Information technology — Telecommunications and information exchange between systems — Local and metropolitan area networks — Part 1AE: Media access control (MAC) security

ISO/IEC/IEEE 8802-1AE:2013 specifies how all or part of a network can be secured transparently to peer protocol entities that use the MAC Service provided by IEEE 802 local area networks (LANs) to communicate. MAC security (MACsec) provides connectionless user data confidentiality, frame data integrity, and data origin authenticity.

Technologies de l'information — Télécommunications et échange d'information entre systèmes — Réseaux locaux et métropolitains — Partie 1AE: Sécurité du contrôle d'accès aux supports (MAC)

General Information

Status
Withdrawn
Publication Date
25-Nov-2013
Withdrawal Date
25-Nov-2013
Current Stage
9599 - Withdrawal of International Standard
Completion Date
21-Aug-2020
Ref Project

Relations

Buy Standard

Standard
ISO/IEC/IEEE 8802-1AE:2013 - Information technology -- Telecommunications and information exchange between systems -- Local and metropolitan area networks
English language
144 pages
sale 15% off
Preview
sale 15% off
Preview

Standards Content (Sample)

INTERNATIONAL ISO/IEC/
STANDARD IEEE
8802-1AE
First edition
2013-12-01


Information technology —
Telecommunications and information
exchange between systems — Local and
metropolitan area networks —
Part 1AE:
Media access control (MAC) security
Technologies de l'information — Télécommunications et échange
d'information entre systèmes — Réseaux locaux et métropolitains —
Partie 1AE: Sécurité du contrôle d'accès aux supports (MAC)




Reference number
ISO/IEC/IEEE 8802-1AE:2013(E)

©
IEEE 2006

---------------------- Page: 1 ----------------------
ISO/IEC/IEEE 8802-1AE:2013(E)

©  IEEE 2006
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized otherwise in any form or by any
means, electronic or mechanical, including photocopying, or posting on the internet or an intranet, without permission in writing from ISO,
IEC or IEEE at the respective address below.
ISO copyright office IEC Central Office Institute of Electrical and Electronics Engineers, Inc.
Case postale 56 3, rue de Varembé 3 Park Avenue, New York
CH-1211 Geneva 20 CH-1211 Geneva 20 NY 10016-5997, USA
Tel. + 41 22 749 01 11 Switzerland E-mail stds.ipr@ieee.org
Fax + 41 22 749 09 47 E-mail inmail@iec.ch Web www.ieee.org
E-mail copyright@iso.org Web www.iec.ch
Web www.iso.org
Published in Switzerland

