Thread Links Date Links
Thread Prev Thread Next Thread Index Date Prev Date Next Date Index

Re: [STDS-802-11-TGBH] Any further discussion on proposed resolution to CIDs 12, 58, and perhaps 25



Thanks Dan,

I think (I know) I am not completely understanding, so please forgive me.  A couple of questions if I may:

If Opaque used (Annex Z), the STA receives a ‘random set of bits” as the ID first time association and then returns that set as the ID when it returns.  Does the AP then provide a new random set of bits (each time) or does the STA keep using the same set of bits? 

If Opaque is not used (or even if it is), the ID is still encrypted by the KDE when sent back to the AP, so it will look different to an observer? 

 

I obviously am missing something.  My previous comments were solely based on my ‘understanding’ that the ID could be generated either directly or by using Annex Z and hence we need two references.  But I admit, I did not understand completely the concept behind Annex Z Opaque ID.

 

Thanks

Graham

 

 

From: Harkins, Dan <daniel.harkins@xxxxxxx>
Sent: Wednesday, August 17, 2022 12:02 PM
To: G Smith <gsmith@xxxxxxxxxxxxxxxxxxx>; STDS-802-11-TGBH@xxxxxxxxxxxxxxxxx
Subject: Re: [STDS-802-11-TGBH] Any further discussion on proposed resolution to CIDs 12, 58, and perhaps 25

 

 

  Hi Graham,

 

  You're right that the device ID needs to be useful but it also needs to be untrackable by a 3rd party. That's what annex Z is supposed to do: make a way for a usable device ID—which could be, as you note, a membership number or reference number—to be protected so that the device that uses this ID (this membership number or reference number) over and over as it connects and reconnects can't be tracked.

 

  But to do this we need to "opacicize" (pardon me) the ID before it is sent in the KDE. Yes the KDE is encrypted in the handshake so  this ID is protected from passive observers but the entity receiving the network-assigned ID does not get the cleartext ID at the end of his handshaking with KDEs. If it did, it would be the responsibility of the device to "opacicize" the ID before being sent back to the network and how could it do that unless it knew the secret the network uses to protect IDs? If devices knew this secret they'd be able to decrypt other device's opaque ID blobs and that defeats the whole "do not track" motivation.

 

  So it's not that there's 2 opaques. The useable device ID is not something given by the network back to the device. The device might know it (it's the membership number after all!) but the device is not responsible for "opacicizing" its ID, the network is. So even though the KDE containing this opaque ID is, itself, effectively opaque due to encryption that's just the way it has to work in order to satisfy all those security requirements.

 

  regards,

 

  Dan.

 

--

"the object of life is not to be on the side of the majority, but to

escape finding oneself in the ranks of the insane." – Marcus Aurelius

 

On 8/16/22, 3:08 PM, "G Smith" <gsmith@xxxxxxxxxxxxxxxxxxx> wrote:

 

Hi Mark,

Aha, there’s the difference.  I read Annex Z as an Opaque ID being one step extra to a “standard” ID.  The Opaque ID in Annex Z is effectively a random sequence of bits that needs a further step of decryption before it is useful.  The Device ID in the KDEs could be an ID that actually has some meaning and does not need a further step of decryption. 

 

As I stated at the meeting today, we are forgetting that the ID should actually mean something.   Just knowing that a non-AP STA has returned means nothing – it’s what the higher layer does with it that matters.  In many cases the ID could be a membership number, a reference number, etc. 

 

Anyhow, that is where I am coming from, and I feel that there is a confusion introduced by having two “opaques”.  I am quite happy with Annex Z describing this extra secure, “opaque ID”, but it should be distinguished from the general term of what is actually inserted in the KDEs, e.g., an NGID is carried in the KDE, which may or may not be an opaque ID.

 

Be interested if others are on the same wavelength, or maybe I am out-to-lunch.

