SlideShare a Scribd company logo
1 of 18
802.11r [Fast BSS Transition]
Shashank Tadakamadla
Outline
 802.11r & its purpose
 Types of 802.11r
 802.11r Capability Detection
 Basic 4-way Handshake
 FT 4-way Handshake
 FT Key Hierarchy
 Over the Air
 Over the Distributed System
802.11r [Fast BSS Transition]
 IEEE 802.11r specifies Fast Basic Service Set [BSS] Transitions [FT] between access
points by redefining the security key negotiation protocol, allowing both the
negotiation and requests for wireless resources to occur in parallel.
 802.11r is a mechanism to reduce the time of ASSOCIATION between client and
AP, when client roams between different APs of a same Extended Service
Set[ESS].
 Purpose
 Traffic types such as VOIP, VoWiFi should not be delayed or dropped by
devices. Hence, such applications require FT mechanism implemented when
client roams from AP to AP in a same Extended Service Set [ESS]
Types of 802.11r
 FT Mechanisms supported by Wi-Fi devices can be of two types:
 Over The Air
 Over The Distributed System [DS]
 Over The Air
 The client communicates directly with the target AP using IEEE 802.11 FT-
Authentication and FT-(Re)Association frames to complete
Authentication between client and target AP and to generate required keys
for encryption of unicast and multicast traffic.
 Over The DS
 The client communicates with the target AP through the current AP. The
communication between the client and the target AP is carried in FT
action frames between the client and the current AP and is then sent
through the Central Management Entity [CME] or Controller.
IE’s Introduced By 802.11r
 Following Information Elements [IE] are introduced by 802.11r
 Mobility Domain
 Fast BSS Transition
 Mobility Domain IE
 This IE is used in detecting support of 802.11r by an AP.
 Mobility Domain Identifier: This is the string or value
which helps the Client to understand if it can roam
between APs of same ESS using 802.11r mechanism.
 Fast BSS Transition over DS: If this value is set, it indicates
that over the DS mechanism is supported else Over the
Air mechanism is supported.
 Fast BSS Transition IE.
 This IE includes information needed to perform the FT
authentication sequence during a fast BSS transition in an
RSN.
 This IE is present in FT-Authentication, FT-
(Re)Association frames transmitted by devices that
support 802.11r.
 This IE is present in EAPOL frames that are involved in 4-
way handshake with the Current AP [First AP that a
Client connects in an ESS.
 This IE provides information related to parameters as
below:
‐ R0-KH ID / R0-KH Name
‐ R1-KH ID / R1-KH Name
‐ PMK-R0 / PMK-R1
Detection of 802.11r
 RSN and MD are the IE that user need to look if an AP supports
802.11r
 RSN IE
 This IE is used in detecting support of 802.11r by an AP.
 Authentication Key Management [AKM] does advertise
type of key management with FT Support.
 This information carries PMKR1-Name in 4-way
handshake EAPOL frames to derive PTK & GTK.
 AP
 It advertises 802.11r capability in Management frames such
as Beacon, Probe Response and (Re)Association Response
frames.
 Client
 It advertises its 802.11r capability in Management frames
such as (Re)Association Request frames.
Basic 4-Way Handshake
 4-way handshake is used by security protocols such as
WPA/WAP2/802.1x. Purpose of WPA [TKIP], WPA2
[TKIP/CCMP], 802.1x is to generate dynamic unique encryption
keys for each clients connected to an AP.
 Two different keys are generated using 4-way handshake
 Pairwise Transient Key [PTK]
 Group Temporal Key [GTK]
 Pairwise Transient Key
