802 1ae-2006
802 1ae-2006
802 1ae-2006
IEEE
3 Park Avenue
New York, NY 10016-5997, USA
18 August 2006
Sponsor
Abstract: This standard specifies how all or part of a network can be secured transparently to peer
protocol entities that use the MAC Service provided by IEEE 802 LANs to communicate. MAC
security (MACsec) provides connectionless user data confidentiality, frame data integrity, and data
origin authenticity.
Keywords: authorized port, data origin authenticity, integrity/confidentiality, LANs, local area
networks, MAC Bridges, MAC security and tack, MAC Service, MANs, metropolitan area
networks, MSAP, port-based network access control, secure association, security, service access
point, transparent bridging
No part of this publication may be reproduced in any form, in an electronic retrieval system or otherwise, without the prior
written permission of the publisher.
IEEE Standards documents are developed within the IEEE Societies and the Standards Coordinating
Committees of the IEEE Standards Association (IEEE-SA) Standards Board. The IEEE develops its standards
through a consensus development process, approved by the American National Standards Institute, which brings
together volunteers representing varied viewpoints and interests to achieve the final product. Volunteers are not
necessarily members of the Institute and serve without compensation. While the IEEE administers the process
and establishes rules to promote fairness in the consensus development process, the IEEE does not independently
evaluate, test, or verify the accuracy of any of the information contained in its standards.
Use of an IEEE Standard is wholly voluntary. The IEEE disclaims liability for any personal injury, property or
other damage, of any nature whatsoever, whether special, indirect, consequential, or compensatory, directly or
indirectly resulting from the publication, use of, or reliance upon this, or any other IEEE Standard document.
The IEEE does not warrant or represent the accuracy or content of the material contained herein, and expressly
disclaims any express or implied warranty, including any implied warranty of merchantability or fitness for a specific purpose, or that the use of the material contained herein is free from patent infringement. IEEE Standards
documents are supplied AS IS.
The existence of an IEEE Standard does not imply that there are no other ways to produce, test, measure,
purchase, market, or provide other goods and services related to the scope of the IEEE Standard. Furthermore, the
viewpoint expressed at the time a standard is approved and issued is subject to change brought about through
developments in the state of the art and comments received from users of the standard. Every IEEE Standard is
subjected to review at least every five years for revision or reaffirmation. When a document is more than five
years old and has not been reaffirmed, it is reasonable to conclude that its contents, although still of some value,
do not wholly reflect the present state of the art. Users are cautioned to check to determine that they have the
latest edition of any IEEE Standard.
In publishing and making this document available, the IEEE is not suggesting or rendering professional or other
services for, or on behalf of, any person or entity. Nor is the IEEE undertaking to perform any duty owed by any
other person or entity to another. Any person utilizing this, and any other IEEE Standards document, should rely
upon the advice of a competent professional in determining the exercise of reasonable care in any given
circumstances.
Interpretations: Occasionally questions may arise regarding the meaning of portions of standards as they relate to
specific applications. When the need for interpretations is brought to the attention of IEEE, the Institute will initiate
action to prepare appropriate responses. Since IEEE Standards represent a consensus of concerned interests, it is
important to ensure that any interpretation has also received the concurrence of a balance of interests. For this
reason, IEEE and the members of its societies and Standards Coordinating Committees are not able to provide an
instant response to interpretation requests except in those cases where the matter has previously received formal
consideration. At lectures, symposia, seminars, or educational courses, an individual presenting information on
IEEE standards shall make it clear that his or her views should be considered the personal views of that individual
rather than the formal position, explanation, or interpretation of the IEEE.
Comments for revision of IEEE Standards are welcome from any interested party, regardless of membership affiliation with IEEE. Suggestions for changes in documents should be in the form of a proposed change of text,
together with appropriate supporting comments. Comments on standards and requests for interpretations should
be addressed to:
Secretary, IEEE-SA Standards Board
445 Hoes Lane
Piscataway, NJ 08854
USA
Authorization to photocopy portions of any individual standard for internal or personal use is granted by the
Institute of Electrical and Electronics Engineers, Inc., provided that the appropriate fee is paid to Copyright
Clearance Center. To arrange for payment of licensing fee, please contact Copyright Clearance Center, Customer
Service, 222 Rosewood Drive, Danvers, MA 01923 USA; +1 978 750 8400. Permission to photocopy portions of
any individual standard for educational classroom use can also be obtained through the Copyright Clearance
Center.
Introduction
This introduction is not part of IEEE Std 802.1AE-2006, IEEE Standard for Local and Metropolitan Area Networks: Media Access Control (MAC) Security.
Relationship between IEEE Std 802.1AE and other IEEE 802 standards
Another IEEE standard, IEEE Std 802.1X-2004, specifies Port-based Network Access Control, and
provides a means of authenticating and authorizing devices attached to a LAN. Use of this standard in
conjunction with architecture and protocols of IEEE Std 802.1X-2004 extends the applicability of the latter
to publicly accessible LAN/MAN media for which security has not already been defined. A proposed
amendment, IEEE P802.1af, to IEEE Std 802.1X-2004 is being developed to specify the additional
protocols and interfaces necessary.
This standard is not intended for use with IEEE Std 802.11, Wireless LAN Medium Access Control. An
amendment to that standard, IEEE Std 802.11i-2004, also makes use of IEEE Std 802.1X-2004, thus
facilitating the use of a common authentication and authorization framework for LAN media to which this
standard applies and for Wireless LANs.
A previous security standard, IEEE Std 802.10, IEEE Standard for Interoperable LAN/MAN Security, has
been withdrawn.
Notice to users
Errata
Errata, if any, for this and all other standards can be accessed at the following URL: http://
standards.ieee.org/reading/ieee/updates/errata/index.html. Users are encouraged to check this URL for
errata periodically.
Interpretations
Current interpretations can be accessed at the following URL: http://standards.ieee.org/reading/ieee/interp/
index.html.
Patents
Attention is called to the possibility that implementation of this standard may require use of subject matter
covered by patent rights. By publication of this standard, no position is taken with respect to the existence or
validity of any patent rights in connection therewith. The IEEE shall not be responsible for identifying
patents or patent applications for which a license may be required to implement an IEEE standard or for
conducting inquiries into the legal validity or scope of those patents that are brought to its attention.
iv
Participants
At the time this standard was completed, the working group had the following membership:
Tony Jeffree, Chair
Mick Seaman, Interworking and Security Task Group Chair
Allyn Romanow, Editor
Frank Chao, MIB Editor
Brandon Barry
Les Bell
Mike Borza
Paul Bottorff
Jim Burns
Dirceu Cavendish
Paul Congdon
Sharam Davari
Arjan de Heer
Craig Easley
Anush Elangovan
Hesham Elbakoury
David Elie-Dit-Cosaque
Norm Finn
David Frattura
Anoop Ghanwani
Ken Grewal
Steve Haddock
Ran Ish-Shalom
Tony Jeffree
Hal Keen
Yongbum Kim
Loren Larsen
Yannick Le Goff
David Melman
John Messenger
Dinesh Mohan
Bob Moskowitz
Don OConnor
Glenn Parsons
Ken Patton
Karen T. Randall
Allyn Romanow
Dan Romascanu
Jessy V. Rouyer
Ali Sajassi
Dolors Sala
Sam Sambasivan
John Sauer
Mick Seaman
Koichiro Seto
Muneyoshi Suzuki
Geoff Thompson
John Viega
Dennis Volpano
Karl Weber
Ludwig Winkel
Michael D. Wright
The following members of the individual balloting committee voted on this standard. Balloters may have
voted for approval, disapproval, or abstention.
Eng Ahmed Abdelhalim
Butch Anton
Pierrejean Arcos
Chris B. Bagge
John B. Barnett
Mark A. Beadles
Michael A. Beck
Rahul B. Bhushan
Gennaro Boggia
James T. Carlo
Juan C. Carreon
Jon S. Chambers
Danila Chernetsov
Keith Chow
John L. Cole
Paul Congdon
Tommy P. Cooper
Russell S. Dietz
Thomas J. Dineen
Sean Dougherty
Alistair P. Duffy
Sourav K. Dutta
David Elie-Dit-Cosaque
Michael A. Fischer
Yukihiro Fujimoto
James P. Gilb
Nikhil Goel
Sergiu R. Goma
Patrick S. Gonia
Karanvir Grewal
Randall C. Groves
C. G. Guy
Ronald D. Hochnadel
Andreas J. Holtmann
Dennis Horwitz
Russell D. Housley
David Hunter
C. R. Huntley
Atsushi Ito
Raj Jain
David V. James
Tony Jeffree
Peter G. Johansson
David Johnston
Joe Natharoj Juisai
Piotr Karocki
Lior Khermosh
Byoung-jo Kim
Yongbum Kim
Mark J. Knight
Hermann Koch
Thomas M. Kurihara
David J. Law
Shawn M. Leard
Kang Lee
Li Li
William Lumpkins
G. L. Luri
Jonathon C. Mclendon
Francisco J. Melendez
George J. Miao
Gary L. Michel
Mike Moreton
M. Narayanan
Michael S. Newman
Paul Nikolich
Robert Ohara
Glenn W. Parsons
Vikram Punj
Jose P. Puthenkulam
Karen T. Randall
John J. Roese
Allyn Romanow
Jessy V. Rouyer
Michael Scholles
Stephen C. Schwarm
Mick Seaman
William M. Shvodian
Thomas M. Siep
Manikantan Srinivasan
Thomas E. Starai
Guenter Steindl
Michael L. Takefman
Joseph J. Tardo
Michael D. Johas Teener
Thomas A. Tullia
Mark-rene Uchida
Timothy P. Walker
Derek T. Woo
Steven A. Wright
TakahitoYoshizawa
Oren Yuen
When the IEEE-SA Standards Board approved this standard on 8 June 2006, it had the following
membership:
Steve M. Mills, Chair
Richard H. Hulett, Vice Chair
Don Wright, Past Chair
Judith Gorman, Secretary
Mark D. Bowman
Dennis B. Brophy
William R. Goldbach
Arnold M. Greenspan
Robert M. Grow
Joanna N. Guenin
Julian Forster*
Mark S. Halpin
Kenneth S. Hanus
Greg Ratta
Robby Robson
Anne-Marie Sahazizian
Virginia C. Sulzberger
Malcolm V. Thaden
Richard L. Townsend
Walter Weigel
Howard L. Wolfman
William B. Hopf
Joseph L. Koepfinger*
David J. Law
Daleep C. Mohla
T. W. Olsen
Glenn Parsons
Ronald C. Petersen
Tom A. Prevost
*Member Emeritus
Also included are the following nonvoting IEEE-SA Standards Board liaisons:
Satish K. Aggarwal, NRC Representative
Richard DeBlasio, DOE Representative
Alan H. Cookson, NIST Representative
Don Messina
IEEE Standards Program Manager, Document Development
Michael Kipness
IEEE Standards Program Manager, Technical Program Development
vi
Contents
1. Overview...................................................................................................................................................... 1
1.1
1.2
Introduction.............................................................................................................................. 1
Scope........................................................................................................................................ 2
Requirements terminology..................................................................................................... 10
Protocol Implementation Conformance Statement (PICS).................................................... 10
Required capabilities.............................................................................................................. 10
Optional capabilities .............................................................................................................. 11
vii
9.11
9.12
Introduction............................................................................................................................ 76
The Internet-Standard Management Framework ................................................................... 76
Relationship to other MIBs.................................................................................................... 76
Security considerations .......................................................................................................... 78
Structure of the MIB .............................................................................................................. 80
Definitions for MAC Security MIB....................................................................................... 84
Introduction.......................................................................................................................... 126
Abbreviations and special symbols...................................................................................... 126
Instructions for completing the PICS proforma................................................................... 127
PICS proforma for IEEE Std 802.1AE ................................................................................ 129
Major capabilities ................................................................................................................ 130
Support and use of Service Access Points ........................................................................... 131
MAC status and point-to-point parameters.......................................................................... 132
Secure Frame Generation..................................................................................................... 133
Copyright 2006 IEEE. All rights reserved.
A.9
A.10
A.11
A.12
A.13
ix
1. Overview
1.1 Introduction
IEEE 802 Local Area Networks (LANs) are often deployed in networks that support mission-critical
applications. These include corporate networks of considerable extent, and public networks that support
many customers with different economic interests. The protocols that configure, manage, and regulate
access to these networks typically run over the networks themselves. Preventing disruption and data loss
arising from transmission and reception by unauthorized parties is highly desirable, since it is not practical
to secure the entire network against physical access by determined attackers.
MAC Security (MACsec), as defined by this standard, allows authorized systems that attach to and
interconnect LANs in a network to maintain confidentiality of transmitted data and to take measures against
frames transmitted or modified by unauthorized devices.
MACsec facilitates
a)
b)
c)
d)
e)
f)
To deliver these benefits, MACsec has to be used in conjunction with appropriate policies for higher-level
protocol operation in networked systems, an authentication and authorization framework, and network
management. IEEE P802.1af [B2]1 provides authentication and cryptographic key distribution.