ii © IEEE 2006 – All rights reserved

---------------------- Page: 2 ----------------------
ISO/IEC/IEEE 8802-1AE:2013(E)
Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical
Commission) form the specialized system for worldwide standardization. National bodies that are members of
ISO or IEC participate in the development of International Standards through technical committees established
by the respective organization to deal with particular fields of technical activity. ISO and IEC technical
committees collaborate in fields of mutual interest. Other international organizations, governmental and non-
governmental, in liaison with ISO and IEC, also take part in the work. In the field of information technology, ISO
and IEC have established a joint technical committee, ISO/IEC JTC 1.
IEEE Standards documents are developed within the IEEE Societies and the Standards Coordinating
Committees of the IEEE Standards Association (IEEE-SA) Standards Board. The IEEE develops its standards
through a consensus development process, approved by the American National Standards Institute, which
brings together volunteers representing varied viewpoints and interests to achieve the final product. Volunteers
are not necessarily members of the Institute and serve without compensation. While the IEEE administers the
process and establishes rules to promote fairness in the consensus development process, the IEEE does not
independently evaluate, test, or verify the accuracy of any of the information contained in its standards.
The main task of ISO/IEC JTC 1 is to prepare International Standards. Draft International Standards adopted
by the joint technical committee are circulated to national bodies for voting. Publication as an International
Standard requires approval by at least 75 % of the national bodies casting a vote.
Attention is called to the possibility that implementation of this standard may require the use of subject matter
covered by patent rights. By publication of this standard, no position is taken with respect to the existence or
validity of any patent rights in connection therewith. ISO/IEEE is not responsible for identifying essential
patents or patent claims for which a license may be required, for conducting inquiries into the legal validity or
scope of patents or patent claims or determining whether any licensing terms or conditions provided in
connection with submission of a Letter of Assurance or a Patent Statement and Licensing Declaration Form, if
any, or in any licensing agreements are reasonable or non-discriminatory. Users of this standard are expressly
advised that determination of the validity of any patent rights, and the risk of infringement of such rights, is
entirely their own responsibility. Further information may be obtained from ISO or the IEEE Standards
Association.
ISO/IEC/IEEE 8802-1AE was prepared by the LAN/MAN Standards Committee of the IEEE Computer Society
(as IEEE Std 802.1AE-2006). It was adopted by Joint Technical Committee ISO/IEC JTC 1, Information
technology, Subcommittee SC 6, Telecommunications and information exchange between systems, in parallel
with its approval by the ISO/IEC national bodies, under the “fast-track procedure” defined in the Partner
Standards Development Organization cooperation agreement between ISO and IEEE. IEEE is responsible for
the maintenance of this document with participation and input from ISO/IEC national bodies.
ISO/IEC/IEEE 8802 consists of the following parts, under the general title Information technology —
Telecommunications and information exchange between systems — Local and metropolitan area networks:
— Part 11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifications
— Part 1X: Port-based network access control
— Part 1AE: Media access control (MAC) security
— Part 15-4: Wireless medium access control (MAC) and physical layer (PHY) specifications for low-rate
wireless personal area networks (WPANs)

© IEEE 2006 – All rights reserved iii

---------------------- Page: 3 ----------------------
ISO/IEC/IEEE 8802-1AE:2013(E)

(blank page)
iv © IEEE 2006 – All rights reserved

---------------------- Page: 4 ----------------------
ISO/IEC/IEEE 8802-1AE:2013(E)
I E E E Standard for
Local and metropolitan area networks
Media Access Control (MAC) Security
IEEE Computer Society
Sponsored by the
LAN/MAN Standards Committee
I E E E

3 Park Avenue IEEE Std 802.1AE -2006
New York, NY 10016-5997, USA
18 August 2006
Copyright © 2006 IEEE. All rights reserved. v

---------------------- Page: 5 ----------------------
ISO/IEC/IEEE 8802-1AE:2013(E)
(blank page)
vi Copyright © 2006 IEEE. All rights reserved.

---------------------- Page: 6 ----------------------
ISO/IEC/IEEE 8802-1AE:2013(E)

IEEE Std 802.1AE -2006
IEEE Standard for
Local and metropolitan area networks:
Media Access Control (MAC) Security
Sponsor
LAN/MAN Standards Committee
of the
IEEE Computer Society
Approved 8 June 2006
IEEE-SA Standards Board
Copyright © 2006 IEEE. All rights reserved. vii

---------------------- Page: 7 ----------------------
ISO/IEC/IEEE 8802-1AE:2013(E)
Abstract: This standard specifies how all or part of a network can be secured transparently to peer
®
protocol entities that use the MAC Service provided by IEEE 802 LANs to communicate. MAC
security (MACsec) provides connectionless user data confidentiality, frame data integrity, and data
origin authenticity.
Keywords: authorized port, data origin authenticity, integrity/confidentiality, LANs, local area
networks, MAC Bridges, MAC security and tack, MAC Service, MANs, metropolitan area
networks, MSAP, port-based network access control, secure association, security, service access
point, transparent bridging
The Institute of Electrical and Electronics Engineers, Inc.
3 Park Avenue, New York, NY 10016-5997, USA
Copyright © 2006 by the Institute of Electrical and Electronics Engineers, Inc.
All rights reserved. Published 18 August 2006. Printed in the United States of America.
IEEE and 802 are both registered trademarks in the U.S. Patent & Trademark Office, owned by the Institute of Electrical
and Electronics Engineers, Incorporated.
Print: ISBN 0-7381-4990-X SH95549
PDF: ISBN 0-7381-4991-8 SS95549
No part of this publication may be reproduced in any form, in an electronic retrieval system or otherwise, without the prior
written permission of the publisher.
viii Copyright © 2006 IEEE. All rights reserved.