 A value that is derived from Pairwise Master Key [PMK],
Authenticator Address [AA], Supplicant Address [SA],
Authenticator Nonce [ANonce], Supplicant Nonce
[Snonce] using the pseudo-random function [PRF].
 This key is used by AP and Clients to encrypt unicast
frames that are transmitted between AP and a Client.
 Group Temporal Key
 A random vale derived by AP and shared with all the clients
connected to a Basic Service Set Identifier [BSSID]
 As per the standard, it is mandatory that GTK value should
be updated whenever a Client is moved away/disconnected
from a BSSID.
 This key is used by AP and Clients to encrypt
broadcast/multicast frames that are transmitted between
AP and a Client.
Basic 4-Way Handshake
FT 4-Way Handshake
 FT 4-way handshake
 It takes place between Initial AP and a Client in a ESS.
 This mechanism is not much different from pre-802.11r
devices. Some additional information is carried in the
EAPOL frames.
 Additional information that is carried in the EAPOL
frames is as follows:
‐ Mobility Domain IE
‐ Fast BSS Transition IE
‐ PMK-R1
 Above additional information with basic 4-way handshake
information is used in determining PTK and GTK.
FT 4-Way Handshake
FT Key Hierarchy
 As you can see in the diagram, FT Key hierarchy consists of three
levels.
 R0KH Key Holder
‐ PMK-R0 – the first-level key of the FT key hierarchy.
This key is derived as a function of the master session
key (MSK) or PSK. It is stored by the PMK-R0 key
holders, R0KH and S0KH.
 R1KH Key Holder
‐ PMK-R1 – the second-level key of the FT key
hierarchy, This key is mutually derived by the S0KH
and R0KH.
 S0KH/S1KH Key Holder
‐ PTK – the third-level key of the FT key hierarchy that
defines the IEEE 802.11 and IEEE 802.1X protection
keys. The PTK is mutually derived by the PMK-R1 key
holders, R1KH and S1KH.
FT Key Hierarchy
 Below is the short description of how keys are generated:
 R0-Key-Data = KDF-384 (XXKey, "R0 Key Derivation", SSIDlength || SSID
|| MDID || R0KH-ID || 0x00 || SPA)
 PMK-R0 = L(R0-Key-Data, 0, 256)
 PMK-R0 key shall be computed as the first 256 bits (bits 0-255) of the R0-
Key-Data. The latter 128 bits of R0-Key-Data shall be used as the PMK-
R0Name-Salt to generate the PMKR0Name.
 PMK-R1 = KDF-256(PMK-R0, "FT-R1", R1KH-ID || S1KH-ID)
 PMKR0Name = Truncate-128(SHA-256("R0 Key Name" || SSIDlength ||
SSID || MDID || R0KH-ID || 0x00 || SPA || PMK-R0Name-Salt))
 PMKR1Name = Truncate-128(SHA-256(“R1 Key Name” || PMKR0Name ||
R1KH-ID || 0x00 || SPA))
FT - Over The Air
 This mechanisms allows the Client or Station[STA] to connect to
Target AP using FT-Authentication and FT-(Re)Association
frames.
 As per 802.11r, PTK and GTK keys are generated for a client using
FT-Authentication and FT-(Re)Association frames by depleting 4-
way handshake mechanism.
FT - Over The Air
FT - Over The Air
FT – Over the DS
 This mechanisms allows the Client or Station[STA] to connect to
Target AP using FT-Action and FT-(Re)Association frames.
 As per 802.11r, PTK and GTK keys are generated for a client using
FT-Action and FT-(Re)Association frames by depleting 4-way
handshake mechanism.
 FT-Action frames do not communicate directly with Target AP
but via Current AP through some central entity such as
Controller.
 The dotted lines in the state diagram indicates that the Client
communicates through Current AP to get authenticated with
Target AP. In real time deployments, it happens through a central
entity such as Controllers.
FT – Over the DS
For any queries, please mail me at
shashank.tadakamadla@gmail.com