MACsec protects communication between trusted components of the network infrastructure, thus protecting
the network operation. MACsec cannot protect against attacks facilitated by the trusted components
1
themselves, and is complementary to, rather than a replacement for, end-to-end application-to-application
security protocols. The latter can secure application data independent of network operation, but cannot
necessarily defend the operation of network components, or prevent attacks using unauthorized
communication from reaching the systems that operate the applications.
1.2 Scope
The scope of this standard is to specify provision of connectionless user data confidentiality, frame data
integrity, and data origin authenticity by media access independent protocols and entities that operate
transparently to MAC Clients.
NOTEThe MAC Clients are as specified in IEEE Std 802, IEEE Std 802.2, IEEE Std 802.1D, IEEE Std 802.1Q,
and IEEE Std 802.1X.2
To this end it
a)
b)
c)
d)
e)
f)
g)
h)
i)
j)
k)
l)
m)
n)
Specify how the relationships between MACsec protocol peers are discovered and authenticated, as
supported by key management or key distribution protocols, but makes use of IEEE P802.1af Key
Agreement for MAC security to achieve these functions.
Notes in text, tables, and figures are given for information only, and do not contain requirements needed to implement the standard.
2. Normative references
The following referenced documents are indispensable for the application of this document. For dated
references, only the edition cited applies. For undated references, the latest edition of the referenced
document (including any amendments or corrigenda) applies.
Federal Information Processing Standards FIPS 197, Advanced Encryption Standard, 2001, Advanced
Encryption Standard Cyclic Block Chaining (AES-CBC).3
Galois Counter Mode of Operation (GCM), David A. McGrew, John Viega.4
IEEE Std 802, IEEE Standards for Local and Metropolitan Area Networks: Overview and Architecture.5, 6
IEEE Std 802.1D-2003, IEEE Standards for Local and Metropolitan Area Networks: Media Access Control
(MAC) Bridges.
IEEE Std 802.1Q-2005, IEEE Standards for Local and Metropolitan Area Networks: Virtual Bridged Local
Area Networks.
IEEE Std 802.1X-2004, IEEE Standards for Local and Metropolitan Area Networks: Port Based Network
Access Control.
IEEE Std 802.1ad-2005, IEEE Standards for Local and Metropolitan Area Networks: Virtual Bridged
Local Area NetworksAmendment 4: Provider Bridges.
IEEE Std 802.1AB-2005, IEEE Standards for Local and Metropolitan Area Networks: Station and Media
Access Control Connectivity and Discovery.
IEEE Std 802.2, IEEE Standard for Information technologyTelecommunications and information
exchange between systemsLocal and metropolitan area networksSpecific requirementsPart 2:
Logical link control.
IEEE Std 802.3, IEEE Standard for Information technologyPart 3: Carrier Sense Multiple Access with
Collision Detection (CSMA/CD) Access Method and Physical Layer Specifications.
IEEE Std 802.11, IEEE Standard for Information technologyTelecommunications and information
exchange between systemsLocal and metropolitan area networksSpecific requirementsPart 11:
Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications.
IEEE Std 802.11i, IEEE Standard for Information technologyTelecommunications and information
exchange between systemsLocal and metropolitan area networksSpecific requirementsPart 11:
Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specificationsMedia Access
Control (MAC) Security Enhancements.
IEEE Std 802.17, IEEE Standard for Information technologyTelecommunications and information
exchange between systemsLocal and metropolitan area networksSpecific requirementsPart 17:
Resilient packet ring (RPR) access method & physical layer specifications.
3FIPS
publications are available from the National Technical Information Service (NTIS), U. S. Dept. of Commerce, 5285 Port Royal
Rd., Springfield, VA 22161 (http://www.ntis.org/).
4
This document can be downloaded from http://csrc.nist.gov/CryptoToolkit/modes/proposedmodes/gcm/gcm-spec.pdf.
5
IEEE publications are available from the Institute of Electrical and Electronics Engineers, 445 Hoes Lane, P.O. Box 1331, Piscataway,
NJ 08855-1331, USA. IEEE publications can be ordered on-line from the IEEE Standards Website: http://www.standards.ieee.org
6The IEEE standards or products referred to in this clause are trademarks of the Institute of Electrical and Electronics Engineers, Inc.
IETF RFC 1213: Management Information Base for Network Management of TCP/IP-based internets: MIBII, K. McCloghrie, M.T. Rose, March 1991.
IETF RFC 2578, STD 58, Structure of Management Information for Version 2 of the Simple Network
Management Protocol (SNMPv2), McCloghrie, K., Perkins, D., Schoenwaelder, J., Case, J., Rose, M.,
Waldbusser, S., April 1999.
IETF RFC 2579, STD 58, Textual Conventions for Version 2 of the Simple Network Management Protocol
(SNMPv2), McCloghrie, K., Perkins, D., Schoenwaelder, J., Case, J., Rose, M., Waldbusser, S., April 1999.
IETF RFC 2580, STD 58, Conformance Statements for SMIv2, McCloghrie, K., Perkins, D.,
Schoenwaelder, J., Case, J., Rose, M., Waldbusser, S., April 1999.
IETF RFC 2863, The Interfaces Group MIB using SMIv2, McCloghrie, K. and Kastenholz, F., June 2000.
IETF RFC 3418, Management Information Base (MIB) for the Simple Network Management Protocol
(SNMP), Preshun, R., ED., December 2002.
ISO/IEC 7498-1, Information processing systemsOpen Systems InterconnectionBasic Reference
ModelPart 1: The Basic Model.7
ISO/IEC 7498-2, Information processing systemsOpen Systems InterconnectionBasic Reference
ModelPart 2: Security architecture.
ISO/IEC 14882, Information TechnologyProgramming languagesC++.
ISO/IEC 15802-1, Information technologyTelecommunications and information exchange between
systemsLocal and metropolitan area networksCommon specificationsPart 1: Medium Access
Control (MAC) service definition.
7
ISO/IEC publications are available from the ISO Central Secretariat, Case Postale 56, 1 rue de Varemb, CH-1211, Genve 20, Switzerland/Suisse (http://www.iso.ch/). ISO/IEC publications are also available in the United States from Global Engineering Documents,
15 Inverness Way East, Englewood, Colorado 80112, USA (http://global.ihs.com/). Electronic copies are available in the United States
from the American National Standards Institute, 25 West 43rd Street, 4th Floor, New York, NY 10036, USA (http://www.ansi.org/).
3. Definitions
For the purposes of this standard, the following terms and definitions apply. The Authoritative Dictionary of
IEEE Standards Terms, Seventh Edition [B3], should be referenced for terms not defined in this clause.
3.1 Association Number (AN): A number that is concatenated with the Secure Channel Identifier to identify a Secure Association.
3.2 bounded receive delay: A guarantee that a frame will not be delivered after a known bounded time, in
the case of protocols designed to use the MAC Service this is typically assumed to be less than two seconds.
3.3 Bridged Local Area Network: A concatenation of individual IEEE 802 LANs interconnected by MAC
Bridges.
NOTEUnless explicitly specified the use of the word network in this standard refers to a Bridged Local Area Network.
The term Bridged Local Area Network is not otherwise abbreviated. The term Local Area Network and the abbreviation
LAN are used exclusively to refer to an individual LAN specified by a MAC technology without the inclusion of
Bridges. This precise use of terminology within this specification allows a Bridged Local Area Network to be distinguished from an individual LAN that has been bridged to other LANs in the network. In more general usage such precise
terminology is not required, as it is an explicit goal of this standard that MAC Security is transparent to the users of the
MAC Service.
3.4 Cipher Suite: A set of one or more algorithms, designed to provide any number of the following: data
confidentiality, data authenticity, data integrity.
3.5 Common Port: An instance of the MAC Internal Sublayer Service used by the SecY to provide transmission and reception of frames for both the controlled and uncontrolled ports.
3.6 Controlled Port: The access point used to provide the secure MAC Service to a client of a SecY.
3.7 cryptographic key: A parameter that determines the operation of a cryptographic function such as:
a)
The transformation from plain text to cipher text and vice versa
b)
c)
3.8 cryptographic mode of operation: Also referred to as mode. An algorithm for the cryptographic transformation of data that features a symmetric key block cipher algorithm.9
3.9 data integrity: A property whereby data has not been altered in an unauthorized manner since it was
created, transmitted or stored.10
3.10 IEEE 802 Local Area Network (LAN): IEEE 802 LANs (also referred to in the text simply as LANs)
are LAN technologies that provide a MAC Service equivalent to the MAC Service defined in ISO/IEC
15802-1. IEEE 802 LANs include IEEE Std 802.3 (CSMA/CD), IEEE Std 802.11 (Wireless), IEEE Std
802.17 (Resilient Packet Ring).
3.11 initialization vector (IV): A vector used in defining the starting point of an encryption process within
a cryptographic algorithm.11
8
This and some other definitions in this clause have been drawn from ASC TR1/X9, Technical Report for ABA ASC/X9 Standards
Definitions, Acronyms, and Symbols, 2002.
9This and some other definitions in this clause have been drawn from NIST Special Publication 800-38A, Recommendation for Block
Cipher Modes of Operation: Methods and Techniques, 2001.
10
This and some other definitions in this clause have been drawn from NIST Special Publication 800-57, Recommendation for Key
Management, 2005.
This and some other definitions in this clause have been drawn from Federal Information Processing Standard (FIPS) 140-2, Security
Requirements for Cryptographic Modules, 2001.
12This and some other definitions in this clause have been drawn from NIST Special Publication 800-63: Electronic Authentication
Guideline, 2004.
13
This and some other definitions in this clause have been drawn from ASC TR1/X9, Technical Report for ABA ASC/X9 Standards
Definitions, Acronyms, and Symbols, 2002.
14FIPS
140-2.
FIPS 140-2.
15
AN
Association Number
CA
CRC
CTR
Counter mode
DA
Destination Address
EPON
ES
end station
FCS
FIPS
GCM
Gb/s
Gigabit per second (1 Gb/s is equivalent to 1 000 000 000 bits per second)
ICV
ISS
IV
Initialization Vector
KaY
LACP
LAN
LLC
LLDP
LMI
MAC
Mb/s
Megabit per second (1 Mb/s is equivalent to 1 000 000 bits per second)
MIB
MPDU
MSDU
MSTP
NESSIE
NIST
OLT
ONU
PAE
PDU
PN
Packet Number
QoS
quality of service
RADIUS
RSTP
SA
Secure Association
SAI
SAK
SC
Secure Channel
SCB
SCI
SecTAG
SecY
SNMP
5. Conformance
A claim of conformance to this standard is a claim that the behavior of an implementation of a MAC
Security Entity (SecY) meets the requirements of this standard as they apply to the operation of the MACsec
protocol, management of its operation, and provision of service to the protocol clients of the SecY, as
revealed through externally observable behavior of the system of which the SecY forms a part.
A claim of conformance may be a claim of full conformance, or a claim of conformance with Cipher Suite
variance, as specified in 5.4.
Conformance to this standard does not ensure that the system of which the MAC Security implementation
forms a part is secure, or that the operation of other protocols used to support MAC Security, such as key
management and network management do not provide a way for an attacker to breach that security.
The PICS proforma (see Annex A) reflects the occurrences of the words shall, may, and should within the
standard.
The standard avoids needless repetition and apparent duplication of its formal requirements by using is, is
not, are, and are not for definitions and the logical consequences of conformant behavior. Behavior that is
permitted but is neither always required nor directly controlled by an implementor or administrator, or
whose conformance requirement is detailed elsewhere, is described by can. Behavior that never occurs in a
conformant implementation or system of conformant implementations is described by cannot. The word
allow is used as a replacement for the cliche Support the ability for, and the word capability means can be
configured to.
10
a)
Support the Controlled and Uncontrolled Ports, and use a Common Port as specified in Clause 10.
b)
Support the MAC status and point-to-point parameters for the Controlled and Uncontrolled Ports as
specified in 6.4, 6.5, and 10.7.
Copyright 2006 IEEE. All rights reserved.
c)
Process transmit requests from the Controlled Port as required by the specification of Secure Frame
Generation (10.5).
d)
Process receive indications from the Common Port as required by the specification of Secure Frame
Verification (10.6), prior to causing receive indications at the Controlled Port.
e)
f)
Use a globally unique 48-bit MAC Address and a 16-bit Port Identifier unique within the scope of
that address assignment to identify the transmit SCI, as specified in 8.2.1.
g)
h)
Support the Layer Management Interface (LMI) operations required by the Key Agreement Entity
as specified in Clause 10.
i)
j)
Protect and validate MACsec PDUs by using Cipher Suites as specified in 14.1.
k)
Support Integrity Protection using the Default Cipher Suite specified in Clause 14.
l)
m)
1)
One receive SC
2)
3)
One of the two receive SAKs at a time for transmission, with the ability to change from one to
the other within the time specified in Table 10-1
2)
An implementation of a MAC Security Entity (SecY) for which conformance to this standard is claimed
shall not
n)
o)
p)
Introduce an undetected frame error rate greater than that achievable by preserving the original FCS,
as required by 10.4.
Implement any Cipher Suite that is additional to those specified in Clause 14 and does not meet all
the criteria specified in 14.2, 14.3, and 14.4.1.
