<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.4.15 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" docName="draft-henry-ft-owe-00" category="info">

  <front>
    <title abbrev="FT-OWE">Fast Transition for Opportunistic Wireless Ecnryption (FT-OWE)</title>

    <author initials="J." surname="Henry" fullname="Jerome Henry">
      <organization>Cisco</organization>
      <address>
        <email>jerhenry@cisco.com</email>
      </address>
    </author>
    <author initials="S." surname="Orr" fullname="Stephen Orr">
      <organization>Cisco</organization>
      <address>
        <email>sorr@cisco.com</email>
      </address>
    </author>

    <date year="2021" month="June" day="14"/>

    
    
    

    <abstract>


<t>Opportunistic Wireless Encryption, defined in RFC 8110, specifies an extension to IEEE Std 802.11 to provide for opportunistic (unauthenticated) encryption to a specific wireless access point (AP). This memo extends the method to allow the establishment of OWE keying material to other APs before connection establishment, thus enabling a fast transition mode for OWE.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>This document describes an extension to Opportunistic Wireless Encryption (OWE), defined in [RFC8110], that is compatible with 802.11 multi-AP environments, where encrypted connections are expected between one client and more than one AP, with the light requirement that APs belong to the same Extended Service Set (ESS), i.e. communicate with one another over the same infrastructure.</t>

</section>
<section anchor="requirements-language" title="Requirements language">

<t>In this document, the key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”, “SHOULD”, “SHOULD NOT”, “RECOMMENDED”, “NOT RECOMMENDED”, “MAY”, and “OPTIONAL” are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.</t>

</section>
<section anchor="background" title="Background">

<t>Opportunistic Wireless Encryption provides a mechanism for an 802.11 station (STA) to establish an encrypted connection with an 802.11 access point (AP). OWE does not provide authentication, which means that the STA cannot know if the AP is legitimate or not (i.e. is part of the local network infrastructure or belongs to an attacker).
In many environments, the STA may need to establish an encrypted connection to multiple APs in succession and with short intervals. For example, the 802.11 Fine Timing Measurement (FTM) procedure supposes that a STA would measure its distance to multiple APs (which individual location is shared), and deduce from these measures its own location. To increase the privacy of the exchanges, it is desirable that those exchanges would be protected from eavesdroppers.
In such scenario, the STA would need to establish an encrypted link to each AP, in a rapid and consecutive manner. There is a need for a mechanism to facilitate the secure key exchange between the STA and these APs, without wasting time on each AP channels before ranging can start.
In other scenarios, a STA would obtain information from one AP about other APs, for example through a Neighbor Report. The STA may then need to exchange information with these other APs, such as capabilities, data broadcast information, or more details about the supporting network through ANQP messages. To improve the reliability of the information obtained, the STA may want an indication that the second AP is part of the same system as the first AP.
In such scenario, the STA would need to establish an encrypted link to the second AP, and obtain an indication that the second AP is likely part of the same system as the first AP. An extension of OWE allowing this multi-AP scenario provides such mechanism.</t>

<section anchor="crowd-wisdom" title="Crowd Wisdom">

<t>This requirement is especially present in public settings. A large venue accessible to the general public is likely to include multiple legitimate APs, that are all part of the same system (e.g., “mall Wi-Fi”). There may also be some APs that are legitimate, but that are not part of a larger system (e.g., small store individual AP). Last, there may be one or more illegitimate APs (e.g., attacker APs). Although OWE is not intended to provide authentication, extending OWE to a multiple-APs scenario also has the virtue of providing to the STA this indication that several APs can communicate with one another, and thus have established a trusted relationship over the network (e.g., through a wired communication, directly or via a central WLAN controller). Such communication is not a guarantee that the APs are legitimate, but offers a good indication that, if a first AP provides some information, the second AP is likely to provide information that is consistent of that of the first AP.
As such, if FT-OWE does not provide authentication, it provides an element of crowd wisdom, where a STA can build confidence that a set of APs is coherent. This confidence is useful when a STA needs to exchange information with more than one AP in a short amount of time, and use that information to make a decision. For example, if APs 1 to 3 provide coherent location and ranging information and can communicate with one another, but APs 4 and 5 provide incoherent ranging or location information and cannot communicate with APs 1 to 3, then a location algorithm running on the end device would have no difficulty classifying APs 4 and 5 as suspicious outliers (e.g., possible evil twins), even if they announce the same SSIDs as APs 1 to 3, and even if APs 1 to 3 list APs 4 and 5 MAC addresses (BSSID) as known.
Without the knowledge of such backend trusted communication, the client would be left with location values provided by five APs of equal legitimacy value. The same logic applies to other unauthenticated exchanges, where the STA can easily form coherent groups of APs, which information is likely to display consistent value.</t>

</section>
<section anchor="fast-transition" title="802.11 Fast Transition">

<t>To extend OWE to a multi-AP scenario, a mechanism comparable to 802.11FT is needed. 802.11 Fast Basic Service Set (BSS) Transition (FT) is a mechanism initially intended for associated and authenticated STAs and APs. With FT, a key hierarchy is created. A first level key (called Pairwise Masker Key R0, PMK-R0) is used to generate second level sets of keys (PMK-R1) that are specific to the connection between a STA and an AP.
PMK-R0 is established when the STA connects to the network, and is used to derive the keying material specific to the connection of the STA to the first AP. Then, when the STA detects and needs to transition to a second AP, depending on what is signaled in the Mobility Domain Element from the AP [IEEE802.11] clause 9.4.2.46, the STA will authenticate Over-the-Air or Over-the-DS as defined in [IEEE802.11] section 13.5.
With either method (Over-the-Air or Over-the-DS) the keying material (PMK-R1) required for the secured communication between the STA and the second AP is obtained before the STA joins the second AP. This process allows the STA to expedite the process of joining the second AP and resuming encrypted data exchange.</t>

</section>
</section>
<section anchor="ft-owe-operations" title="FT-OWE Operations">

<section anchor="cryptography-and-key-hierarchy" title="Cryptography and Key Hierarchy">

<t>As specified in [IEEE802.11] clause 12.7.6.1, the PMK is obtained upon successful authentication and association between the STA and the network. In a coordinated network system where APs communicate with one another, it is expected that a single entity (e.g. a Primary AP, or a Wireless LAN Controller) will be in charge of generating the public key defined in [RFC8110] section 4.3.
Once the PMK generation between the STA and the network completes as per [RFC8110] section 4.4, a Master PMK is generated, following the process defined by [IEEE802.11] clause 12.7.1.6.3, where:
MPMK = PMK generated as the result of OWE authentication in [RFC8110] section 4.4 PMKID = Truncate-128(Hash(C | A)) as defined in [RFC8110] section 4.4
Thus where C is the client’s Diffie-Hellman public key from the 802.11 association request, A is the Authenticator (primary AP or WLAN controller) Diffie-Hellman public key from the 802.11 association response, and Hash is the hash algorithm defined in [RFC8110] section 4.1.
Once the MPMK has been derived, each side (AP/WLC and STA) derives the PMK-R0 value, following [IEEE802.11] clause 12.7.1.6.3, and where:
R0-Key-Data = KDF-Hash-Length(MPMK, \FT-R0”, SSIDlength || SSID || MDID || R0KHlength || R0KH-ID || S0KH-ID)
PMK-R0 = L(R0-Key-Data, 0, Q)
PMK-R0Name-Salt = L(R0-Key-Data, Q, 128)
Length = Q + 128
Where Q is the length of the curve p defined in [RFC8110] section 4.1, KDF-Hash-Length is the key derivation function as defined in [IEEE802.11] clause
   12.7.1.6.2 using the hash algorithm identified by [RFC8110] table 2,
      SSIDlength is a single octet whose value is the number of octets in the SSID
      SSID is the service set identifier, a variable length sequence of octets, as it
appears in the Beacon and Probe Response frames
MDID is the Mobility Domain Identifier field from the Mobile Domain element (MDE)
   that was used during FT initial mobility domain association
      R0KHlength is a single octet whose value is the number of octets in the R0KH-ID
      R0KH-ID is the identifier of the holder of PMK-R0 in the Authenticator
      S0KH-ID is the STA, or Supplicant’s MAC address (SPA)
      The PMK-R0 is referenced and named as follows:
    PMKR0Name = Truncate-128(Hash(\FT-R0N” || PMK-R0Name-Salt))
      where Hash is the hash algorithm identified by [RFC8110] table 2,
      \FT-R0N” is treated as an ASCII string
      The PMKR0Name is used to identify the PMK-R0.
      Once the PMK-R0 was determined, each side derives a PMK-R1 key, specific to the
connection between the STA and a given AP, and used to derive the PTK. The PMK-R1 derivation follows the process defined in [IEEE802.11] clause 12.7.1.6.4, where:
      PMK-R1 = KDF-Hash-Length(PMK-R0, \FT-R1”, R1KH-ID || S1KH-ID)
      where KDF-Hash-Length is the key derivation function as defined in [IEEE802.11]
   12.7.1.6.2
Hash is the hash algorithm identified by [RFC8110] table 2
Length is the length of the hash algorithm’s digest
PMK-R0 is the first level key in the FT key hierarchy
R1KH-ID is a MAC address of the holder of the PMK-R1 in the Authenticator of the
AP
S1KH-ID is the SPA
The PMK-R1 is then referenced and named as follows:
PMKR1Name = Truncate-128(Hash(\FT-R1N” || PMKR0Name || R1KH-ID || S1KH-ID)) where Hash is the hash algorithm identified by [RFC8110] table 2
\FT-R1N” is treated as an ASCII string
PMKR1Name is used to identify the PMK-R1.
The PTK is then defined following the KDF method described in [IEEE802.11] clause
12.7.1.6.5.</t>

</section>
<section anchor="ft-owe-discovery" title="FT-OWE Discovery">

<t>An access point advertises support for FT-OWE using an Authentication and Key Management (AKM) suite selector for FT-OWE, illustrated in table 1, in its beacons and probe responses. 
   +———-+——–+——————-+————-+—————-+
   |    OUI   | Suite  |  Authentication   |     Key     |     Key        |
   |          | Type   |     Type          |  Management |   derivation   |
   |          |        |                   |     Type    |     type       |
   +———-+——–+——————-+————-+—————-+
   | 00-0F-AC | [TBD]  | FT-Opportunistic  |   This      |  [IEEE802.11]  |
   |          |        |     Wireless      | Document    |   12.7.1.6.2   |
   |          |        |     Encryption    |             |                |
   +———-+——–+——————-+————-+—————-+
The access point also advertises the Mobility Domain element (MDE) defined in [IEEE8021.11] clause 9.4.2.46. The Mobility Domain element includes the 2-octets Mobility Domain Identifier that names the mobility domain supported by all APs in the same roaming domain, and the FT Capability and Policy Field that indicates if FT is set to occur over the air or over the DS.
A STA in the process of discovering FT-OWE-compliant APs can use the above information, and can also insert the MDE in its probe requests.</t>

</section>
<section anchor="ft-owe-association" title="FT-OWE Association">

<t>Once a STA discovers an FT-OWE-compliant AP, it performs an authentication as defined in [IEEE802.11], with the Authentication Algorithm number set to [TBD] (FT-OWE). The STA then proceeds to the FT-OWE association phase.
In the Association Request frame, the STA includes the MDE defined in [IEEE802.11] and the Diffie-Hellman Parameter element (DHPE) defined in [RFC8110] section 4.3. The DHPE includes the STA public key.
In the Association Response frame, the AP includes the MDE, and the Fast BSS Transition Element (FTE) defined in [IEEE802.11] clause 9.4.2.47. The FTE also includes the R0KH-ID and the R1KH-ID for the AP. The AP also includes the Diffie-Hellman Parameter element (DHPE) defined in [RFC8110] section 4.3. The DHPE includes the AP public key.</t>

</section>
<section anchor="ft-owe-post-association-and-roaming" title="FT-OWE Post-Association and Roaming">

<t>Once association is completed, the STA and the AP derive the PMK-R0, then the PMK-R1 for the current STA/AP pair, then the matching PTK.
Later, the STA will need to establish a secure association with another AP (called the target AP) part of the same mobility domain as a the current AP. In this scenario, it is expected that the STA will have discovered the target AP through a scanning process during which the target AP MAC address was discovered.</t>

<section anchor="over-the-air-ft-owe-authentication" title="Over-the-air FT-OWE authentication">

<t>To perform OTA FT-OWE, the STA follows the process indicated in [IEEE802.11] clause 13.5.2. The STA first sends to the target AP an FT-OWE Authentication Request. The request indicates FT-OWE as the Authentication Algorithm, includes the RSNE with the PMKR0Name value, includes the MDE, and includes the FTE with a SNonce and the R0KH-ID.
It is expected that the target AP should be able to communicate with a primary AP or a WLAN controller, recognize the PMKR0Name and R0KH-ID, and be able to derive the information needed to derive a PMKR1 value.
The target AP responds with an FT-OWE Authentication Response. The response indicates FT-OWE as the Authentication Algorithm, includes the RSNE with the PMKR0Name value, includes the MDE, and includes the FTE with the ANonce, the SNonce, the target AP R1KH-ID and the R0KH-ID.
At this stage, the FT-OWE authentication to the target AP has completed, and stays valid until the expiration of the reassociation deadline time. It is understood that the STA may establish such authentication to multiple target APs.
Later, when the STA needs to associate to the target AP and proceed to secure exchanges, and while the authentication is still valid, the STA sends a FT-OWE reassociation request to the target AP. The request includes the RSNE with the PMKR1Name value, the MDE, the FTE with MIC (as defined in [RFC8110] section 4.4), ANonce, SNonce, the R1KH1-ID obtained during the authentication phase, R0KH-ID, and the Diffie-Hellman Parameter element (DHPE) defined in [RFC8110] section 4.3. The DHPE includes the STA public key.
The Target AP responds with a FT-OWE Reassociation response. The response includes the RSNE with the PMKR1Name for the target AP, the MDE, the FTE with MIC (as defined in [RFC8110] section 4.4), ANonce, SNonce, the target AP R1KH1-ID, R0KH-ID, the and the Diffie-Hellman Parameter element (DHPE) defined in [RFC8110] section 4.3. The DHPE includes the STA public key.
At the conclusion of the reassociation, both sides compute the PMKR1 as described in section 4.4, then the matching PTK.</t>

</section>
<section anchor="over-the-ds-ft-owe-authentication" title="Over-the-DS FT-OWE authentication">

<t>To perform Over-the-DS FT-OWE, the STA follows the process indicated in [IEEE802.11] clause 13.5.3. The STA first sends to the current AP an FT-OWE Request. The request is an action frame, and includes the STA MAC address, the target AP BSSID, the RSNE with the PMKR0Name, the MDE, and the FTE with a SNonce and the R0KH-ID.
The current AP passes the request, over the DS, to the target AP. The target AP responds with a FT Response containing the STA MAC address, the target AP BSSID, the RSNE with the PMKR0Name, the MDE, and the FTE with a MIC (as defined in [RFC8110] section 4.4), ANonce, SNonce, R1KH-ID for the target AP, and R0KH-ID. The current AP relays this response to the STA through an FT Response action frame.
The STA responds with an FT confirm action frame sent to the current AP. The frame includes the STA MAC address, the target AP BSSID, the RSNE with the PMKR1Name (derived from the PMKR0Name, the R1KH-ID obtained above from the target AP, and the STA MAC address (S1KH-ID), as defined in [IEEE802.11] clause 12.7.1.4.1), the MDE, and the FTE with a MIC (as defined in [RFC8110] section 4.4), ANonce, SNonce, R1KH-ID for the target AP, and the R0KH-ID.
The current AP forwards this message over the Distribution System to the target AP. The target AP then replies with an FT ACK message, that includes the STA MAC address, the target AP BSSID, the RSNE with the PMKR1Name, the MDE, the FTE with a MIC ((as defined in [RFC8110] section 4.4), the ANonce, Snonce, R1KH-ID and R0KH-ID, and the Timeout Interval Element (TIE) that specifies the reassociation deadline value.
At this stage, the FT-OWE authentication to the target AP has completed, and stays valid until the expiration of the reassociation deadline time. It is understood that the STA may establish such authentication to multiple target APs.
Later, when the STA needs to associate to the target AP and proceed to secure exchanges, and while the authentication is still valid, the STA proceeds through the FT-OWE reassociation exchange with the target AP as described in section 4.4.1.</t>

</section>
</section>
</section>
<section anchor="iana-considerations" title="IANA Considerations">

<t>This document does not require any IANA actions.</t>

</section>
<section anchor="security-considerations" title="Security Considerations">

<t>FT-OWE does not provide authentication. FT-OWE provides a cryptographic assurance that a target AP with which a STA has established an FT-OWE connection is derived from an FT-OWE connection to its current AP, assuring each AP (current and target) have a trusted network connection with each other, and thus the information provided by both APs are likely coherent.
FT-OWE does not guarantee that the APs are legitimate. When a large set of APs provide coherent information and allow for FT-OWE communication, it is likely that all these APs are part of the same system. The system may be legitimate or not.
OWE is not a replacement for any authentication protocol specified in [IEEE802.11] and is not intended to be used when an alternative that provides real authentication is available.</t>

</section>


  </middle>

  <back>





  </back>

<!-- ##markdown-source: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-->

</rfc>