More Related Content

What's hot

Remote access service
Remote access serviceRemote access service
Remote access serviceApoorw Pandey
 
Webinar ABAP Managed Database Procedures
Webinar ABAP Managed Database ProceduresWebinar ABAP Managed Database Procedures
Webinar ABAP Managed Database ProceduresCadaxo GmbH
 
Ericsson interview
Ericsson interviewEricsson interview
Ericsson interviewSatish Jadav
 
Hacking Telco equipment: The HLR/HSS, by Laurent Ghigonis
Hacking Telco equipment: The HLR/HSS, by Laurent GhigonisHacking Telco equipment: The HLR/HSS, by Laurent Ghigonis
Hacking Telco equipment: The HLR/HSS, by Laurent GhigonisP1Security
 
5 initial access to palo alto using cli
5 initial access to palo alto using cli5 initial access to palo alto using cli
5 initial access to palo alto using cliMostafa El Lathy
 
EIGRP (Enhanced Interior Gateway Routing Protocol)
EIGRP (Enhanced Interior Gateway Routing Protocol)EIGRP (Enhanced Interior Gateway Routing Protocol)
EIGRP (Enhanced Interior Gateway Routing Protocol)NetProtocol Xpert
 
VoWifi 03 - vowifi epdg aaa and architecture (pdf ppt)
VoWifi 03 - vowifi epdg aaa and architecture (pdf ppt)VoWifi 03 - vowifi epdg aaa and architecture (pdf ppt)
VoWifi 03 - vowifi epdg aaa and architecture (pdf ppt)Vikas Shokeen
 
Chap 4. call processing and handover.eng
Chap 4. call processing and handover.engChap 4. call processing and handover.eng
Chap 4. call processing and handover.engsivakumar D
 
Linux 802.11 subsystem and brcmsmac WLAN driver
Linux 802.11 subsystem and brcmsmac WLAN driverLinux 802.11 subsystem and brcmsmac WLAN driver
Linux 802.11 subsystem and brcmsmac WLAN driverMidhun Lohidakshan
 
Top 9 sip interview questions answers
Top 9 sip interview questions answersTop 9 sip interview questions answers
Top 9 sip interview questions answersjonhmart036
 
EIGRP Routing Protocols
EIGRP Routing ProtocolsEIGRP Routing Protocols
EIGRP Routing Protocolssul6an14
 

What's hot (20)

EMEA Airheads- Virtual Switching Framework- Aruba OS Switch
EMEA Airheads- Virtual Switching Framework- Aruba OS SwitchEMEA Airheads- Virtual Switching Framework- Aruba OS Switch
EMEA Airheads- Virtual Switching Framework- Aruba OS Switch
 
IPv6 Addressing
IPv6 AddressingIPv6 Addressing
IPv6 Addressing
 
Remote access service
Remote access serviceRemote access service
Remote access service
 
IS-IS Protocol Introduction
IS-IS Protocol IntroductionIS-IS Protocol Introduction
IS-IS Protocol Introduction
 
Webinar ABAP Managed Database Procedures
Webinar ABAP Managed Database ProceduresWebinar ABAP Managed Database Procedures
Webinar ABAP Managed Database Procedures
 
Ericsson interview
Ericsson interviewEricsson interview
Ericsson interview
 
EMEA Airheads- ArubaOS - High availability with AP Fast Failover
EMEA Airheads- ArubaOS - High availability with AP Fast FailoverEMEA Airheads- ArubaOS - High availability with AP Fast Failover
EMEA Airheads- ArubaOS - High availability with AP Fast Failover
 
Hacking Telco equipment: The HLR/HSS, by Laurent Ghigonis
Hacking Telco equipment: The HLR/HSS, by Laurent GhigonisHacking Telco equipment: The HLR/HSS, by Laurent Ghigonis
Hacking Telco equipment: The HLR/HSS, by Laurent Ghigonis
 
5 initial access to palo alto using cli
5 initial access to palo alto using cli5 initial access to palo alto using cli
5 initial access to palo alto using cli
 
EIGRP (Enhanced Interior Gateway Routing Protocol)
EIGRP (Enhanced Interior Gateway Routing Protocol)EIGRP (Enhanced Interior Gateway Routing Protocol)
EIGRP (Enhanced Interior Gateway Routing Protocol)
 