Support access to MACsec parameters using any version of SNMP prior to v3.
An implementation of a MAC Security Entity (SecY) for which full conformance to this standard is claimed
shall not
q)
NOTEConformance with Cipher Suite variance is allowed, as specified in 5.4 and in 14.4.1.
11
g)
Include Cipher Suites that are specified in Clause 14 in addition to the Default Cipher Suite.
An implementation of a MAC Security Entity (SecY) for which conformance with Cipher Suite variance is
claimed may
h)
Use Cipher Suites not specified in Clause 14, but meeting the criteria specified in 14.2, 14.3, 14.4.1.
NOTEThe term capability is used to describe a set of related detailed provisions of this standard. Each capability can
comprise both mandatory provisions, required if implementation of the capability is to be claimed, and optional
provisions. Each detailed provision is specified in one or more of the other clauses of this standard. The PICS, described
in Annex A, provides a useful checklist of these provisions.
12
MAC Security
(
MAC Security
MAC Security
(
LAN
Primitives, parameters, connectivity, and status parameters provided by the MAC Service
Security threats posed by abuses of the MAC Service
Connectivity used and provided by the MAC Security Protocol (MACsec)
Service guarantees provided by MACsec and the security services they support
Quality of Service (QoS) issues addressed in the design, implementation, and use of MACsec
NOTE 1In order to introduce the concepts used in this standard, this clause can repeat or summarize the specification
in other clauses; however, it contains no normative provisions that apply either to the subject matter of those other
clauses or to the other standards referenced. For conformance to this standard see Clause 5.
NOTE 2MACsec does not itself guarantee the security of a Bridged Local Area Network, as that security depends on
the security of the individual LANs that comprise the network, on the policies adopted by clients of the secure MAC
Service (7.3), and on the security of the MAC Bridges that interconnect those LANs.
NOTE 3Authentication and authorization are outside the scope of this standard, which ensures secure communication
between mutually authenticated and authorized service access points.
NOTE 4The MAC Service and the secure MAC Service are provided at a service access point to a single client. The
client is either a logical link control (LLC) Entity or an entity that in turn provides the MAC Service or a MAC Internal
Sublayer Service (IEEE Std 802.1D, IEEE Std 802.1Q).
Destination Address
13
Source Address
Priority
MAC Service Data Unit (MSDU)
The MAC Service can be provided by a single LAN or by a Bridged Local Area Network. The service
provided to an LLC Client in an end station is specified in ISO/IEC 15802-1. The service provided by a
LAN to a MAC Bridge is the MAC Internal Sublayer Service (ISS), (see IEEE Std 802.1D), an extension of
the MAC Service that includes parameters necessary to the bridge relay function including the frame check
sequence (FCS). Except as otherwise explicitly noted, the term MAC Service as used in the remainder of this
clause refers both to the provision of the MAC Service to an LLC client and to provision of the ISS. Multiple
instances of the MAC Service can be provided using a single instance of the ISS and supported in VLANaware Bridges using the Enhanced Internal Sublayer Service (EISS), (see 6.6 of IEEE Std 802.1Q). When a
VLAN TAG (IEEE Std 802.1Q) is used to distinguish the service instances supported, the additional
parameters of the EISS are all encoded within the ISS MSDU.
NOTE 1The MAC Service defined in ISO/IEC 15802-1 is an abstraction of the features common to a number of
specific media access control methods and is a guide to the development of client protocols.
NOTE 2Some older descriptions of the MAC Service omit the source address parameter. With the addition of this
parameter and removal of the frame_type parameter from the ISS (frames other than user_data_frames are always
discarded by ISS clients, and thus can be discarded by the media access control method specific functions that provide
the ISS), the definitions of the MAC Service and of the Internal Sublayer Service are expected to converge in the future.
NOTE 3The priority parameter described in this clause is also referred to as the user_priority in some specifications.
The functions that support the ISS can calculate an access_priority for use on a LAN in local support of the user_priority.
The access_priority parameter can be modified by media access control method specific functions and is not delivered as
a MAC Service indication parameter, so is not a concern of this specification.
The MAC Service provided by a single LAN preserves the relative order of service requests and
corresponding service indications with the same requested priority. Each instance of the MAC Service
provided using an instance of the EISS preserves the relative order of requests and indications with the same
destination address, source address, and priority if the destination address is an individual address, and the
relative order of requests and indications with the same destination address and priority if the destination
address is a group address.
NOTE 4A Provider Bridged Network can use the EISS to provide instances of the MAC Service that appear, with the
exception of ordering constraints, to be a single LAN and are used as such by MACsec.
The address and MSDU parameters delivered with a service indication have identical values to those
supplied with the corresponding service request. The MAC Service does not validate the parameters
supplied with the request; for example, it does not provide any assurance that the source address used by an
LLC client is the individual address previously allocated to the station.
NOTE 5For example, in the absence of policies that require authorization to use an address, or check that a MACsec
participant does not change its address, the use of MACsec will not protect against ARP spoofing. MACsec can form
part of a solution that prevents ARP spoofing provided that suitable client policies are used in conjunction with
MACsec, as mentioned in 1.1, in Clause 6, and in Clause 7 (particularly 7.3). In the case of ARP spoofing, appropriate
policies include a selection of not accepting frames from an end station with a different source address than that used in
the authentication dialogue, not accepting frames from bridges that are not known to obey that rule, requiring use of
device identification to ensure use of a legitimate MAC address, and filtering certain higher-layer protocol frames unless
received (using MACsec) from a system allowed to send them.
The priority parameter delivered with a service indication has an identical value to that supplied with the
corresponding service request, where the media access control method used supports communication of
priority. The access to the LAN granted by the media access control method can take the requested priority
value into account, but can also be based on other factors. The IEEE 802.3 media access control method
does not convey priority, and the priority value delivered with the service indication is determined by
14
management of the receiving station. However, where the EISS is used to support an instance of the MAC
Service, the priority parameter of the EISS is encoded within a VLAN TAG (IEEE Std 802.1Q) that forms
the initial octets of the MSDU accompanying a service request to the instance of the ISS used to support the
EISS. Figure 6-2 shows the priority field encapsulated in the VLAN TAG within the Secure Data portion of
the MACsec frame. In this case, the value of the priority parameter delivered with the service indication will
be identical to that provided with the corresponding request.
Priority
VLAN TAG
MACsec
EtherType
Destination
Address
Source
Address
MAC Addresses
SecTAG
User Data
User Data
Secure Data
ICV
Frame data
MAC Service clients and client protocols can operate incorrectly if the connectivity provided is not as
expected. While some protocols can detect the lack of symmetric connectivity, they can simply deny service
as a result. Protocols can operate inefficiently if transitive connectivity is not provided. While MAC Bridges
can filter frames to restrict provision of service, the use of Virtual LANs (VLANs), with each VLAN
providing full connectivity, is preferred to lessen the administrative burden of ensuring correct connectivity.
NOTE 3The original Spanning Tree Protocol (STP) could create loops in the network if symmetric connectivity was
not provided. The Rapid Spanning Tree Protocol (RSTP), (see IEEE Std 802.1D), detects non-symmetric connectivity
between Bridges, but will deny service until the problem is resolved, and intermittent non-symmetric connectivity can
result in data loops. For example, the operation of the OSPF routing protocol on a LAN is inefficient unless all
participants can receive frames sent by each other. If a LAN that provides the ISS to attached MAC Bridges merely
15
delivers frames to their intended destination instead of providing full connectivity, learning of source addresses can be
inhibited and frames flooded throughout the bridged network for an indefinite period.
IEEE Std 802.1D and IEEE Std 802.1Q specify how the point-to-point status determination is made for
provision of the insecure ISS by specific media access control methods, and for provision of the insecure
EISS. This standard specifies how it is determined for the secure MAC Service.
NOTERSTP (IEEE Std 802.1D) and MSTP (IEEE Std 802.1Q) require the use of operPointToPointMAC to facilitate
rapid reconfiguration in some network failure scenarios. LACP (IEEE Std 802.3) does not aggregate links that are not
point-to-point and may use operPointToPointMAC to make this determination.
Deliberate abuse can serve as a basis for an attack upon the resources accessible from a LAN through attacks
on the protocols that use the service and provide access to or control over those resources. The effort
required by an attacker to abuse the service in any particular way depends in general on the media access
control method used by the LAN, and the particular devices and components that support it.
The MAC Service does not guarantee the origin or authenticity of service requests and the accompanying
parameters. Since the sole use of the source address allocated to a station by that station and the restriction of
service indications to intended recipients can depend on cooperative behavior from other stations, it is
usually easy for an attacker that can attach a station to a LAN to receive any service indication and to issue
additional service requests with parameters based on those indications. Other service abuses can require
physical access to inconveniently located components.
It is beyond the scope of this standard to enumerate all the ways in which abuses of the service can be
exploited, they include techniques commonly referred to as passive wiretapping, masquerading, and man-inthe-middle attacks. The latter is facilitated by source address spoofing, usually after another station with that
source address has been observed to have been granted access to some resource. Attacks can include
j)
k)
l)
17
m)
n)
MACsec does not protect against brute force denial of service attacks that can be mounted by abusing the
operation of particular media access control methods through degrading the communication channel or
transmitting erroneous media access method specific control frames.
MACsec itself does not provide comprehensive monitoring of the connectivity provided by a CA, although
it can detect and will signal certain failures to the local MAC Security Key Agreement Entity (KaY).
Together, operation of key agreement protocols and MACsec ensures that the status parameters provided by
an instance of the secure MAC Service correctly reflect both the current connectivity and changes in the
connectivity of the CA. Specifically
a)
MAC_Operational is only True if the CA is complete (i.e., is symmetric and transitive), and the local
MACsec Entity (SecY) can both receive and transmit.
NOTE 2The Single Copy Broadcast (SCB) functionality of EPON can be considered an exception with respect to
symmetric connectivity, as discussed in Clause 12.
b)
If MAC_Operational is True in stations wanting to join a new CA and in stations already in the
target CA, and if stations are added to the CA, MAC_Operational transitions to False in either all the
stations originally participating in the CA or in all those added, for sufficient duration such that
clients of the service are aware of the transition.
Determining which group transitions MAC_Operational to False is outside the scope of this
specification and is determined by the KaY and signaled through the LMI.
c)
If MAC_Operational is False in stations wanting to join a CA, and if these stations are added to a
CA, there is no change in the MAC_Operational status of the stations already in the target CA, and
MAC_Operational will transition to True in the joining stations after some period of time. This is the
typical case for a single station joining a CA, in which its MAC_Operational is False until the join is
accomplished when its state transitions to MAC_Operational True.
d)
NOTE 3Communication between KaYs in stations that compose a CA does not depend on the operation of MACsec.
18
Is the result of a service request at a service access point that is also a member of the same CA
Has the parameter values that are identical to those supplied with the service request
g)
Conceal the following from stations that are not members of the CA
1) Service requests
2) Values of service request address parameters
3) The number of octets that comprises the MSDU
Validate the parameters provided with a service request
MACsec provides guarantees to within known bounds that are derived from the cryptographic methods and
other mechanisms used.
The known bounded time in item d) is typically longer than required to enforce the maximum transit delay
requirements of the MAC Service.
NOTEThe addition of explicit time indications to the SecTAG to provide tight bounds for transit delay was considered
in the development of this standard, but the value delivered is small for the added complexity and the burden imposed on
key agreement protocols. Higher-layer protocols that have tight timing requirements typically add their own timing
markers. As these markers are carried within the MSDU, their integrity is protected by MACsec.
c)
d)
e)
19
or protect against
h)
A MAC Bridge that forwards a frame with an erroneous source MAC address can unintentionally facilitate a
denial of service or other attack on other LANs within a Bridged Local Area Network. The MAC Bridge
should use MACsec in conjunction with an appropriate policy to verify the binding of the source MAC
address to access to resources.
Operation of a security protocol has the potential to lower some aspects of QoS. The operation and design of
MACsec is discussed below as it relates to
a)
b)
c)
d)
e)
f)
g)
h)
i)
j)
Service availability
Frame loss
Frame misordering
Frame duplication
Frame transit delay
Frame lifetime
Undetected frame error rate
Maximum service data unit size supported
Frame priority
Throughput
Use of MACsec can lower service availability if delays occur in the creation of Connectivity Associations or
in the distribution and maintenance of cryptographic keying material. Failures or attacks upon the system
that supports authentication and authorization can result in denial of service.
The operation of MACsec introduces no additional frame loss on individual LAN segments other than that
expected for a specific media access control method as a consequence of a small increase in frame size. The
operation of MACsec between two customer systems across a provider bridged network can introduce
additional frame loss caused by possible frame reordering from expedited forward or link aggregations
within the provider bridged network. The reception of misordered frames can cause MACsec
implementations to discard additional frames depending upon the configuration of replay protection
parameters. Conforming implementations of MACsec are capable of applying a new keying material starting
with any frame in a sequence that is received with the minimum intervening spacing specified by the
specific media access control method in use. Each frame protected by MACsec remains independent of its
predecessors and successors, so loss of a single frame does not imply loss of additional frames.