---------------------- Page: 8 ----------------------
ISO/IEC/IEEE 8802-1AE:2013(E)
IEEE Standards documents are developed within the IEEE Societies and the Standards Coordinating
Committees of the IEEE Standards Association (IEEE-SA) Standards Board. The IEEE develops its standards
through a consensus development process, approved by the American National Standards Institute, which brings
together volunteers representing varied viewpoints and interests to achieve the final product. Volunteers are not
necessarily members of the Institute and serve without compensation. While the IEEE administers the process
and establishes rules to promote fairness in the consensus development process, the IEEE does not independently
evaluate, test, or verify the accuracy of any of the information contained in its standards.
Use of an IEEE Standard is wholly voluntary. The IEEE disclaims liability for any personal injury, property or
other damage, of any nature whatsoever, whether special, indirect, consequential, or compensatory, directly or
indirectly resulting from the publication, use of, or reliance upon this, or any other IEEE Standard document.
The IEEE does not warrant or represent the accuracy or content of the material contained herein, and expressly
disclaims any express or implied warranty, including any implied warranty of merchantability or fitness for a spe-
cific purpose, or that the use of the material contained herein is free from patent infringement. IEEE Standards
documents are supplied “AS IS.”
The existence of an IEEE Standard does not imply that there are no other ways to produce, test, measure,
purchase, market, or provide other goods and services related to the scope of the IEEE Standard. Furthermore, the
viewpoint expressed at the time a standard is approved and issued is subject to change brought about through
developments in the state of the art and comments received from users of the standard. Every IEEE Standard is
subjected to review at least every five years for revision or reaffirmation. When a document is more than five
years old and has not been reaffirmed, it is reasonable to conclude that its contents, although still of some value,
do not wholly reflect the present state of the art. Users are cautioned to check to determine that they have the
latest edition of any IEEE Standard.
In publishing and making this document available, the IEEE is not suggesting or rendering professional or other
services for, or on behalf of, any person or entity. Nor is the IEEE undertaking to perform any duty owed by any
other person or entity to another. Any person utilizing this, and any other IEEE Standards document, should rely
upon the advice of a competent professional in determining the exercise of reasonable care in any given
circumstances.
Interpretations: Occasionally questions may arise regarding the meaning of portions of standards as they relate to
specific applications. When the need for interpretations is brought to the attention of IEEE, the Institute will initiate
action to prepare appropriate responses. Since IEEE Standards represent a consensus of concerned interests, it is
important to ensure that any interpretation has also received the concurrence of a balance of interests. For this
reason, IEEE and the members of its societies and Standards Coordinating Committees are not able to provide an
instant response to interpretation requests except in those cases where the matter has previously received formal
consideration. At lectures, symposia, seminars, or educational courses, an individual presenting information on
IEEE standards shall make it clear that his or her views should be considered the personal views of that individual
rather than the formal position, explanation, or interpretation of the IEEE.
Comments for revision of IEEE Standards are welcome from any interested party, regardless of membership affil-
iation with IEEE. Suggestions for changes in documents should be in the form of a proposed change of text,
together with appropriate supporting comments. Comments on standards and requests for interpretations should
be addressed to:
Secretary, IEEE-SA Standards Board
445 Hoes Lane
Piscataway, NJ 08854
USA
Authorization to photocopy portions of any individual standard for internal or personal use is granted by the
Institute of Electrical and Electronics Engineers, Inc., provided that the appropriate fee is paid to Copyright
Clearance Center. To arrange for payment of licensing fee, please contact Copyright Clearance Center, Customer
Service, 222 Rosewood Drive, Danvers, MA 01923 USA; +1 978 750 8400. Permission to photocopy portions of
any individual standard for educational classroom use can also be obtained through the Copyright Clearance
Center.
Copyright © 2006 IEEE. All rights reserved. ix