VoWifi 03 - vowifi epdg aaa and architecture (pdf ppt)
VoWifi 03 - vowifi epdg aaa and architecture (pdf ppt)VoWifi 03 - vowifi epdg aaa and architecture (pdf ppt)
VoWifi 03 - vowifi epdg aaa and architecture (pdf ppt)
 
CCNP Security-VPN
CCNP Security-VPNCCNP Security-VPN
CCNP Security-VPN
 
Chap 4. call processing and handover.eng
Chap 4. call processing and handover.engChap 4. call processing and handover.eng
Chap 4. call processing and handover.eng
 
IS-IS Protocol
IS-IS ProtocolIS-IS Protocol
IS-IS Protocol
 
Getting the most out of the aruba policy enforcement firewall
Getting the most out of the aruba policy enforcement firewallGetting the most out of the aruba policy enforcement firewall
Getting the most out of the aruba policy enforcement firewall
 
Rfid ppt
Rfid pptRfid ppt
Rfid ppt
 
Linux 802.11 subsystem and brcmsmac WLAN driver
Linux 802.11 subsystem and brcmsmac WLAN driverLinux 802.11 subsystem and brcmsmac WLAN driver
Linux 802.11 subsystem and brcmsmac WLAN driver
 
Top 9 sip interview questions answers
Top 9 sip interview questions answersTop 9 sip interview questions answers
Top 9 sip interview questions answers
 
EIGRP Routing Protocols
EIGRP Routing ProtocolsEIGRP Routing Protocols
EIGRP Routing Protocols
 
Cisco CCNA- DHCP Server
Cisco CCNA-  DHCP ServerCisco CCNA-  DHCP Server
Cisco CCNA- DHCP Server
 

Similar to 802.11r enhanced

Similar to 802.11r enhanced (20)

Fast Roaming 802.11r.docx
Fast Roaming 802.11r.docxFast Roaming 802.11r.docx
Fast Roaming 802.11r.docx
 
WLAN and IP security
WLAN and IP securityWLAN and IP security
WLAN and IP security
 
Ieee 802.11overview
Ieee 802.11overviewIeee 802.11overview
Ieee 802.11overview
 
AAA Best Practices
AAA Best PracticesAAA Best Practices
AAA Best Practices
 
80211
8021180211
80211
 
SECURE KEY MANAGEMENT PROTOCOL IN WIMAX
SECURE KEY MANAGEMENT PROTOCOL IN WIMAXSECURE KEY MANAGEMENT PROTOCOL IN WIMAX
SECURE KEY MANAGEMENT PROTOCOL IN WIMAX
 
Training Day Slides
Training Day SlidesTraining Day Slides
Training Day Slides
 
Introduction to Diameter Protocol - Part1
Introduction to Diameter Protocol - Part1Introduction to Diameter Protocol - Part1
Introduction to Diameter Protocol - Part1
 
1643129870-internet-security.pptx
1643129870-internet-security.pptx1643129870-internet-security.pptx
1643129870-internet-security.pptx
 
Chapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptxChapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptx
 
Web Security
Web SecurityWeb Security
Web Security
 
Y36146148
Y36146148Y36146148
Y36146148
 
КЛМ_Урок 2
КЛМ_Урок 2КЛМ_Урок 2
КЛМ_Урок 2
 
КЛМ_Урок 1
КЛМ_Урок 1КЛМ_Урок 1
КЛМ_Урок 1
 
Lte questions adv
Lte questions advLte questions adv
Lte questions adv
 
K43066774
K43066774K43066774
K43066774
 
Cert0101 HPE6-A42 & HPE6-A70.pdf
Cert0101 HPE6-A42 & HPE6-A70.pdfCert0101 HPE6-A42 & HPE6-A70.pdf
Cert0101 HPE6-A42 & HPE6-A70.pdf
 