20
MACsec does not introduce any additional potential for duplicating or misordering frames. No
retransmission mechanisms are added to relax requirements for distribution and use of MACsec related
information. Any parallel processing of frames adopted by MACsec implementations is required to preserve
the sequence of requests and indications between the secure service access point supported and the insecure
service access point used.
Since the MAC Service is provided at an abstract interface within an end station, it is not possible to specify
the total frame transit delay precisely. It is, however, possible to measure the additional transit delay
introduced by an additional component or intermediate system.
The minimum additional transit delay introduced by MACsec is due to the increase in the MSDU size
required to convey security information and essential buffering requirements required to meet the processing
requirements of particular Cipher Suites. Specific limits are placed on the additional delays allowed to
MACsec implementations (Table 10-1). The permitted delay is short compared with the upper bound
mandated by the MAC Service, so it does not threaten the correct operation of higher-layer protocols.
Frame lifetime can be increased by MACsec if additional delay is introduced by providing security. The
typical bound on frame lifetime is approximately two seconds.
MACsec does not increase the undetected frame error rate for frames received and transmitted on a single
LAN. The frame check sequence (FCS) method used by each specific media access control method protects
the entire frame including information added by MACsec. The integrity check added by MACsec can
increase the probability of detecting unintentional frame modifications, particularly where those do not
correspond to the expected noise characteristics for which the FCS was originally designed, but equally is
not a substitute for the FCS since it is designed to ensure that an attacker has an exceedingly low chance of
predicting how to make an undetected modification to the frames parameters rather than to efficiently detect
burst noise characteristics.
Use of MACsec on each of a MAC Bridges Ports will force a change in the data covered by an FCS, even if
the frame is being relayed between LANs that use the same media access control method. Application of the
techniques described in Annex F of IEEE Std 802.1D allow an implementation to achieve an arbitrarily
small increase in undetected frame error rate, even in cases where the data that is within the coverage of the
FCS is changed.
The MSDU size that can be supported by an IEEE 802 LAN varies with the media access control method
and its associated parameters (speed, electrical characteristics, etc.), and can be constrained by the owner of
the LAN. MACsec adds security information to a transmitted MSDU, and thus the secure MAC service
offers a smaller MSDU size than the insecure MAC service that it employs.
Where MACsec is used to support an instance of the ISS that in turn supports the EISS, encoding of the
priority parameter of the EISS within the ISS MSDU ensures that priority can be communicated unchanged
between service access points that are attached to a single LAN. Since MACsec is terminated on each of the
Ports of MAC Bridges attached to such LANs, a Bridge can access or change the priority even if the two
instances of MACsec encrypt the MSDU in order to provide confidentiality.
Cryptography can be computationally intensive, and the operation of MACsec has the potential to lower
throughput. The Cipher Suite(s) mandated and recommended by this standard have been chosen, in part, for
their ability to support economic implementation across the range of LAN MAC data rates.
21
Supported on each of the individual LANs that compose the network (7.1)
Used by the protocol entities that are its Clients (7.3)
Security relationships and the terms that identify them have been defined, in various ways, by a number of
publicly available documents. This standard has deliberately chosen new terms to minimize confusion
whenever differences could exist between previously used terms and the requirements. For example, the
attributes associated with an Secure Association Identifier (SAI) (see Figure 7-7) are similar to but not
exactly the same as those associated with the Security Parameter Index (SPI) defined by IPsec (IETF RFC
2406 [B5]). The normative properties of all terms used in the standard are as defined by this standard.
NOTE 1The use of the term secure network in this clause refers to a network of end stations, LANs, bridges, routers
and similar systems, and the servers and services that support these. The description and specification in this clause are
limited to use of the secure MAC Service to contribute to overall system security (see Clause 1).
NOTE 2In order to introduce the concepts used in this standard, this clause can repeat or summarize the specification
in other clauses, however it contains no normative provisions that apply either to the subject matter of those other
clauses or to the other standards referenced. For conformance to this standard, see Clause 5.
NOTE 3The term individual LAN (3.17) is used in this standard to refer explicitly to an instance of media access
method-specific technologies providing the MAC Service directly. The term excludes larger networks or subsets of a
network that are created by aggregation or concatenation of individual LANs by Link Aggregation or bridges.
NOTE 4The examples presented in this clause are intended to serve as a guide to best practice; however, the use of
MAC Security is not limited to the examples given. Limits to the use of MAC Security that are required for the
successful operation of network configuration and other protocols are made explicit.
a)
A secure Connectivity Association (CA) is created to meet the requirements of the MAC Service
(6.2) and MACsec (6.7) for connectivity between the stations attached to an individual LAN.
b)
c)
d)
Each SA uses a fresh Secure Association Key (SAK) to provide the MACsec service guarantees
(6.8) and security services (6.9) for a sequence of transmitted frames.
NOTEAn SC can be required to last for many years without interruption, since interrupting the MAC Service can
cause client protocols to re-initialize and recalculate aggregations, spanning trees, and routes (for example). An SC lasts
through a succession of SAs, each using a new SAK, to defend against a successful attack on a key while it is still in use.
In contrast it is desirable to use a new SAK at periodic intervals to defend against a successful attack on a key while it is
still in use. In addition, the MACsec protocol (Clause 8 and Clause 9) only allows a limited number of frames to be
protected with a single key. Since 232 minimum-sized IEEE 802.3 frames can be sent in approximately 5 min at 10 Gb/s,
this can force the use of a new SA.
These security relationships (CAs, SCs, and SAs) and the information associated with each of them are
further discussed in 7.1.1, 7.1.2, and 7.1.3. Their mutual relationship, and the insecure connectivity provided
by the LAN that supports them, are illustrated in Figure 7-1 through Figure 7-3 for a point-to-point LAN and
in Figure 7-4 through Figure 7-6 for stations attached to a shared media LAN.
Figure 7-1 shows two stations, A and B, connected to a point-to-point LAN that provides insecure bidirectional connectivity.
CAAB
23
Figure 7-3 shows the two SCs that support the CA.
SCA
SCB
C
D
24
Figure 7-5 depicts a CA created by MACsec Key Agreement following mutual authentication and
authorization of A, B, and C. The CA excludes D.
CA ABC
C
D
Figure 7-6 shows the three SCs that support the CA, one for transmission by each of A, B, and C.
A
SCC
SCB
SCA
C
D
While D can send and receive frames using the insecure connectivity provided by the shared LAN, it does
not have SAKs that would allow it to participate in any of the SAs that currently support SCA, SCB, or SCC,
Copyright 2006 IEEE. All rights reserved.
25
and therefore D cannot compromise the integrity, confidentiality, or origin of any of the frames being
exchanged by A, B, and C.
7.1.1 Connectivity Association (CA)
MACsec Key Agreement is responsible for discovering, authenticating, and authorizing the potential
participants in a CA. A SecY, as specified in this standard, does not need to be aware of the CA, except as a
list of SCs in which it needs to participate. Since all the SCs in a CA use the same Cipher Suite at any one
time, the Cipher Suite can be considered a property of the CA. A change in the Cipher Suite necessitates an
interruption to the service provided by the CA.
Each SecY participates in only a single CA at any one time. There is a limit, readable by management and by
the KaY, on the number of peer SecYs that can participate in a CA (10.7.7, 13.5).
NOTEIf this specification had allowed different SCs to use different Cipher Suites, a SecY implementing more than
one Cipher Suite would have to be capable of simultaneous transmitting using one Cipher Suite and receiving using one
or more other Cipher Suites.
MACsec Key Agreement is responsible for informing each SecY of the identifier to be used for the
transmitting SecY, and of the existence and identifier of each of the SCs for which the SecY is to receive
frames. While the structure of the communication facilitated by each SC is point-to-multipoint (which
encompasses point-to-point as a special case) the SecY does not have to be aware that its transmissions can
reach multiple receivers, that the frames that it receives could be received by other SecYs, or of any
relationship or lack of relationship between the inbound SCs.
NOTE 3The point-to-multipoint nature of the SC does have technical consequences, in particular the decision to
change from one SA to another is made by the transmitter using the SC, not by one or some number of the receivers.
unique. When the Default Cipher Suite (14.5) is used, the SCI is included in the IV to ensure uniqueness
across SCs.
The decision to replace one SA with its successor is made by the SecY that transmits using the SC, after
MACsec Key Agreement has informed it that all the other SecYs are prepared to receive using that SA. No
notification, other than receipt of a secured frame with a different SAI is sent to the receiver. At any one
instant a SecY has to be capable of storing SAKs for two SAs for each inbound SC, and of swapping from
one SA to another without notice. Certain LAN technologies can reorder frames of different priority, so
reception of frames on a single SC can use interleaved SAs. The time bound within which a receiver can
accept interleaved SAs is 0.5 s.
The transmitting SecY does not interleave frames.
Association Number
System Identifier
Port Number
SCI
SAI
27
NOTE 1The service access point for the secure MAC Service is referred to as Controlled Port of the MAC SecY
(Clause 10) and the service access point for the insecure MAC Service as the SecYs Common Port. Access to the
insecure service for protocol entities above MAC Security is provided at the Uncontrolled Port.
NOTE 2Although the field or fields used to provide service instance multiplexing are not parameters of the ISS, and
thus are not protected, the integrity of the secure MAC Service is not compromised. If the unprotected fields are
modified, the frame can be delivered to the wrong SecY, but will subsequently fail integrity checks. Different SecYs use
different security associations, keys, and cryptographic nonces. Additional management parameters are
(cryptographically) bound to individual SecYs, not to the values of frame fields.
The secure MAC Service requirements for symmetric and transitive connectivity ensure that two or more
service instances on the same LAN will appear as separate LANs to the clients of the SecYs. There is
therefore no conflict between the use of bridges and the provision of multiple secure service instances.
When clients that are connected to a first service instance change and connect to a second service instance,
the secure connectivity alters. MAC_Operational temporarily transitions to False for a minimum amount of
time to allow the CA to re-establish its membership (as determined by the KaY). In particular, each time
membership of a CA changes, MAC_Operational transitions False for at least one of each pair of SecYs
whose connectivity has changed. For example, if members of CAx leave CAx and join CAy and if CAy has
MAC_Operational True, then MAC_Operational transitions to False for either the members of CAx who are
joining CAy or for the original members of CAy. MAC_Operational transitions to True once all the new
members have joined CAy.
NOTE 3Two SecYs that connect to the same LAN and participate in the same CA appear connected to the same LAN
(as one would expect) and appear connected to different LANs as they participate in distinct CAs. The effect is similar to
partitioning a LAN by switching a repeater on or off.
Distinct instances of the secure point-to-point MAC Service can be provided by a bridge to different end
stations connected to the same shared media by using the source address of the frames transmitted by each
end station to identify one of a number of SecYs in the receiving bridge (11.8). Where the source address is
not sufficient to select the receiving SecY, the SCI can be used to provide service instance multiplexing for
both secured and unsecured frames (11.8, 9.5, 10.6).
NOTE 4IEEE Std 802.11 specifies its own mechanisms for identifying separate secure associations.
NOTE 1For example, correct operation of Spanning Tree Protocol depends on the delivery of BPDUs to the Spanning
Tree Protocol Entity of a given bridge from all the other bridges attached to the LAN that transmit frames that can be
relayed by the given bridge. If a SecY were to require a higher level of authorization to pass received BPDUs through
the Controlled Port, data loops in the network could result. However, the STP Entity can adopt a policy of discarding
frames rather than permit another system that is not authorized as a bridge to be the Designated Bridge for the CA.
The client policies in use at any time should reflect the intersection of the capabilities permitted to the
members of the CA. Policies can be
a)
b)
Selected by the client on the basis of the level of authorization, as provided by the KaY through a
layer management interface (LMI) (see 10.7) or
Selected by a central server that forms part of the management framework for the network, and
1) Securely downloaded or
2) Communicated to the client using a secure connection
MACsec Key Agreement supports mechanisms that securely bind downloads and secure connections to
their intended client, thus protecting against a rights amplification attack.
NOTE 2If one of the members of the CA is a bridge (strictly speaking the Bridge Port is the CA member), the other
members should adopt policies that reflect their confidence in the policies applied by the bridge to forward frames. In
this case the trust is partly transitivethe question to be answered by each member of the CA is the degree of trust to
place in the bridges trust of systems that originate frames that the bridge will forward.
Limiting the set of protocol procedures that can be invoked by the peer
Segregating communications between different sets of peer users of the MAC Service
Filtering, i.e., discarding, received frames
Clients of the secure MAC Service can also record any exceptional policy actions taken, so as to initiate
further administrative action, outside the scope of this standard, with the entities responsible for the
operation of the authenticated peer systems.
NOTE 1To facilitate policy selection by clients of the secure MAC Service, IEEE P802.1af specifies authorized
permissions, including those required by MAC Bridges (IEEE Std 802.1D) and VLAN-aware Bridges (IEEE Std
802.1Q) to support the secure MAC Service in Bridged and Virtually Bridged Local Area Networks.
NOTE 2A VLAN-aware Bridge that assigns frames that have been received from a specific Bridge Port (the bridges
point of attachment to a service instance) to a VLAN on the basis of the authorization associated with the Port provides
an example of policy of segregating communications, as described in item b) above.