---------------------- Page: 9 ----------------------
ISO/IEC/IEEE 8802-1AE:2013(E)
Introduction
This introduction is not part of IEEE Std 802.1AE-2006, IEEE Standard for Local and Metropolitan Area Net-
works: Media Access Control (MAC) Security.
This is the first edition of this standard.
Relationship between IEEE Std 802.1AE and other IEEE 802 standards

Another IEEE standard, IEEE Std 802.1X -2004, specifies Port-based Network Access Control, and
provides a means of authenticating and authorizing devices attached to a LAN. Use of this standard in
conjunction with architecture and protocols of IEEE Std 802.1X-2004 extends the applicability of the latter
to publicly accessible LAN/MAN media for which security has not already been defined. A proposed

amendment, IEEE P802.1af , to IEEE Std 802.1X-2004 is being developed to specify the additional
protocols and interfaces necessary.

This standard is not intended for use with IEEE Std 802.11 , Wireless LAN Medium Access Control. An

amendment to that standard, IEEE Std 802.11i -2004, also makes use of IEEE Std 802.1X-2004, thus
facilitating the use of a common authentication and authorization framework for LAN media to which this
standard applies and for Wireless LANs.

A previous security standard, IEEE Std 802.10 , IEEE Standard for Interoperable LAN/MAN Security, has
been withdrawn.
Notice to users
Errata
Errata, if any, for this and all other standards can be accessed at the following URL: http://
standards.ieee.org/reading/ieee/updates/errata/index.html. Users are encouraged to check this URL for
errata periodically.
Interpretations
Current interpretations can be accessed at the following URL: http://standards.ieee.org/reading/ieee/interp/
index.html.
Patents
Attention is called to the possibility that implementation of this standard may require use of subject matter
covered by patent rights. By publication of this standard, no position is taken with respect to the existence or
validity of any patent rights in connection therewith. The IEEE shall not be responsible for identifying
patents or patent applications for which a license may be required to implement an IEEE standard or for
conducting inquiries into the legal validity or scope of those patents that are brought to its attention.
x Copyright © 2006 IEEE. All rights reserved.

---------------------- Page: 10 ----------------------
ISO/IEC/IEEE 8802-1AE:2013(E)
Contents
1. Overview. 1
1.1 Introduction. 1
1.2 Scope. 2
2. Normative references. 3
3. Definitions . 5
4. Abbreviations and acronyms . 8
5. Conformance. 10
5.1 Requirements terminology.10
5.2 Protocol Implementation Conformance Statement (PICS). 10
5.3 Required capabilities. 10
5.4 Optional capabilities . 11
6. Secure provision of the MAC Service . 13
6.1 MAC Service primitives and parameters. 13
6.2 MAC Service connectivity.15
6.3 Point-to-multipoint LANs. 16
6.4 MAC status parameters. 16
6.5 MAC point-to-point parameters. 16
6.6 Security threats . 17
6.7 MACsec connectivity . 18
6.8 MACsec guarantees . 19
6.9 Security services . 19
6.10 Quality of service maintenance.20
7. Principles of secure network operation. 22
7.1 Support of the secure MAC Service by an individual LAN . 22
7.2 Multiple instances of the secure MAC Service on a single LAN. 27
7.3 Use of the secure MAC Service. 28
8. MAC Security Protocol (MACsec). 31
8.1 Protocol design requirements.32
8.2 Protocol support requirements . 34
8.3 MACsec operation . 36
9. Encoding of MACsec protocol data units. 38
9.1 Structure, representation, and encoding. 38
9.2 Major components . 38
9.3 Security TAG. 39
9.4 MACsec EtherType . 39
9.5 TAG Control Information (TCI). 40
9.6 Association Number (AN) . 41
9.7 Short Length (SL) . 41
9.8 Packet Number (PN). 41
9.9 Secure Channel Identifier (SCI) . 41
9.10 Secure Data . 42
Copyright © 2006 IEEE. All rights reserved.                                                       xi

