| Thread Links | Date Links | ||||
|---|---|---|---|---|---|
| Thread Prev | Thread Next | Thread Index | Date Prev | Date Next | Date Index |
| --- This message came from the IEEE 802.11 Task Group M Technical Reflector ---
There was a discussion today under CIDs 426/428/429 regarding the Supplicant state variable holding the replay counter for EAPOL-Key PDUs. There are some hints about such a variable, though the wording is vague, using words like "local" and "last-seen" and "update". My proposal was to be explicit in all cases where the Supplicant has to decide whether to discard an EAPOL-Key PDU from the Authenticator, that the Supplicant checks the KRC is greater than in any previous valid PDU. In this way you don't have to have discussion of such a variable. There was a concern that this was losing a requirement, so I'd like to present the proposal on the reflector to see if such loss of requirement can be identified. The proposal is (I highlight deletions and additions of relevant "shall"s and "update"s and "local"s etc.): d) Key Replay Counter. This field is represented as an unsigned integer, and is initialized to 0 when the PMK is established. The Supplicant shall use the key replay counter in the received EAPOL-Key PDU when
responding to an EAPOL-Key PDU. It carries a sequence number that the protocol uses to detect replayed EAPOL-Key PDUs. The Supplicant and Authenticator shall track the key replay counter per security association. The key replay counter shall be initialized to 0 on (re)association. The Authenticator shall increment the key replay
counter on each successive EAPOL-Key PDU. When replying to NOTE 8—In other words, the Supplicant does not … On reception of message 1 [of 4WH],
the Supplicant … On reception of message 3 [of 4WH],
the Supplicant …
… On reception of message 1 [of GKH], the Supplicant: a) Verifies that b) If dot11RSNAOperatingChannelValidationActivated is true and Authenticator RSNE indicates OCVC,
— OCI KDE is missing in the message — Channel information in the OCI KDE does not match current operating channel parameters (see 12.2.10 (Requirements for Operating Channel Validation)) c) Verifies that the MIC is valid, i.e., it uses the PTK-KCK that is part of the PTK to verify that there is no data integrity error, or that the AEAD decryption steps succeed. If not, the Supplicant shall
silently discard the message. Thanks, Mark --
Mark RISON, Standards Architect, WLAN English/Esperanto/Français Samsung Cambridge Solution Centre Tel: +44 1223 434600 1 Cambridge Square, Cambridge CB4 0AE Fax: +44 1223 434601 ROYAUME UNI WWW:
http://www.samsung.com/uk To unsubscribe from the STDS-802-11-TGM list, click the following link: https://listserv.ieee.org/cgi-bin/wa?SUBED1=STDS-802-11-TGM&A=1 |