29
MACsec Key Agreement can use discovery protocols to identify SecYs that can participate in a CA. These
protocols use a Reserved Group MAC Address that is normally filtered by bridges to restrict each instance
of the secure MAC Service to an individual LAN
NOTE 2Use of this address ensures that the physical topology as perceived by spanning tree protocols aligns with that
provided by MAC Security. In Provider Bridged Networks, the Provider Bridge Group Address is used. An exception to
the alignment rule occurs with certain types of interface that are supported by Provider Bridge Networks, where a
provider operated C-VLAN (see IEEE Std 802.1ad) aware component provides the customer interface.
The policies applied by the Bridge Forwarding Process that is a client of each MAC service instance can
include but are not limited to
a)
b)
c)
d)
e)
f)
g)
h)
NOTE 3A Bridge Port is one of the bridges points of attachment to an instance of the MAC Internal Sublayer Service
(ISS), and is used by the MAC Relay Entity and associated Higher-Layer Entities as specified in IEEE Std 802.1D, IEEE
Std 802.1Q, and IEEE Std 802.1ad.
NOTE 4The RSTP and MSTP restrictedRole parameters in IEEE Std 802.1Q ensure that the spanning tree active
topology for other Bridge Ports is unaffected by BPDUs received on the Port, while continuing to protect against data
loops and allowing the peer system to use the BPDUs it receives to select between redundant service instances. The
restrictedRole parameter should be set if the authorization (see also 7.3) of the peer system(s) is not sufficient to allow
full participation in determining the active topology of the network.
In response to a limited authorization on the Bridge Port, a bridge can be configured to discard frames other
than from a specified number of MAC addresses and to use additional services provided by the network
administrator to ensure that these permitted addresses are not used by other end stations in the network.
30
Sets out requirements for the design (8.1) and support (8.2) of MACsec
Provides an overview of its operation (8.3)
NOTE 1The operation of MACsec Key Agreement Entity (KaY) and the protocols it uses are outside the scope of this
standard. However, the security relationships (Clause 7) it establishes are essential to the operation of MACsec and form
part of the support requirements.
Conformance to this standard is in terms of the observable protocol arising from the operation of a MAC
Security Entity (SecY, Clause 10), including management of MACsec and the service provided to client
protocols that use the secure MAC service.
Each of the possible sets of cryptographic algorithms used by MACsec to provide connectionless frame
integrity and data confidentiality compose a Cipher Suite. This clause describes the result of Cipher Suite
use by the SecY, illustrated in Figure 8-1. The normative specification of each Cipher Suite is provided in
Clause 14. The Cipher Suite is selected as part of the establishment of the CA (7.1.1).
Receive
Transmit
User
Parameters
Protocol
Parameters
MSDU
MAC Addresses
Destination
Source
Address
Address
User Data
Destination
Address
Source
Address
SecTAG
MAC Addresses
Confidentiality
(optional)
Secure Data
ICV
MPDU
Figure 8-1MACsec
NOTE 2The Destination Address and Source Address parameters are shown as separate from the MPDU in Figure 81, as they are separate parameters of each service request. The encoding of these parameters into a transmitted frame on
a medium is accomplished by the supporting service, which can interpose additional octets between those of the
addresses and the MSDU. In the strict sense of externally visible transmission, this standard deals with parameters of
service primitives, not with frames. However, it is often convenient to talk of these parameters as a frame.
31
Connectivity (6.7)
Security (6.8, 6.9, 8.1.1)
Manageability (8.1.2)
Interoperability (8.1.3)
Deployment (8.1.4)
Coexistence (8.1.5)
Scalability (8.1.6)
Intrusion detection (8.1.7)
Localization and isolation of attacks (8.1.8)
Implementation (8.1.9)
These requirements are met by the operation of MACsec (8.3) together with requirements placed on
k)
l)
m)
n)
The architecture that specifies how MAC Security Entities (SecYs) are placed within LAN stations
and communicate with selected peers (Clause 11)
The choice of cryptographic methods that compose each MACsec Cipher Suite (Clause 14)
Support of the protocol by each SecY, and on the system that contains it (8.2)
The operation of the protocols that support MACsec Key Agreement, including aspects of
authentication, authorization, and distribution of keys
b)
c)
Enables a succession of SAs, each with its own Secure Association Key (SAK) to be used to support
the connectivity provided by each SC. The succession of SAKs (7.1), together with the use of Key
Agreement protocols that provide Perfect Forward Secrecy, protects against the compromise of any
single SAK, without disrupting service.
Ensures that a fresh SA, supporting an existing CA, can be used within a known bounded time (1 s,
see 8.1.9) at intervals that are also bounded (keys can be changed as frequently as once every 10 s)
after Key Agreement provides the associated SAK.
Allows operation of the Key Agreement protocol to be independent of MACsec. In particular allows
fresh SAKs to be supplied at any time, without unnecessarily disrupting communication.
NOTEKey lifetimes are a property of the authentication and authorization provided by key agreement, and can
therefore be restricted independently by any system in the CA.
The security provided by each SAK rests on the security provided by the Cipher Suite (see Clause 14 for
requirements), which in turn depends on the guarantees provide by the cryptographic mode of operation and
its underlying block cipher, and on the protocols and procedures used to ensure that keys remain secret.
8.1.2 Manageability requirements
The design of MACsec ensures that the protocols that configure, and that run over media, individual LANs,
and Bridged or Virtual Bridged Local Area Networks as a whole, can continue to operate with no diminution
32
in the capabilities available to and customarily used by network administrators. Existing firewall and
forwarding filters can still be applied to specific protocols.
When the Default Cipher Suite is used for integrity protection without confidentiality protection, protocol
analyzers and other tools that support MACsec parsing can understand the User Data transmitted, but cannot
modify that data without the receiving SecY being aware of the intrusion. This capability is also available
whenever the Secure Data remains the same as the User Data and the Integrity Check Value (ICV) length is
the same as that of the Default Cipher Suite.
Where MACsec supports a shared media CA, or a point-to-point CA that uses shared transmission facilities,
MACsec can convey the SCI (7.1.2, 8.2.1, 9.9), thus identifying the secure system that transmitted the
MPDU both to the intended recipient and to network management systems.
8.1.3 Interoperability requirements
Interoperability between independent implementations of MACsec is facilitated by mandatory
implementation of a Default Cipher Suite.
The use of Cipher Suites as a specification tool reduces the number of permutations of cryptographic
algorithms and their parameters. Clause 14 mandates elements of Cipher Suite specification.
Where the underlying MAC Service used by MACsec is supported by a Provider Bridged Network
(IEEE Std 802.1ad), communicating SecYs can be attached to different media operating (locally) at different
transmission rates. Interoperability between, for example, 10 Gb/s and 1 Gb/s, and between 1 Gb/s and
100 Mb/s requires interoperability across the speed range. The design of MACsec facilitates interoperability
from 1 Mb/s to 100 Gb/s without modification or negotiation of protocol formats and parameters. Operation
at higher transmission rates depends on the capabilities of the Cipher Suite. The mandatory default Cipher
Suite has been selected (Clause 14) in part because of its ability to perform across this range.
NOTEClearly additional ways of interconnecting different media access control methods could be standardized in the
future. The above requirement mandates that interoperability be preserved between SecYs attached to a wide range of
media operating over a wide speed range.
Communication between SecYs using different media access methods requires that MACsec not make use
of any media-specific additions to the MAC Service, or rely on any deficiencies in support of the service
being common to all communicating participants. MACsec includes an explicit indication of the length of
the Secure Data to avoid imposing the minimum frame size and padding requirements of IEEE Std 802.3 on
all other media access methods that make use of MACsec.
8.1.4 Deployment requirements
The design of MACsec allows security to be introduced into a network one LAN at a time. Additionally the
controls provided by a SecY (Clause 10) allow the deployment of MACsec capable systems one by one on a
LAN, prior to enabling security. Integrity checking of MPDUs using the Default Cipher Suite can be
disabled to facilitate testing of Key Agreement protocols prior to enabling security. Management counters
allow a network system administrator to confirm that the connectivity provided by a SecY is complete and
that enabling security will not disrupt existing required connectivity.
8.1.5 Coexistence requirements
The design of MACsec allows coexistence with other protocols on the same insecure LAN. This
a)
33
b)
Allows fresh keys to be derived, using Key Agreement protocols that can be independently specified
and use different frame formats, while MACsec is operating
c)
b)
34
SC identification (8.2.1)
2)
The functionality provided by Key Agreement protocols, and the operation of the KaY for
1)
2)
3)
Authentication (8.2.5)
4)
Authorization (8.2.6)
5)
Prepare a new SAK for use within one second (8.1.9) of being given it by the KaY
Change from the use of one installed SAK to the next within the time normally taken to transmit one
minimum sized frame, and shall not discard any frames as a result of the change
NOTEElsewhere in this standard the requirement for switching between SAKs is modelled as a requirement to
support two SAKs for transmission, allowing management counters to reflect the continued use of a key after its
successor has been provided by the KaY. The behavior of an implementation capable of accepting the new key and using
it within one frame time is fully conforming, and will not cause any apparent management anomalies.
Receive any frame and its immediate successor using any one of two SAKs, allowing the selection
of different keys to switch without missing a frame.
Prepare a new SAK for use within one second (8.1.9) of being given it by the KaY
The system does not need to be able to seamlessly switch between Cipher Suites.
8.2.3 KaY independence of MACsec
The KaY is aware of the required connectivity, identifying the SCs that compose the CA, independently of
the design and state of MACsec.
The KaY operates resiliently in face of specifically identified denial of service attacks (as identified by the
key agreement protocol specification).
These requirements are met in part by distinguishing key agreement frames from MACsec frames by using a
different EtherType.
8.2.4 Discovering connectivity
The KaY discovers connections between peer stations and recognizes potential connections.
NOTE 1 The MAC status parameters (6.4) indicate when connectivity changes. The status parameters provided by the
KaY can also temporarily transition False to indicate a change in the authentication or authorization of its peers,
preventing attacks that secretly degrade the trust.
The KaY accepts indications of which Cipher Suites are supported by the SecY via the LMI.
NOTE 2The negotiation of which Cipher Suite is to be used on a connection is based on what Cipher Suites are
available locally and at the peer SecY.
The KaY accepts indications of which connectivity capabilities are supported by the SecY via the LMI. The
KaY delivers the connectivity selection to the SecY via the LMI.
35
MACsec does not transmit additional frames, such as keep alives or key exchanges. Each frame is delivered
unmodified to peer users, subject to validation of the origin, destination and source address, and user data.
Figure 8-2 illustrates the transmission and reception of a frame by MACsec.
On transmission, the frame is first assigned to an SA (7.1.3), identified locally by its Association Number
(AN) (see 7.1.3, 9.6). The AN is used to identify the SAK (7.1.3), and the next PN (3.27, 9.8) for that SA.
The AN, the SCI (7.1.2), and the PN are encoded in the SecTAG (the SCI can be omitted for point-to-point
36
CAs) along with the MACsec EtherType (9.8) and the number of octets in the frame following the SecTAG
(SL, 9.7) if less than 48 (8.1.3).
The protection function (14.1) of the Current Cipher Suite is presented with the SAK, the PN and SCI, the
destination and source addresses of the frame together with the octets of the SecTAG, and the User Data. It
returns the ICV.
On receipt of a MACsec frame, the AN, SCI, PN, and SL field (if present) are extracted from the SecTAG (if
the CA is point-to-point and the SCI is not present, the value previously communicated by the KaY will be
used). The AN and SCI are used to assign the frame to an SA, and hence to identify the SAK.
The validation function of the Current Cipher Suite is presented with the SAK, the PN and SCI, the
destination and source addresses of the frame together with the octets of the SecTAG, and the Secure Data
and ICV. If the integrity of the frame has been preserved and the User Data can be successfully decoded
from the Secure Data, a VALID indication and the octets of the User Data are returned.
If the receive frame is valid, replay protection (if enabled) is applied, by checking that the received PN is not
less than the lowest acceptable PN for the SA. If the check succeeds the parameters of the frame, unchanged
from those transmitted, are presented to the MACsec client, and the lowest acceptable PN updated. The
lowest acceptable PN can lag behind the received PN values, providing a window in which replay is
tolerated, to allow receipt of frames that have been misordered by the network.
Priority*
Destination Address, Source Address
SecTAG
PN SCI*
SAK
(Key)
SCI
SecTAG
AN
Destination and
Source Address
PN SCI
SCI*
SecTAG
1
SAK
(Key)
Destination and
Source Address
transmit
AN
AN
PN
receive
3
VALID
User Data
Secure Data
PROTECT
User Data
VALIDATE
ICV
TRANSMIT
RECEIVE
* Priority can be changed by media access method or receiving system and is not protected
* The SCI is extracted from the SCI field of the SecTAG if present. A value conveyed by key agreement (point-to-point only) is used otherwise.
Functions
Discard if received frame not VALID. Discard if replay check of PN for receive SA identified by SCI, AN fails. Updated replay check.
37
NOTEThe MPDU validation checks specified in this clause are deliberately limited to ensuring successful decoding,
and do not overlap with the specification of SecY operation (Clause 10).
Each of these components comprises an integral number of octets and is encoded in successive octets of the
MPDU as illustrated in Figure 9-1.
NOTEThe MPDU does not include the source and destination MAC addresses, as these are separate parameters of the
service requests and indications to and from the insecure service that supports MACsec.
38
8 or 16
octets
0 to n
octets
8 to 16
octets
SecTAG
Secure Data
ICV
MPDU
1
octet
1
octet
4
octets
SL
PN
8
octets
SCI (encoding
is optional)
SecTAG
Name
Value
MACsec EtherType
88-E5
The encoding of the MACsec EtherType in the MPDU is illustrated in Figure 9-3.
39
Version numbering of the MACsec protocol without changing the MACsec EtherType
Optional use of the MAC Source Address parameter to convey the SCI
Optional inclusion of an explicitly encoded SCI (7.1.2, Figure 7-7)
Use of the EPON (Clause 12) Single Copy Broadcast capability, without requiring an explicit SCI to
distinguish the SCB Secure Channel
Extraction of the User Data from MPDUs by systems that do not possess the SAK (8.1.2, 8.1.4)
when confidentiality is not being provided
Determination of whether confidentiality or integrity alone are in use
The encoding of the MACsec TCI in the MPDU is illustrated in Figure 9-4.
Octet
Bits
3
V=0
ES
SC
SCB
AN
If the MPDU is transmitted by an end station and the first 6 octets of the SCI are equal to the value of the
octets of MAC Source Address parameter of the ISS request in canonical format order, bit 7 [the End Station
(ES) bit] of the TCI may be set. If the ES bit is set, bit 6 (the SC bit) shall not be set and an SCI shall not be
explicitly encoded in the SecTAG. The ES bit is clear if the Source Address is not used to determine the SCI.
If an SCI (9.9, 7.1.2) is explicitly encoded in the SecTAG, bit 6 (the SC bit) of the TCI shall be set. The SC
bit shall be clear if an SCI is not present in the SecTAG.
If and only if the MPDU is associated with the Secure Channel that supports the EPON Single Copy
Broadcast capability, bit 5 (the SCB bit) of the TCI may be set. If the SCB is set, bit 6 (the SC bit) shall not
be set and an SCI shall not be explicitly included in the SecTAG.
If the ES bit is set and the SCB is not set, the SCI comprises a Port Identifier (7.1.2) component of 00-01. If
the SCB bit is set, the Port Identifier (7.1.2) component has the reserved SCB value of 00-00.
If the Encryption (E) bit is set and the Changed Text (C) bit is clear, the frame is not processed by the SecY
(10.6) but is reserved for use by the KaY. Otherwise, the E bit is set if and only if confidentiality is being
40
provided and is clear if integrity only is being provided and the C bit is clear if and only if the Secure Data is
exactly the same as the User Data and the ICV is 16 octets long.
When the Default Cipher Suite (14.5) is used for integrity protection only, the Secure Data is the unmodified
User Data, and a 16 octet ICV is used. Both the E bit and the C bit are therefore clear, and the data conveyed
by MACsec is available to applications, such as network management, that need to see the data but are not
trusted with the SAK that would permit its modification. Other Cipher Suites may also integrity protect data
without modifying it, and use a 16 octet ICV, enabling read access to the data by other applications. The E
and C bits are also clear for such Cipher Suites when integrity only is provided.
Some cryptographic algorithms modify or add to the data even when integrity only is being provided, or use
an ICV that is not 16 octets long. The C bit is never clear for such an algorithm, even if the E bit is clear to
indicate that confidentiality is not provided. Recovery of the data from a MACsec frame with the E bit clear
and the C bit set requires knowledge of the Cipher Suite at a minimum. That information is not provided in
the MACsec frame.
If both the C bit and E bit are set, confidentiality of the original User Data is being provided.
Provide a unique IV PDU for all MPDUs transmitted using the same SA
Support replay protection
NOTEAs specified in this clause, the IV used by the default Cipher Suite (GCM-AES-128) comprises the SCI (even if
the SCI is not transmitted in the SecTAG) and the PN. Subject to proper unique MAC Address allocation procedures, the
SCI is a globally unique identifier for a SecY. To satisfy the IV uniqueness requirements of CTR mode of operation, a
fresh key is used before PN values are reused.
41
a)
b)
Octets 9 through 14 of the SecTAG encode the System Identifier component of the SCI. This comprises the
six octets of a globally unique MAC address uniquely associated with the transmitting SecY. The octet
values and their sequence conform to the Canonical Format specified by IEEE Std 802.
Octets 15 and 16 of the SecTAG encode the Port Identifier component of the SCI, as an integer.
NOTE The 64-bit value FF-FF-FF-FF-FF-FF is never used as an SCI and is reserved for use by implementations to
indicate the absence of an SC or an SCI in contexts where an SC can be present.
An explicitly encoded SCI field in the SecTAG is not required on point-to-point links, which are identified
by the operPointToPointMAC status parameter of the service provider. In the point-to-point case, the secure
association created by the SecY for the peer SecYs, together with the direction of transmission of the
secured MPDU, can be used to identify the transmitting SecY and therefore an explicitly encoded SCI is
unnecessary. Although the SCI does not have to be repeated in each frame when only two SecYs participate
in a CA (see Clause 8, Clause 9, and Clause 10), the SCI still forms part of the cryptographic computation.
42
i)
43
Provides an overview of the SecY (10.1), the service that it provides, and its relationship to other
entities in a secure system including its associated MACsec Key Agreement Entity (KaY).
Describes the functionality of the SecY (10.2).
Provides a model of operation (10.3) comprising an architecture (10.4) and its constituent processes
(10.5 through 10.7) that supports the detailed functionality including management controls.
Details the addressing requirements and specifies the addressing of SecYs (10.8).
NOTEClause 6 defines the properties of the secure MAC Service, Clause 7 describes the security relationships used
to support the service, and how the service is used, providing the context within which each SecY operates, Clause 8 sets
out requirements for the MACsec protocol and introduces the operation of the protocol, and Clause 9 specifies the
encoding of parameters in MPDUs. This clause does not repeat all the information provided in those prior clauses, but
includes sufficient reference to facilitate an understanding of SecY operation.
M_UNITDATA.request(..)
M_UNITDATA.indication(..)
ISS
M_UNITDATA.indication(..)
Secure Frame
Generation
Cipher Suite(s)
PROTECT
VALIDATE
ISS
Secure Frame
Verification
M_UNITDATA.indication(..)
M_UNITDATA.request(..)
Figure 10-1SecY
The integrity and origin of the parameters of each service request and indication accepted from and
delivered to the Controlled Port are protected and validated by the SecY. The SecY may also encrypt to
provide user data confidentiality. If the parameters that accompany a service indication at the Common Port
are not successfully validated as required by management controls, no service indication will occur at the
Controlled Port and the received parameters will be discarded.
Each service request made by the user of a SecYs Uncontrolled Port results in an identical request at the
Common Port, and each service indication received from the Common Port results in an identical indication
to the user of its Uncontrolled Port in addition to any indication at the Controlled Port.
44
NOTE 1Some frames received at the Uncontrolled Port will be discarded because they can only be useful to a SecY
supporting the associated Controlled Port.
The relative order of Common Port indications and the corresponding indications at the Uncontrolled Port
and the Controlled Port is not defined, save that the order of indications from one Port to another Port is
preserved. Similarly the relative order of user requests at the Uncontrolled and Controlled Ports does not
define the order of requests to the Common Port. The interval between any request or indication and the
SecY making a corresponding request or indication shall not exceed the bounds specified in Table 10-1.
The specification of the cryptographic algorithms used at any time to provide integrity and confidentiality,
together with the values of parameters (for example, key size) used by those algorithms, compose a Cipher
Suite (Clause 14). This standard mandates a default Cipher Suite that can provide integrity protection only
or both integrity and confidentiality. A SecY may implement additional Cipher Suites. This standard only
permits the use of Cipher Suites that meet well defined criteria (14.2, 14.3).
The KaY associated with the SecY uses the service provided by the Uncontrolled Port to transmit and
receive frames that support key agreement protocols. These frames are distinguished by EtherType, so other
selected protocol entities can communicate using insecure frames by making use of an Uncontrolled Port
provided by the KaY as illustrated in Figure 10-2.
The KaY also uses the Controlled Port provided by the SecY, providing its own Controlled Port for use by
other protocols. This allows the KaY to provide MAC status parameters (6.4) that correctly reflect the secure
connectivity to those users. The KaY does not modify frames that pass between its Controlled Port and the
SecYs Controlled Port. However the KaY can use the secure service provided by the SecY to complete
authentication, authorization, or the acquisition of client policies, prior to enabling transmission and
reception through its Controlled Port.
NOTE 2Operation of the SecY without protection or validation allows the same interfaces and relationships to be
maintained between entities within a system when SecY functionality is not required. This provides a useful migration
path for networks comprising systems that will incorporate SecY functionality at different times.
ISS
LMI
KaY
(
ISS
LMI
SecY
SecY
Mgmt
ISS
45
information exchange between entities not necessarily adjacent in a protocol layer reference model. No constraints are
placed on the information exchanged, but there is no synchronization with any particular invocation of service at a
service access point, so LMI exchanges do not effectively add to the parameters of a service such as the MAC service.
Secure transmission of the parameters of service requests made by the user of its Controlled Port.
b)
c)
Reception, verification, and delivery of secure service indications to the Controlled Port.
d)
e)
MAC Status (6.4) and point-to-point parameters (6.5) for the Uncontrolled and Controlled Ports.
Transmission and reception by the user of the Controlled Port without frame modifications.
g)
h)
A replay window to support use of MACsec over provider networks that misorder frames with
different transmission priority and or addresses. Frames within the window can be received out of
order, but are not replay protected. The window size can be set to zero to enforce strict reception
ordering and replay protection.
Selection of a Cipher Suite, CA establishment, and SA support, is supported by allowing the KaY to
i)
Discover which Cipher Suites are implemented and how many receive SCs each can support.
j)
k)
l)
m)
Confirm that SAKs have been installed, i.e., are ready for use.
n)
Monitor the PN used for transmission, in order to provide new SAKs prior to PN exhaustion.
Administrative control over the optional security tagging capabilities of the SecY.
p)
A count of frames intended for transmission but discarded as too long for the Common Port.
q)
Counts of received frames without the MACsec EtherType, discarded by validation checks, without
SCIs when the LAN connectivity is not restricted to point-to-point communication, identified as
belonging to unknown SCs, identified as belonging to an SA that is not in use, failing the replay
check, failing the integrity check, and delivered to the user.
NOTEExcept where explicitly specified otherwise, throughout this standard the term user refers to the user of the
MAC service instance provided by the Controlled Port, and the term provider refers to the instance of protocol and
procedures that provides the MAC service instance to the SecY at the Common Port.
46
The Controlled, Uncontrolled, and Common Ports together with their MAC Status parameters.
The Secure Frame Generation process (10.5).
The Secure Frame Verification process (10.6).
Cipher Suite protection of transmitted frames and validation of received frames (8.2, 14).
A Transmit Multiplexer and a Receive Demultiplexer.
Optional transmit and receive FCS Regenerators.
A SecY Management process (10.7).
The Transmit Multiplexer accepts transmit requests from the Uncontrolled Port and the Secure Frame
Generation process for the Controlled Port and submits corresponding requests to the Common Port. The
Receive Demultiplexer submits each indication from the Common Port to the Uncontrolled Port and to the
Secure Frame Verification process for the Controlled Port.
NOTE 1This specification most clearly sets out the resulting behavior of a conforming implementation. Real
implementations can implement the behavior in any way that yields the same externally visible behavior (including the
values of management counters). For example, examination of the specification in this clause shows that there need be
no implementation burden corresponding to duplication of the received frame if validateFrames is Strict and none of the
users of the Uncontrolled Port make use of the MACsec EtherType.
A Layer Management Interface (LMI) is used by the SecY Management process to communicate the
capabilities of the SecY, its controls, status, protocol, management events, and counters to and from other
entities that compose the secure system containing the SecY.
Management controls are provided to allow a SecY to be incorporated in a network system before MACsec
is deployed, and to facilitate staged deployment. If protectFrames is not set, frames submitted to the
Controlled Port are transmitted without modification. The validateFrames control allows untagged frames to
be received, and Cipher Suite validation of tagged frames to be disabled or its result simply counted without
frame discard. The replayProtect and replayWindow controls allows replay protection to be disabled, to
operate on a packet number window, or to enforce strict frame order. Management counters allow
configuration and operational errors to be identified and rectified before enabling secure operation. The
effect of the controls, and the counters maintained, are summarized in Figure 10-4 and Figure 10-5.
A frame check sequence (FCS) can be included as a parameter of an M_UNITDATA.request or
M_UNITDATA.indication primitive. When the data that is within the FCS coverage is modified by the
addition of an integrity check value (ICV) or encryption of the user data, the FCS changes. The SecY shall
not introduce an undetected frame error rate greater than that which would have been achieved by preserving
the original FCS (6.10).
47
NOTE 2There are number of possibilities for changing FCS without diminishing the coverage provided. One is to
generate a new FCS by algorithmically modifying the received FCS, based on knowledge of the FCS algorithm and the
transformations that the frame has undergone between reception and transmission.
Uncontrolled Port
M_UNITDATA.request(..)
Controlled Port
M_UNITDATA.request(..)
M_UNITDATA.indication(..)
)
ISS
LMI
M_UNITDATA.indication(..)
ISS
SecY
Mgmt
Cipher Suite(s)
PROTECT
VALIDATE
Secure Data
Secure Frame User Data
Generation :
SA & PN
assignment, DA,SA,SecTAG
SecTAG
ICV
coding,
cryptographic
protection
SCI, PN
SAK
User Data
Encryption
User Data
Decryption
Integrity
Check
Calculation
Integrity
Check
Verification
Verification
Transmit
Parameter
SASet
Key
Verification
Receive
Parameter
SASet
Key
FCS
FCS
regen.
User Data
Secure Frame
Verification :
Secure Data
SecTAG
decoding,
SC & SA
DA,SA,SecTAG
identification,
replay check,
ICV
cryptographic
validation,
SCI, PN
validate replay
check
SAK
priority
DA, SA
FCS
regen.
MPDU
Transmit
Multiplexer
priority
VALID
DA, SA
MPDU
DA, SA,
User Data
priority
Receive
Demultiplexer
ISS
Common Port
M_UNITDATA.indication(..)
M_UNITDATA.request(..)
48
()
Uncontrolled Port
Controlled Port
()
tx = transmitted frame
if (protectFrames == False)
ctrl.OutPktsUntagged++
tx.sa = &txsc.[encodingSA]
if (alwaysIncludeSCI || (rxsc_count() > 1))
add_secTAG(encodingSA, sa->next_PN, sci);
add_secTAG(encodingSA, sa->next_PN);
ctrl.OutPktsTooLong++
if (tp.ebit)
tp.sa->OutPktsEncrypted++
tp.sa->OutPktsProtected++
( ) Common Port
NOTE-- Tests and their consequences are annotated in this diagram using the computer language C, with variable
names corresponding to abbreviations of the text of this clause (10), which takes precedence.
Uncontrolled Port
Controlled Port
()
remove_secTAG_and_icv()
rv.sa->InPktsOK++
if (rv.pn >= rv.sa->next_PN) {rv.sa->next_PN = rv.pn + 1; update_lowest_acceptable_PN(rv.sa->next_PN, replayWindow);}
if (!rv.Valid)
rv.sc->InPktsUnchecked++
rv.sc->InPktsDelayed++
rv.sa->InPktsInvalid++
rv.sa->InPktsNotValid++
rv.sc->InPktsLate++
if (validateFrames == Disabled)
rv.Valid = False;
if ((validateFrames != Disabled) && !rv.ebit) { rv.Valid = integrity_check(rv);
InOctetsValidated += #Plaintext_octets;};
if ((validateFrames != Disabled) && rv.ebit) { rv.Valid = integrity_check_and_decrypt(rv);
InOctetsDecrypted += #Plaintext_octets;};
rv = received frame for validation
frame received exceeds cipher suite performance capabilities
if (replayProtect && (rx.pn < sa->lowest_PN))
if (!rx.sa->inUse)
rx.sa = &sc.rxa[rx.an]
if ((rx.sc = find(receive_channels, rx.sci)) == 0)
ctrl.InPktsOverrun++
rx.sc->InPktsLate++
if ((validateFrames == Strict)
|| rx.cbit)
rx.sa->InPktsNotUsingSA++
else
rx.sa->InPktsUnusedSA++
if ((validateFrames == Strict)
|| rx.cbit)
ctrl.InPktsNoSCI++
else
ctrl.InPktsUnknownSCI++
ctrl.InPktsBadTag++
rx = received frame
( ) Common Port
if (validateFrames == Strict)
ctrl.InPktsNoTag++
else
ctrl.InPktsUntagged++
NOTE-- Tests and their consequences are annotated in this diagram using the computer language C, with variable
names corresponding to abbreviations of the text of this clause (10), which takes precedence.
49
e)
f)
If the management control protectFrames is False, the preceding steps are omitted, an identical transmit
request is made to the Transmit Multiplexer, and the OutPktsUntagged counter incremented.
NOTEThis model of operation supports the externally observable behavior that can result when the Cipher Suite
implementation calculates the Secure Data and ICV parameters for a number of frames in parallel, and the responses to
protection and validation requests are delayed. Transmitted frames are not misordered.
If the management control alwaysIncludeSCI is set, or the number of receive SCs with SAs enabled for
reception is greater than one and both useES and useSCB are False, the SC bit in the SecTAG shall be set
and the SCI explicitly encoded in the SecTAG; otherwise, the SC bit shall be clear and the SCI not explicitly
encoded.
If the management control useSCB is True and alwaysIncludeSCI is False, the SCB bit in the SecTAG shall
be set. Otherwise, if useSCB is False or alwaysIncludeSCI is True, the SCB bit shall be clear.
The values of useES, useSCB, and alwaysIncludeSCI can be written and read by management. The number
of active receive SCs is controlled by the KaY but can be read by management.
If a frame is to be integrity protected, but not encrypted, with the number and value of the octets of the
Secure Data exactly the same as those of the User Data, and an ICV of 16 octets, then the E bit shall be clear
and the C bit clear. The E bit shall be clear and the C bit set if the frame is not encrypted but the octets of the
Secure Data differ from those of the User Data or the ICV is not 16 octets.
If both confidentiality (through encryption) and integrity protection are applied to a frame then both the E bit
and the C bit shall be set. The SecY shall not encode a SecTAG that has both the E bit set and the C bit clear
for any frame received from the Controlled Port for transmission.
If the alwaysIncludeSCI control is set or the number of receive SCs with SAs enabled for reception is greater
than 1, the SCI is included in the SecTAG; otherwise, it is omitted. The value of alwaysIncludeSCI can be
written and read by management. The number of active receive SCs is controlled by the KaY, but can be
read by management.
10.5.4 Cryptographic protection
If the Cipher Suite is currently protecting frames using the previous SA and its SA Key, as reflected by the
value of the encipheringSA, the frame can be queued awaiting protection. The value of the encipheringSA is
updated, and protection of the frame parameters is started within a minimum frame size transmission delay,
after the last frame has been protected using the previous key.
The use of each of the Cipher Suites specified by this standard is specified in Clause 14, which takes
precedence over any explanation in this or other clauses.
The appropriate octet counter is incremented by the number of octets in the User Data (OutOctetsEncrypted
if confidentiality protection was provided, and OutOctetsProtected otherwise).
10.5.5 Transmit request
If the MPDU composed of the concatenated octets of the SecTAG, Secure Data, and ICV exceeds the size of
the MSDU supported by the Common Port, the frame is discarded and a counter incremented. Details of the
discarded frame may be recorded to assist network management resolution of the problem. Otherwise, the
parameters of the service request are submitted to the Transmit Multiplexer.
51
e)
f)
g)
h)
i)
j)
If the management control validateFrames is not Strict, frames without a SecTAG are received, counted, and
delivered to the Controlled Port; otherwise, they are counted and discarded. If validateFrames is Disabled,
cryptographic validation is not applied to tagged frames, but frames whose original service user data can be
recovered are delivered. Frames with a SecTAG that has the TCI E bit set but the C bit clear are discarded, as
this reserved encoding is used to identify frames with a SecTAG that are not to be delivered to the
Controlled Port. Figure 10-5 summarizes the operation of management controls and counters.
10.6.1 Receive SA assignment
An SCI is associated with the received frame, and used to locate the receive SC. If an SCI is not explicitly
encoded in the SecTAG, the default value established by the KaY for a single peer is used.
If the SC is not found, it may be recorded to assist network management resolution of the problem, and:
a)
b)
If validateFrames is Strict or the C bit in the SecTAG is set, the InPktsNoSCI counter is incremented
and the frame is discarded; otherwise
The InPktsUnknownSCI counter is incremented and the frame (with the SecTAG and ICV removed)
is delivered to the Controlled Port.
If the receive SC has been identified, the frames AN is used to locate the receive SA received frame and
processing continues with the preliminary replay check. If the SA is not in use:
c)
d)
If validateFrames is Strict or the C bit is set, the frame is discarded and the InPktsNotUsingSA
counter incremented; otherwise
The InPktsUnusedSA counter is incremented and the frame delivered to the Controlled Port.
NOTEThe short phrase the frame is discarded is commonly used to express the more formal notion of not
processing a service primitive (an indication or request) further and recovering the resources that embody the parameters
of that service primitive. No further processing is applied. However, if a duplicate of the primitive has been submitted to
another process, by the Receive Demultiplexer in this case, processing of that duplicate is unaffected.
52
If the frame is not valid and validateFrames is set to Check, InPktsInvalid, otherwise
If the received PN is less than the lowest acceptable PN (treating a PN value of zero as 232),
InPktsDelayed, otherwise
If the frame is not valid, InPktsUnchecked, otherwise
InPktsOK
If the PN for the frame was equal to or greater than the nextPN variable for the SA, nextPN is set to the value
for the received frame, incremented by one. The lowest acceptable PN variable is set to the greater of its
existing value and the value of nextPN minus the replayWindow variable.
NOTEThe lowest acceptable packet number can also be set or incremented by the KaY to ensure timely delivery.
53
b)
c)
d)
e)
f)
g)
h)
i)
j)
k)
l)
m)
Maintains the MAC Status (6.4) parameters and point-to-point MAC parameters (6.5) for the
Uncontrolled (10.7.2) and Controlled (10.7.4) Ports
Provides interface statistics for the Uncontrolled (10.7.3) and Controlled Ports (10.7.5), deriving the
latter from the detailed statistics maintained by the SecY
Provides information on the frame verification (10.7.7) and generation (10.7.16) capabilities
Supports control of frame verification (10.7.8) and generation (10.7.17)
Supports creation of transmit SAs (10.7.21), each associated with an SAK, for the transmit SC
Supports creation of receive SCs (10.7.11), each corresponding to potential member of the CA
Supports creation of receive SAs (10.7.13) for each receive SC, each associated with an SAK
Supports control over reception (10.7.15) and transmission (10.7.23) using individual SAs, and
allows the nextPN variable to be set and updated for transmission and the lowest acceptable PN to
be set and update for reception
Maintains detail statistics for receive and transmit SCs and SAs, accumulating statistics from past
SAs and SCs
Provides a list of the Cipher Suites implemented together with their basic capabilities and properties
Allows selection of the current Cipher Suite, from those implemented
Supports installation of SAKs for the current Cipher Suite, for transmission, reception, or both.
Figure 10-6 illustrates the management information that represents a SecYs capabilities and provides
control over and reporting on its operation. For convenience the figure uses UML 2.0 conventions together
with C++ language constructs. For an explanation of these conventions, see UML Distilled: A Brief Guide to
the Standard Object Modeling Language, Third Edition [B1]. The containment relationships in Figure 10-6
have been chosen primarily to reflect the necessary relationships between lifetimes of potentially transient
objects. For example, a receive SC can contain a succession of SAs, but never more than one per AN at a
time, and all receive SAs for an SC are deleted when the receive SC ceases to exist. A paradigm of object
creation and deletion is used, instead of one of data structure reuse, to express the required bounding of the
lifetime of key information.
Conformance to this standard is strictly in terms of the external behavior required by this standard, as
revealed through the relationship of the operation of the SecY to the operations supported by the SMIv2
MIB module (Clause 13) and to the specifications of protocols operated by the KaY. Interactions with the
KaY through the LMI are wholly contained within the secure system, and there is no conformance with
respect to syntactic elements that are used to describe that interface in this clause. Table 10-1 specifies
performance requirements for SecY operation, including maximum delays for the execution of management
operations.
In some situations it can be desirable to substitute control using SNMP for the operation of key agreement
protocols, and Clause 13 provides all the necessary operations as an option. However, misuse of these
operations can compromise security, and their availability (including the ability of an administrator to
configure access to these operations) may be forbidden in some systems.
10.7.1 SCI
The SCI, a constant parameter of the SecY (7.1.2, 8.2.1), can be read but not written by management.
10.7.2 Uncontrolled Port status
The following status parameters are provided to the user(s) of the Uncontrolled Port, including the KaY:
a)
b)
c)
MAC_Enabled
MAC_Operational
operPointToPointMAC.
Their values are identical to those for the Common Port. They can be read but not written by management.