Ip Sec
Ip SecIp Sec
Ip Sec
 
Ip Sec Rev1
Ip Sec Rev1Ip Sec Rev1
Ip Sec Rev1
 
LAS16-306: Exploring the Open Trusted Protocol
LAS16-306: Exploring the Open Trusted ProtocolLAS16-306: Exploring the Open Trusted Protocol
LAS16-306: Exploring the Open Trusted Protocol
 

Recently uploaded

भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 

Recently uploaded (20)

भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 

802.11r enhanced

  • 1. 802.11r [Fast BSS Transition] Shashank Tadakamadla
  • 2. Outline  802.11r & its purpose  Types of 802.11r  802.11r Capability Detection  Basic 4-way Handshake  FT 4-way Handshake  FT Key Hierarchy  Over the Air  Over the Distributed System
  • 3. 802.11r [Fast BSS Transition]  IEEE 802.11r specifies Fast Basic Service Set [BSS] Transitions [FT] between access points by redefining the security key negotiation protocol, allowing both the negotiation and requests for wireless resources to occur in parallel.  802.11r is a mechanism to reduce the time of ASSOCIATION between client and AP, when client roams between different APs of a same Extended Service Set[ESS].  Purpose  Traffic types such as VOIP, VoWiFi should not be delayed or dropped by devices. Hence, such applications require FT mechanism implemented when client roams from AP to AP in a same Extended Service Set [ESS]
  • 4. Types of 802.11r  FT Mechanisms supported by Wi-Fi devices can be of two types:  Over The Air  Over The Distributed System [DS]  Over The Air  The client communicates directly with the target AP using IEEE 802.11 FT- Authentication and FT-(Re)Association frames to complete Authentication between client and target AP and to generate required keys for encryption of unicast and multicast traffic.  Over The DS  The client communicates with the target AP through the current AP. The communication between the client and the target AP is carried in FT action frames between the client and the current AP and is then sent through the Central Management Entity [CME] or Controller.
  • 5. IE’s Introduced By 802.11r  Following Information Elements [IE] are introduced by 802.11r  Mobility Domain  Fast BSS Transition  Mobility Domain IE  This IE is used in detecting support of 802.11r by an AP.  Mobility Domain Identifier: This is the string or value which helps the Client to understand if it can roam between APs of same ESS using 802.11r mechanism.  Fast BSS Transition over DS: If this value is set, it indicates that over the DS mechanism is supported else Over the Air mechanism is supported.  Fast BSS Transition IE.  This IE includes information needed to perform the FT authentication sequence during a fast BSS transition in an RSN.  This IE is present in FT-Authentication, FT- (Re)Association frames transmitted by devices that support 802.11r.  This IE is present in EAPOL frames that are involved in 4- way handshake with the Current AP [First AP that a Client connects in an ESS.  This IE provides information related to parameters as below: ‐ R0-KH ID / R0-KH Name ‐ R1-KH ID / R1-KH Name ‐ PMK-R0 / PMK-R1
  • 6. Detection of 802.11r  RSN and MD are the IE that user need to look if an AP supports 802.11r  RSN IE  This IE is used in detecting support of 802.11r by an AP.  Authentication Key Management [AKM] does advertise type of key management with FT Support.  This information carries PMKR1-Name in 4-way handshake EAPOL frames to derive PTK & GTK.  AP  It advertises 802.11r capability in Management frames such as Beacon, Probe Response and (Re)Association Response frames.  Client  It advertises its 802.11r capability in Management frames such as (Re)Association Request frames.