 

Best

Graham

 

 

From: mark.hamilton2152@xxxxxxxxx <mark.hamilton2152@xxxxxxxxx>
Sent: Tuesday, August 16, 2022 5:12 PM
To: G Smith <gsmith@xxxxxxxxxxxxxxxxxxx>; STDS-802-11-TGBH@xxxxxxxxxxxxxxxxx
Subject: RE: [STDS-802-11-TGBH] Any further discussion on proposed resolution to CIDs 12, 58, and perhaps 25

 

Graham,

 

I understand your point about “two opaques”.  I never thought of that as a term that means the one in Annex Z, though.  I’ve heard a couple similar comments on calls about this Annex, and it confuses me.  Note that the Annex is explicitly an “Example opaque identifer”.  This is one (example) scheme for generating an opaque identifier.  It could just as easily be an “Example NGID”, as our example for generating NGIDs.  However, (and back to your point about “two opaques”) it does also have an additional attribute that the ID this scheme generates is protected/opaque, even if the ID is passed off to a third party.  To me, that is an interesting additional attribute, but has nothing to do with (or is an unrelated addition to) the “Device ID” being opaque (to third parties) due to the way we implement our protocol exchanges.

 

But, perhaps I am alone in this way of thinking?

Mark

 

From: G Smith <gsmith@xxxxxxxxxxxxxxxxxxx>
Sent: Tuesday, August 16, 2022 2:09 PM
To: mark.hamilton2152@xxxxxxxxx; STDS-802-11-TGBH@xxxxxxxxxxxxxxxxx
Subject: RE: [STDS-802-11-TGBH] Any further discussion on proposed resolution to CIDs 12, 58, and perhaps 25

 

Understood (I re-read the email exchange) but we can’t have two “opaques”.  The ID itself need  not be opaque and the “opaque” version, as per the Annex, is specific.  Encrypted is not “opaque” in my opinion. 

 

I liked the original name “network generated ID”, NGID. 

 

Anyhow see what others think, but I agree that “Device ID” needs to be changed.

 

Graham

 

From: mark.hamilton2152@xxxxxxxxx <mark.hamilton2152@xxxxxxxxx>
Sent: Tuesday, August 16, 2022 1:02 PM
To: G Smith <gsmith@xxxxxxxxxxxxxxxxxxx>; STDS-802-11-TGBH@xxxxxxxxxxxxxxxxx
Subject: RE: [STDS-802-11-TGBH] Any further discussion on proposed resolution to CIDs 12, 58, and perhaps 25

 

Graham,

 

This was discussed a bit on the reflector with Antonio (see emails on July 27).

 

I think we have agreement that it must be opaque to third parties.  So, it seems to be a question about “opaque in what context?”, and what does the group think about the best phrase that captures the answer to that question.

 

Other comments/thoughts?

 

Mark

 

From: G Smith <gsmith@xxxxxxxxxxxxxxxxxxx>
Sent: Tuesday, August 16, 2022 10:57 AM
To: mark.hamilton2152@xxxxxxxxx; STDS-802-11-TGBH@xxxxxxxxxxxxxxxxx
Subject: RE: [STDS-802-11-TGBH] Any further discussion on proposed resolution to CIDs 12, 58, and perhaps 25

 

-          “Persistent Opaque Identifier (POI)”

I was under the impression that the “opaque” bit is optional.  Hence I don’t think I could support this. 

 

Maybe “PSI” for “Persistent Identifier” or “PSID” or “PID”?

 

Graham

 

 

From: Mark Hamilton <mark.hamilton2152@xxxxxxxxx>
Sent: Tuesday, August 16, 2022 11:59 AM
To: STDS-802-11-TGBH@xxxxxxxxxxxxxxxxx
Subject: [STDS-802-11-TGBH] Any further discussion on proposed resolution to CIDs 12, 58, and perhaps 25

 

All,

 

Antonio has proposed on the reflector (and I failed to bring up for discussion on today’s call), the following as resolution to CIDs 12 and 58 (and I think CID 25):

Replace “Device ID”, “opaque identifier”, “identifier”, etc. (all the various phrases we currently have for this concept) with:

-          “Persistent Opaque Identifier (POI)”

Note: Detailed and specific changes to be made to the draft will need to be provided.

 

Please respond if there are concerns with this direction.  I will formulate a motion for our August 30 teleconference in this direction, unless there is concern.

 

Mark


To unsubscribe from the STDS-802-11-TGBH list, click the following link: https://listserv.ieee.org/cgi-bin/wa?SUBED1=STDS-802-11-TGBH&A=1


To unsubscribe from the STDS-802-11-TGBH list, click the following link: https://listserv.ieee.org/cgi-bin/wa?SUBED1=STDS-802-11-TGBH&A=1


To unsubscribe from the STDS-802-11-TGBH list, click the following link: https://listserv.ieee.org/cgi-bin/wa?SUBED1=STDS-802-11-TGBH&A=1