---------------------- Page: 11 ----------------------
ISO/IEC/IEEE 8802-1AE:2013(E)
9.11 Integrity Check Value (ICV) .42
9.12 PDU validation . 43
10. Principles of MAC Security Entity (SecY) operation . 44
10.1 SecY overview. 44
10.2 SecY functions. 46
10.3 Model of operation. 47
10.4 SecY architecture. 47
10.5 Secure frame generation . 50
10.6 Secure frame verification. 51
10.7 SecY management . 53
10.8 Addressing . 63
10.9 Priority . 63
10.10 SecY performance requirements. 63
11. MAC Security in Systems. 65
11.1 MAC Service interface stacks.65
11.2 MACsec in end stations . 66
11.3 MACsec in MAC Bridges. 66
11.4 MACsec in VLAN-aware Bridges. 67
11.5 MACsec and Link Aggregation. 68
11.6 Link Layer Discovery Protocol (LLDP). 69
11.7 MACsec in Provider Bridged Networks. 70
11.8 MACsec and multi-access LANs. 72
12. MACsec and EPON . 74
13. Management protocol . 76
13.1 Introduction. 76
13.2 The Internet-Standard Management Framework. 76
13.3 Relationship to other MIBs. 76
13.4 Security considerations . 78
13.5 Structure of the MIB . 80
13.6 Definitions for MAC Security MIB. 84
14. Cipher Suites. 121
14.1 Cipher Suite use . 121
14.2 Cipher Suite capabilities . 122
14.3 Cipher Suite specification. 123
14.4 Cipher Suite conformance . 123
14.5 Default Cipher Suite (GCM–AES–128) . 124
Annex A (normative) PICS Proforma . 126
A.1 Introduction. 126
A.2 Abbreviations and special symbols. 126
A.3 Instructions for completing the PICS proforma. 127
A.4 PICS proforma for IEEE Std 802.1AE . 129
A.5 Major capabilities . 130
A.6 Support and use of Service Access Points . 131
A.7 MAC status and point-to-point parameters. 132
A.8 Secure Frame Generation. 133
xii Copyright © 2006 IEEE. All rights reserved.

---------------------- Page: 12 ----------------------
ISO/IEC/IEEE 8802-1AE:2013(E)
A.9 Secure Frame Verification . 134
A.10 MACsec PDU encoding and decoding . 135
A.11 Key Agreement Entity LMI. 135
A.12 Additional fully conformant Cipher Suite capabilities . 139
A.13 Additional variant Cipher Suite capabilities. 140
Annex B (informative) Bibliography. 142
Annex & (informative) ,(((OLVWRISDUWLFLSDQWV. 14
Copyright © 2006 IEEE. All rights reserved. ix

---------------------- Page: 13 ----------------------
ISO/IEC/IEEE 8802-1AE:2013(E)
IEEE Standard for
Local and metropolitan area networks:
Media Access Control (MAC) Security
1. Overview
1.1 Introduction
®
IEEE 802 Local Area Networks (LANs) are often deployed in networks that support mission-critical
applications. These include corporate networks of considerable extent, and public networks that support
many customers with different economic interests. The protocols that configure, manage, and regulate
access to these networks typically run over the networks themselves. Preventing disruption and data loss
arising from transmission and reception by unauthorized parties is highly desirable, since it is not practical
to secure the entire network against physical access by determined attackers.
MAC Security (MACsec), as defined by this standard, allows authorized systems that attach to and
interconnect LANs in a network to maintain confidentiality of transmitted data and to take measures against
frames transmitted or modified by unauthorized devices.
MACsec facilitates
a) Maintenance of correct network connectivity and services
b) Isolation of denial of service attacks
c) Localization of any source of network communication to the LAN of origin
d) The construction of public networks, offering service to unrelated or possibly mutually suspicious
customers, using shared LAN infrastructures
e) Secure communication between organizations, using a LAN for transmission
f) Incremental and non-disruptive deployment, protecting the most vulnerable network components.
To deliver these benefits, MACsec has to be used in conjunction with appropriate policies for higher-le
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.