  • 7. Basic 4-Way Handshake  4-way handshake is used by security protocols such as WPA/WAP2/802.1x. Purpose of WPA [TKIP], WPA2 [TKIP/CCMP], 802.1x is to generate dynamic unique encryption keys for each clients connected to an AP.  Two different keys are generated using 4-way handshake  Pairwise Transient Key [PTK]  Group Temporal Key [GTK]  Pairwise Transient Key  A value that is derived from Pairwise Master Key [PMK], Authenticator Address [AA], Supplicant Address [SA], Authenticator Nonce [ANonce], Supplicant Nonce [Snonce] using the pseudo-random function [PRF].  This key is used by AP and Clients to encrypt unicast frames that are transmitted between AP and a Client.  Group Temporal Key  A random vale derived by AP and shared with all the clients connected to a Basic Service Set Identifier [BSSID]  As per the standard, it is mandatory that GTK value should be updated whenever a Client is moved away/disconnected from a BSSID.  This key is used by AP and Clients to encrypt broadcast/multicast frames that are transmitted between AP and a Client.
  • 9. FT 4-Way Handshake  FT 4-way handshake  It takes place between Initial AP and a Client in a ESS.  This mechanism is not much different from pre-802.11r devices. Some additional information is carried in the EAPOL frames.  Additional information that is carried in the EAPOL frames is as follows: ‐ Mobility Domain IE ‐ Fast BSS Transition IE ‐ PMK-R1  Above additional information with basic 4-way handshake information is used in determining PTK and GTK.
  • 11. FT Key Hierarchy  As you can see in the diagram, FT Key hierarchy consists of three levels.  R0KH Key Holder ‐ PMK-R0 – the first-level key of the FT key hierarchy. This key is derived as a function of the master session key (MSK) or PSK. It is stored by the PMK-R0 key holders, R0KH and S0KH.  R1KH Key Holder ‐ PMK-R1 – the second-level key of the FT key hierarchy, This key is mutually derived by the S0KH and R0KH.  S0KH/S1KH Key Holder ‐ PTK – the third-level key of the FT key hierarchy that defines the IEEE 802.11 and IEEE 802.1X protection keys. The PTK is mutually derived by the PMK-R1 key holders, R1KH and S1KH.
  • 12. FT Key Hierarchy  Below is the short description of how keys are generated:  R0-Key-Data = KDF-384 (XXKey, "R0 Key Derivation", SSIDlength || SSID || MDID || R0KH-ID || 0x00 || SPA)  PMK-R0 = L(R0-Key-Data, 0, 256)  PMK-R0 key shall be computed as the first 256 bits (bits 0-255) of the R0- Key-Data. The latter 128 bits of R0-Key-Data shall be used as the PMK- R0Name-Salt to generate the PMKR0Name.  PMK-R1 = KDF-256(PMK-R0, "FT-R1", R1KH-ID || S1KH-ID)  PMKR0Name = Truncate-128(SHA-256("R0 Key Name" || SSIDlength || SSID || MDID || R0KH-ID || 0x00 || SPA || PMK-R0Name-Salt))  PMKR1Name = Truncate-128(SHA-256(“R1 Key Name” || PMKR0Name || R1KH-ID || 0x00 || SPA))
  • 13. FT - Over The Air  This mechanisms allows the Client or Station[STA] to connect to Target AP using FT-Authentication and FT-(Re)Association frames.  As per 802.11r, PTK and GTK keys are generated for a client using FT-Authentication and FT-(Re)Association frames by depleting 4- way handshake mechanism.
  • 14. FT - Over The Air
  • 15. FT - Over The Air
  • 16. FT – Over the DS  This mechanisms allows the Client or Station[STA] to connect to Target AP using FT-Action and FT-(Re)Association frames.  As per 802.11r, PTK and GTK keys are generated for a client using FT-Action and FT-(Re)Association frames by depleting 4-way handshake mechanism.  FT-Action frames do not communicate directly with Target AP but via Current AP through some central entity such as Controller.  The dotted lines in the state diagram indicates that the Client communicates through Current AP to get authenticated with Target AP. In real time deployments, it happens through a central entity such as Controllers.
  • 17. FT – Over the DS
  • 18. For any queries, please mail me at shashank.tadakamadla@gmail.com