 11e and 11k? Fabrice Stevens, Sébastien Duré

  16. First thoughts on specific MF needs • (How) should we define the security requirements? • Mandate minimal security services for each type of MF • Recommend some others • Define the remaining ones as optional • Put another way: should we enforce a minimum security policy when 802.11w is used? • And trying to avoid downgrading attacks… • In the following, we consider MF for infrastructure BSS… Fabrice Stevens, Sébastien Duré

  17. Needs for standard 802.11 MF Fabrice Stevens, Sébastien Duré

  18. Needs for 802.11k frames measurement requests and reports: channel load, noise histogram, beacon, frame, hidden node, medium sensing time histogram, STA statistics, location configuration information, measurement pause Fabrice Stevens, Sébastien Duré

  19. Needs for 802.11e frames Fabrice Stevens, Sébastien Duré

  20. What next? • Need to better analyze the threats we're facing • Continue the discussions • In the end, come up with one or more documents including • Requirements for ADS protection scheme proposals • Selection criteria • Potentially using the list of known attacks (that has yet to be completed), and the list of recommended/optional requirements for the protection schemes • Description of the minimum security policy for MF • Or recommended practice? Fabrice Stevens, Sébastien Duré

More Related