George Stefanick - CWSP Journey, (Chapter 5 – My Notes Post#1) - 7/2/2010
George Stefanick - CWSP Journey, (Chapter 5 – My Notes Post#1) - 7/2/2010
What a busy week… Can I just tell you! On to more important things like my CWSP study. I like to hit the areas that interest me the most when I study. Chapter 5 “802.11 Layer 2 Dynamic Encryption Key Generation” is just that chapter! Why do you ask? Well (Dynamic Encryption Key Generation) is that “black magic” that just happens, right. It’s just there and it works… BUT HOW, really… Let’s take a peek
I’m not new to Chapter 5, but I will tell you it was a great refresher. Not surprised I forgot a lot of the finer details. It has been a longtime … It was a good recap …
I am going to do things a little differently going forward. Since this is my CWSP blog notes, I am going to break up my blog post by sub-chapter with the respected sub topics within the chapter. This will allow me to add my own comments and pixs as needed without having one large blog post. Again remember this is my ramblings and I hope it will add value to your study.
REFERENCE MATERIAL FOR CHAPTER 5 AND NOTES:
Cipher suites
OUI Suite Type Definition
00-0F-AC 0 Use the group cipher suite (only valid for pairwise ciphers)
00-0F-AC 1 WEP-40
00-0F-AC 2 TKIP
00-0F-AC 3 Reserved
00-0F-AC 4 CCMP
Authentication and key management suites
OUI Suite type Authentication Key management
00-0F-AC 1 802.1X or PMK caching Key derivation from preshared master key
00-0F-AC 2 Pre-shared key Key derivation from pre-shared key
MSK = Master Session Key
GMK = Group Master Key
PMK = Pairwise Master Key
GTK = Group Temporal Key
PTK = Pairwise Transient Key
I also referenced the following material to confirm and strengthen my understanding of RSN and dynamic keys.
Official CWSP Study Guide by Sybex - Chapter 5
Official CWSP Study Guide (2nd Edition) by McGraw Hill - Chapter 15
802.11 Wireless Network – The definitive Guide (2nd Edition)
Pgs, 104-105, This shows the complete Cipher Suites, which isn’t found in Chapter 5 of the CWSP (see below). It also is a different authored perspective, but consistent (which is ALWAYS a bonus! LOL)
Pgs, 163-169, Talks about RSN Operations. Very clear and understanding especially after reading Chapter 5.
Real 802.11 Security: Wi-Fi Protected Access and 802.11i - Chapter 7 ,8,9 and 10
IEEE Std 802.11™-2007 - Section 8
Devin Akin (CWNP) – white papers.
What can you say BUT thanks Devin for your hard work and translating the standard for us. These are A MUST READ if you want to ‘glue’ the pieces together.
http://www.cwnp.com/pdf/802.11_RSN_FT.pdf
http://www.airspy.com/uploads/Chicken_Egg.pdf
Other Related Material
Reader Comments