Thread Links | Date Links | ||||
---|---|---|---|---|---|
Thread Prev | Thread Next | Thread Index | Date Prev | Date Next | Date Index |
Hi Graham, This might be faster than simply doing the hashing for every single association to find the particular IRMK but there's a tradeoff in memory and management of lookup tables,
this XOR would have to be recomputed after every association, right? What I was suggesting in yesterday's meeting was something more AP-friendly. Imagine the AP has a secret symmetric key (this can be shared by all APs in an ESS). When the
STA associates, the AP can encrypt an identifier for the STA and send it off. The encryption operation can include variable padding to foil traffic analysis and a small amount of salt which will make the encryption probabilistic. When the STA (re)attaches
it provides the encrypted identity and it is decrypted with a single AEAD operation. The padding and salt are thrown away, the user is identified by the remaining identifier, and new padding and salt are added and the identifier is encrypted again and sent
to the STA for the next (re)association. This just requires two symmetric operations—one decryption and one encryption—per connection (except for the first connection which just has a single encryption). These are very fast and do not require additional overhead. This scheme would have the following properties (stolen from 11-21/0541 and 11-21/0488 where this idea was stolen from):
We lost a fixed MAC address that the network used to identify STAs when STAs started randomizing MAC addresses. That is the root of all of the problems that caused this TG
to be created. This scheme can provide STAs with a fixed identifier that will live across associations over an entire BSS, which is exactly what we had with a fixed STA MAC address.
regards, Dan. -- "the object of life is not to be on the side of the majority, but to escape finding oneself in the ranks of the insane." – Marcus Aurelius On 1/19/22, 9:17 AM, "G Smith" <gsmith@xxxxxxxxxxxxxxxxxxx> wrote: Dan brought up a couple of good observations after my presentation on the IRM/ID scheme. Dan was concerned that in the case of a stadium there could be 10’s of thousands of devices which would put a big burden on the AP/Network
in calculating the hash and finding the key (IRMK). This would be true but on reflection I now realize that this is not a Use Case that TGbh has considered and also I doubt if it would be. In this case I suspect that the APs would not indicate support for
IRM and hence the STAs would not use it. The ID Query might be used, not sure. Still it’s a good point and I do want to make sure the effort is kept a low as possible.
The idea of the IRMK Check was to reduce the work by the AP. The IRMK Check at the moment uses a random start bit. Dan expressed that it was still a lot of work for an AP to go through all the
IRMKs and perform the 16/8 bit EXOR at the point that the STA is associating. There was a suggestion that a fixed offset could be used and on reflection I think this is a practical solution. When the STA associates, it provides a new key (IRMK) and if we
had a fixed offset, the AP could quickly calculate the 8 bit Check and store it with the key, i.e., it stores the 9 octet key and 1 octet check, 10 octets per STA. Then when the STA indicates the Check, the AP has a simple job to find those keys that match
the check (reducing the list by a factor of 256). As an aside to this, I did at one time consider using a CRC-8 as the check. I am not an expert on this but I felt that that was more
work – I may be wrong, so if anyone feels that would be better please let me know. Thanks Graham To unsubscribe from the STDS-802-11-TGBH list, click the following link: https://listserv.ieee.org/cgi-bin/wa?SUBED1=STDS-802-11-TGBH&A=1 |