Thread Links Date Links
Thread Prev Thread Next Thread Index Date Prev Date Next Date Index

Re: [STDS-802-11-TGBN] Roaming TTT - please review 11-25/2339



Thanks Binita for the hard work on this.
It mostly looks fine but I have a couple of small-ish comments:


a Per-SMD PTK is derived as described in 37.15.4.1 

We removed existing instances of "Per-SMD PTK" and "Per AP MLD PTK" to address other CIDs in 426r11, and instead just refer to a "PTK". So I think we should not reintroduce these terms here. I think the sentences you added would still be clear if those phrases are removed. (multiple instances)

The exchanged keying material includes the PMKSA and PTKSA established between the SMD-ME and a non-AP MLD.

Could we slightly soften this to say something like "The exchanged keying material might include components of the PMKSA and PTKSA ...."? Since, depending on the case, not all the keys are transferred

In the case of a single MAC SAP for the SMD, the 802.1X Authenticator in the SMD-ME controls(#12308) the 802.1X Controlled Port for the non-AP MLD (#4163)and there is no 802.1X Authenticator component in the AP MLD.(#4723)

I note Duncan added the following text in 380r3 (in 4.9.7), which seems to be applicable to both architectures: The SME of an AP MLD that is part of an SMD contains an SMD-ME that is shared among AP MLDs of the SMD and that is responsible for coordinating the SMEs of those AP MLDs. The SMD-ME is responsible for coordinating with each of the SMEs to ensure that a single RSNA key management entity and IEEE 802.1X Authenticator or Supplicant are shared among the MACs and that a single IEEE 802.1X entity is controlled.

This says there is a single "802.1X entity" in an SMD-ME, irrespective of the architecture - which for network-side means a single 802.1X Authenticator per SMD-ME. In Per AP MLD MAC-SAP case, where there are many 802.1X Controlled Ports in the SMD (one per AP MLD), that would mean the single 802.1X Authenticator contains many PAEs (Port Access Entities) that are logically distributed. In the Per SMD MAC-SAP case, there is just a single Controlled port so a single "centralized" PAE (in an undefined location).
However, one of the roles of the 802.1X Authenticator in the SME is key management (e.g. set/delete keys, manage PNs, etc). At least for group keys, that is all done at the link (per AP) level. And even for pairwise keys, although the architecture does not preclude an implementation centralizing crypto and key management, logically this is at the AP MLD level.
So while we might say there is no PAE component of the 802.1X Authenticator in (the SME of) an AP MLD, I'm not sure we can say there are no components of the 802.1X Authenticator in the AP MLD at all..

Thanks
Thomas

On May 6, 2026 at 02:34:51, Binita Gupta <bingupta.ieee@xxxxxxxxx> wrote:
One typo correction below:

On Wed, May 6, 2026 at 11:33 AM Binita Gupta <bingupta.ieee@xxxxxxxxx> wrote:
Hi Roaming TTT members,

I have revised CRD 25/2339r1 based on changes already made in D1.4 from Thomas's CRD 26/426r11.
Suggested changes in r1 should be straightforward. Please review and let me know if you have any feedback.

Thanks,
Binita

On Sat, Feb 28, 2026 at 4:03 PM Binita Gupta <bingupta.ieee@xxxxxxxxx> wrote:
Hi Roaming TTT members,

I have uploaded CRD 11-25/2339 which resolves 15 CIDs related to roaming on following topics:
- Per-SMD PTK 
- SMD-level PMK
- SMD-level PMKSA
- PTKSA for two PTK modes
- Group Key Data in UHR Link Reconfiguration Response
- Status codes for roaming

Could you please review the proposed resolutions and provide any comments/feedback you may have.

Thanks,
Binita

To unsubscribe from the STDS-802-11-TGBN list, click the following link: https://listserv.ieee.org/cgi-bin/wa?SUBED1=STDS-802-11-TGBN&A=1


To unsubscribe from the STDS-802-11-TGBN list, click the following link: https://listserv.ieee.org/cgi-bin/wa?SUBED1=STDS-802-11-TGBN&A=1

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature