Preemption and MACsec replay protection Preemption and MACsec replay protection

نویسنده

  • Mick Seaman
چکیده

Mick Seaman Use of the proposed IEEE 802.3 Ethernet frame preemption capability could result in frame reordering. Without a change in the MACsec specification (IEEE Std 802.1AE) or in the way it is used it would not be possible to use MACsec to provide strict replay protection. This note has been revised to detail the use of multiple SCs1 per port, following the 802.1 Security Task Group discussions2 at the November 2014 meeting. This is the preferred approach to maintaining the current replay protection capabilities because it also addresses traffic class based reordering by Ethernet Virtual Circuits and similar provider network services3. The discussion of alternative approaches has been retained (somewhat reordered) for the record. The use of multiple SCs by a single MKA participant requires some changes to 802.1X4 and to existing MKA implementations. This note points out just how simple these can be. An existing and unchanged conformant implementation of MACsec/MKA should interoperate with one that uses traffic class grouping SCs. ________________________________________________________________________

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Linux Based Implementation of MACSec Key Agreement ( MKA )

–IEEE 802.1AE and IEEE 802.1AF are two IEEE 802.1X standards providing security to the data link layer. The IEEE 802.1AE is the IEEE MAC Security standard (also known as MACSec), it defines data confidentiality and integrity for media access independent protocols but lacks in providing key management and the establishment of secure associations. IEEE 802.1AF MACSec Key Agreement will facilitate...

متن کامل

Optimizing the Replay Protection at the Link Layer Security Framework in Wireless Sensor Networks

Ensuring communications security in Wireless Sensor Networks (WSNs) is very vital because the security protocols therein, should be devised to work at the link layer. Theoretically, any link layer security protocol must support three vital security attributes viz. Confidentiality, Message Integrity and Replay protection. However, in order to ensure lesser overhead, replay protection is often no...

متن کامل

The Economic Impact of Eliminating Preemption of State Consumer Protection Laws

In July 2009, the Obama Administration proposed legislation that would create a Consumer Financial Protection Agency (“CFPA”). Among other items, the proposed legislation would eliminate federal preemption of state consumer protection laws, which would encourage states to reintroduce a scattering of local rules and regulations. Federal rules promulgated by the newly created Consumer Financial P...

متن کامل

Malice versus AN.ON: Possible Risks of Missing Replay and Integrity Protection

In this paper we investigate the impact of missing replay protection as well as missing integrity protection concerning a local attacker in AN.ON. AN.ON is a low latency anonymity network mostly used to anonymize web traffic. We demonstrate that both protection mechanisms are important by presenting two attacks that become feasible as soon as the mechanisms are missing. We mount both attacks on...

متن کامل

Modifying the Black-Scholes model to valuate preemption right

In this paper, we try and valuate preemption rights by modifying the Black-Scholes model, which is widely used to valuate options and other derivatives. Here we first present the basics of the Black-Scholes model and then we discus modification of the model to be fit for preemption right valuation. At the end, we valuate four of the preemptive rights using the proposed model

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013