Wi-Fi Roaming
Wi-Fi Roaming
Wi-Fi Roaming
David Coleman
Senior Mobility Leader - Aerohive Networks
CWNE #4
@mistermultipath
Who am I?
Co-author of:
ISBN: 978-1118893708
Amazon:
http://a.co/c6aNiRb
Who am I?
Available now:
Sybex CWSP Study Guide
2nd Edition
ISBN: 978-1119211082
Amazon:
http://amzn.com/1119211085
Layer 2: Roaming
BSSID
#1
BSSID
#2 • Clients make the
AP #1 AP #2 roaming decision
Roam
PMK
• This is known as a pairwise master
key security association (PMKSA)
© Aerohive Networks, Proprietary & Confidential 11
PTKSA
The PMKID can reference the following types of pairwise master key
security associations:
• PMKSA derived from a PSK for the target AP
• Cached PMKSA from an 802.1X/EAP or SAE authentication
• Cached PMKSA that has been obtained through preauthentication
with the target AP
© Aerohive Networks, Proprietary & Confidential 17
PMKID
The PMKID can reference the following types of pairwise master key
security associations:
• PMK-R0 security association derived as part of an FT initial mobility
domain association
• PMK-R1 security association derived as part of an FT initial mobility
domain association or as part of a fast BSS transition
© Aerohive Networks, Proprietary & Confidential 18
PMKSA
The components of a PMKSA include:
• PMK - he created Pairwise Master Key.
PMK • PMKID - The unique identifier of the
association.
• Authenticator MAC - Layer 2 address of the
authenticator.
• Lifetime - The key lifetime is not otherwise
specified, then the PMK lifetime is infinite.
• AKMP - The authentication and key
management protocol.
PMK • Authorization parameters - Anything
specified by the authentication server or
supplicant. Example: Authorized SSID
© Aerohive Networks, Proprietary & Confidential 19
PMKSA – 802.1X/EAP
Without any type of fast secure
roaming mechanism
• Every time a client roams, the
client will re-authenticate.
• Preauthentication allows a
client station to initiate a
new 802.1X/EAP exchange
with a RADIUS server while
associated with the original
AP.
© Aerohive Networks, Proprietary & Confidential 27
Preauthentication
• The purpose of the new
802.1X/EAP authentication is
to create a new PMKSA
relationship with a new
target AP where the client
might roam.
• The intent was to use them together to solve fast secure roaming.
PMK #1
• The other supplicants are client stations that are one hop away and
not associated to the AP.
© Aerohive Networks, Proprietary & Confidential 34
AP roaming cache
• The PMKs of the other stations have already been forwarded to this
AP and are cached.
• Any client that also supports OKC can use its original PMK when
roaming to this new AP
© Aerohive Networks, Proprietary & Confidential 35
OKC – Is it supported?
Fast BSS
Resource Request
transition Reserved
Protocol Capability
over DS
Bits: 1 1 6
Fast BSS
Resource Request
transition Reserved
Protocol Capability
over DS
Bits: 1 1 6
MIC Optional
Element ID Length MIC ANonce SNonce
Control Parameter(s)
Octets: 1 1 2 16 32 32 Variable
• Notice that some of the fields look very similar to the information
used during a typical 4-Way Handshake exchange.
© Aerohive Networks, Proprietary & Confidential 56
FT Initial Mobility Domain Association
• The FT initial mobility domain
association is the first association
in the mobility domain.
• Open System authentication
request/response frames with the
first AP.
• The client station and AP then use
the MDIE and FTIE information in
the association request/response
frames to indicate future use of
the FT procedures.
PMK #1 Reassociation
request and response
PMK-R1
• PSK authentication also uses over-
the-air Fast BSS transition
Client roams to the target AP • By eliminating the 4-Way Handshake,
an FT roam is slightly faster.
• The drivers of the legacy clients may not be able to handle the
802.11k/r/v information elements.
4-Way Handshake
PTK PTK
SAE Roaming
Once the PMK is created and the association process completes, the AP and
the What about roaming when using SAE authentication?
• In other words, a client could perform an SAE commit and confirm exchange
with a potential roaming target prior to roaming to the target AP. This creates
a PMK on neighboring APs.
• When the client roams, the PMK is already on the target AP and all the client
has to do is a reassociation frame exchange and a 4-Way Handshake when
it actually
• Passphrase mismatch
•PMKs never properly created
• 4-Way Handshake fails
BSSID
#1
BSSID
#2 • Drivers (client problem)
AP #1 AP #2 • Sticky Problems (bad
design)
• Layer 3 roaming
Roaming client station
• Capacity Problems
• Increase CCI
• Hidden Node
• Mismatch power
between clients and AP
• Roaming – Sticky
problems
• Turn down the power!
© Aerohive Networks, Proprietary & Confidential 87
How do you measure cell overlap?
BSSID BSSID
#1 #2
• Primary Coverage: -70 dBm
AP #1 AP #2
Roam
Available now:
Sybex CWSP Study Guide
2nd Edition
ISBN: 978-1119211082
Amazon:
http://amzn.com/1119211085
Questions