54
SecY
const SCI sci;
commonPort
2 controlledPort, uncontrolledPort
Provided_interface
RFC2863 : Interface MIB Counters
bool MAC_Enabled, MAC_Operational, operPointToPointMAC //read only
Used_interface
RFC2863 : Interface MIB Counters
bool MAC_Enabled, MAC_Operational,
operPointToPointMAC; //read only
bool ControlledPortEnabled;
verification
Verification
const int maxReceiveChannels, maxReceiveKeys;
enum {Disabled, Check, Strict} validateFrames:
bool replayProtect;
int
replayWindow;
count InPktsUntagged, InPktsNoTag, InBadTag, InPktsUnknownSCI, InPktsNoSCI, InPktsOverrun;
count InOctetsValidated, InOctetsDecrypted;
createReceiveSC(SCI sci);
receiveChannels
* ReceiveSC
ReceiveSA
const
bool
Time
count
SCI sci;
receiving; // read only
createdTime, startedTime, stoppedTime;
InPktsOK, InPktsUnchecked, InPktsDelayed, InPktsLate,
InPktsInvalid, InPktsNotValid,
InNotUsingSA, InPktsUnusedSA;
createReceiveSA(AN an, PN lowestPN; Data_key *key);
rxa[0-3]
bool
PN
Time
count
generation
Generation
const int maxTransmitChannels
bool protectFrames, alwaysIncludeSCI, useES, useSCB;
count OutPktsUntagged, OutPktsTooLong;
count OutOctetsProtected, OutOctetsEncrypted;
1 transmitChannel
TransmitSC
const
bool
Time
AN
count
TransmitSA
SCI sci;
transmitting; // read only
createdTime, startedTime, stoppedTime;
encodingSA, encipheringSA; // read only
OutPktsProtected, OutPktsEncrypted;
bool
PN
txa[0-3] Time
4 count
CipherSuiteIdentifier currentCipherSuite
CurrentCiphersuite
Time startedTime;
ciphersuites
*CipherSuite
const key
keys
Data_key
const SAK
const KI
const bool
const Time
key
55
ifInOctets
ifInUcastPkts, ifInMulticastPkts, and ifInBroadcastPkts
ifInDiscards
ifInErrors
ifOutOctets
ifOutUcastPkts, ifOutMulticastPkts, and ifOutBroadcastPkts
ifOutErrors
The ifInOctets, ifInUcastPkts, ifInMulticastPkts, and ifInBroadcastPkts counts are identical to those of
Common Port and are not separately recorded. The ifInDiscards and ifInErrors counts are zero, as the
operation of the Uncontrolled Port provides no error checking or occasion to discard packets, beyond that
provided by its users or by the entity supporting the Common Port.
The ifOutErrorscount is zero, as no checking is applied to frames transmitted by the Uncontrolled Port.The
ifOutOctets, ifOutUcastPkts, ifOutMulticastPkts, and ifOutBroadcastPkts counts are the same as those for
the user of the Uncontrolled Port.
10.7.4 Controlled Port status
The following status parameters are provided to the user of the Controlled Port, and can be read but not
directly written by management:
a)
b)
c)
ControlledPortEnabled
By setting ControlledPortEnabled False, the KaY can prohibit use of the Controlled Port until the secure
connectivity required has been configured.
10.7.6 Controlled Port statistics
The following statistics are provided to support IETF RFC2863 interface MIB Counters:
a)
56
ifInOctets
Copyright 2006 IEEE. All rights reserved.
b)
c)
d)
e)
f)
g)
The ifInOctets count is the sum of all the octets of the MSDUs delivered to the user of the Controlled Port by
the Secure Frame Verification process (10.6), plus the octets of the destination and source MAC addresses.
The ifInDiscards count is the sum of all the InPktsNoTag, InPktsLate, and InPktsOverrun counts. The
ifInErrors count is the sum of all the InPktsBadTag, InPktsNoSCI, InPktsNotUsingSA, and InPktsNotValid
counts (10.6, Figure 10-5).
The ifOutOctets count is the sum of the all octets of the MSDUs delivered by the user of the Controlled Port
to the Secure Frame Generation process (10.5), plus the octets of the destination and source MAC addresses.
The ifOutErrors count is equal to the OutPktsTooLong count (Figure 10-4). If ifOutDiscards is reported as
part of RFC2863 counts, it is zero.
10.7.7 Frame verification capabilities
The SecYs frame verification capabilities are represented by the following parameters:
a)
b)
The validateFrames and replayProtect controls are provided to facilitate deployment. They can be read by
management. Each may be written by management, but a conformant implementation shall provide a
mechanism to allow write access by network management to be disabled for each parameter individually. If
management access is prohibited to any of these parameters, its default value should be used.
10.7.9 Frame verification statistics
Any given received frame increments (10.6) exactly one of the following counts [item a) through item n)].
The following are maintained for the frame verification process as a whole:
a)
b)
c)
d)
e)
f)
InPktsUntagged
InPktsNoTag
InPktsBadTag
InPktsUnknownSCI
InPktsNoSCI
InPktsOverrun
57
The following are maintained only for each receive SC, and are discarded if the record of the SC is deleted
by the KaY:
g)
h)
i)
InPktsUnchecked
InPktsDelayed
InPktsLate
The following are maintained for each receive SC, and for each of the four receive SAs corresponding to the
last use of ANs 0 through 3 for that SC.
j)
k)
l)
m)
n)
InPktsOK
InPktsInvalid
InPktsNotValid
InPktsNotUsingSA
InPktsUnusedSA
The counts reported for each SC include those for current and prior SAs, with ANs that have since been
reused. This allows useful counts to be maintained on high-speed LANs where an SA may be used for little
more than 5 min, and an AN reused after 20 min.The times at which each SC and SA were, or are, in use are
recorded (10.7.12, 10.7.14) and assist correlation of the statistics collected with network events.
NOTEThe counts can be correctly reported, without the need for each frame to increment separate real-time counters
for the SC and an SA. A count for each SA is summed with that for the SC to respond to a request for the latter. When an
SA is replaced by a successor with the same AN, its counts are added to those for the SC.
InOctetsValidated, the number of octets of User Data recovered from received frames that were
integrity protected but not encrypted;
InOctetsDecrypted, the number of octets of User Data recovered from received frames that were
both integrity protected and encrypted.
These counts are incremented even if the User Data recovered failed the integrity check or could not be
recovered. In the latter case, an estimate of the number of User Data octets is used, as judged by the load
imposed on the validation function.
10.7.11 Receive SC creation
A receive SC, with a given SCI that remains unchanged for the life of the SC, is created following a request
from the KaY. Each SC has a unique SCI.
Receive SCs and SAs (10.7.13) may also be created and controlled by management, but a conformant
implementation shall provide a mechanism to allow creation and setting of control parameters by network
management to be disabled.
10.7.12 Receive SC status
The following status parameters can be read, but not written, by management:
a)
58
receiving, True if inUse (10.7.14) is True for any of the SAs for the SC, and False otherwise
Copyright 2006 IEEE. All rights reserved.
b)
c)
d)
When the SC is created, receiving is False, and startedTime and stoppedTime are equal to createdTime.
The record of the SC should be retained after it is no longer used, subject to the availability of system
resources, to provide information about immediate past operation.
10.7.13 Receive SA creation
A receive SA is created for an existing SC on request from the KaY, with the following parameters:
a)
b)
c)
d)
Frame verification statistics (10.7.9) for the SA are set to zero when the SA is created. Any prior SA with the
same AN for the SC is deleted. Creation of the SA fails unless the referenced SAK exists and is installed
(i.e., is available for use). A management protocol dependent reference is associated with each SA. This
reference allows each SA to be distinguished from any previously created for the same SCI and AN.
10.7.14 Receive SA status
The following parameters can be read, but not directly written, by management:
a)
b)
c)
d)
e)
f)
inUse
nextPN (10.6, 10.6.5)
lowestPN, the lowest acceptable PN value for a received frame (10.6, 10.6.2, 10.6.4, 10.6.5)
createdTime, the system time when the SA was created
startedTime, the system time when inUse last became True for the SA
stoppedTime, the system time when inUse last became False for the SA.
If inUse is True, and MAC_Operational is True for the Common Port, the SA can receive frames.
10.7.15 Receive SA control
The KaY uses the following parameters to control the use of each receive SA:
a)
b)
c)
enableReceive
updtNextPN
updtLowestPN
When the SA is created, enableReceive and inUse are False and the SA cannot be used to receive frames.
The SA shall be able to receive, and inUse shall be True, when enableReceive is set. The SA shall stop
receiving, and inUse shall be False, when enableReceive is reset.
The value of nextPN (or lowestPN as appropriate) shall be set to the greater of its existing value and the
supplied of updtNextPN (or updtLowestPN). Initially, following creation, the values of nextPN and
lowestPN will have been set to the values supplied by KaY.
59
OutPktsUntagged
OutPktsTooLong
The following are maintained for the transmit SC and for each of the four transmit SAs corresponding to the
last use of ANs 0 through 3 for that SC.
c)
d)
OutPktsProtected
OutPktsEncrypted
The counts reported for each SC include those for current and prior SAs, with ANs that have since been
reused. This allows useful counts to be maintained on high-speed LANs where an SA may be used for little
more than 5 min, and an AN reused after 20 min.The times at which each SC and SA were, or are, in use are
recorded (10.7.20, 10.7.22) and assist correlation of the statistics collected with network events.
NOTEThe counts can be correctly reported, without the need for each frame to increment separate real-time counters
for the SC and an SA. A count for each SA is summed with that for the SC to respond to a request for the latter. When an
SA is replaced by a successor with the same AN, its counts are added to those for the SC.
60
OutOctetsProtected, the number of octets of User Data in transmitted frames that were integrity
protected but not encrypted;
OutOctetsEncrypted, the number of octets of User Data in transmitted frames that were both
integrity protected and encrypted.
Copyright 2006 IEEE. All rights reserved.
transmitting, True if inUse (10.7.14) is True for any of the SAs for the SC, and False otherwise
encodingSA (10.5.1)
encipheringSA (10.5.4)
createdTime, the system time when the SC was created
startedTime, the system time when transmitting last became True for the SC
stoppedTime, the system time when transmitting last became False for the SC
When the SC is created, transmitting is False and startedTime and stoppedTime are equal to createdTime.
10.7.21 Transmit SA creation
An SA is created for the transmit SC on request from the KaY, with the following parameters:
a)
b)
c)
d)
Frame generation statistics (10.7.18) for the SA are set to zero when the SA is created. Any prior SA with
the same AN is deleted. Creation of the SA fails unless the referenced SAK exists and is installed (i.e., is
available for use). A management protocol dependent reference is associated with each SA. This reference
allows the transmit SA to be distinguished from any previously created with the same AN.
10.7.22 Transmit SA status
The following parameters can be read, but not directly written, by management:
a)
b)
c)
d)
inUse
createdTime, the system time when the SA was created
startedTime, the system time when inUse last became True for the SA
stoppedTime, the system time when inUse last became False for the SA.
If inUse is True, and MAC_Operational is True for the Common Port, the SA can transmit frames.
10.7.23 Transmit SA controls
The KaY uses the following parameters to control the use of each transmit SA:
a)
enableTransmit
When the SA is created, enableTransmit and inUse are False, and the SA is not used to transmit frames. The
SC parameter encodingSA shall be set to the value of the AN for the SA and inUse set True, when
enableTransmit is set. The SA shall stop transmitting, and inUse reset, when enableTransmit is reset.
10.7.24 Implemented Cipher Suites
The following read-only management information is provided for each Cipher Suite implemented:
a)
b)
61
c)
d)
e)
f)
g)
The Cipher Suite Identifier and Cipher Suite Name are both assigned by the document that specifies use of
the Cipher Suite with this standard. If the Cipher Suite provides integrityProtection and
confidentialityProtection, the SecY shall be capable of receiving frames with either, as signaled by the E and
C bits in the SecTAG.
The confidentialityProtection parameter shall be True if and only if the Cipher Suite implementation is
capable of being configured so that, when confidentiality is selected, all the octets of the MSDU are integrity
and confidentiality protected.
The offsetConfidentiality parameter shall be True if and only if the Cipher Suite implementation is capable
of both integrityProtection and confidentialityProtection, and of being configured so that, when
confidentiality is selected, a selectable number (0, 30, or 50) of the initial octets of the MSDU are only
integrity protected, and appear in the MACsec PDU immediately after the SecTAG in the order and with the
values in the MSDU (Figure 8-1), while the remaining octets are confidentiality and integrity protected.
NOTE The offsetConfidentiality capability and the specific offset values chosen are provided to facilitate deployment
on IP version 4 and version 6 hosts that perform load balancing across multiple processors in a single system using the
initial fields of those protocol stacks, and are not currently capable of terminating the secure association before
distributing the load without incurring a significant performance penalty.
currentCipherSuite, the Cipher Suite Identifier (10.7.24) for the cipher suite
If offsetConfidentiality (10.7.24) is not False for the Cipher Suite, the following parameter is specified:
b)
confidentialityOffset, the number of initial octets of each MSDU without confidentiality protection
The CurrentCipherSuite is selected by the KaY. The Current Cipher Suite may also be selected and keys
created by management, but a conformant implementation shall provide a mechanism to allow such
selection and creation by network management to be disabled. The confidentialityOffset applies to all
frames transmitted and received with confidentiality protection. If both confidentialityProtection and
offsetConfidentiality are supported, then it takes the values 0, 30, and 50.
If the Current Cipher Suite is changed, all keys created for that Cipher Suite are deleted, and (as a
consequence) inUse will become False for all SAs, with the further consequence that MAC_Operational will
become False for the Controlled Port.
10.7.26 SAK creation
An SAK record is created on request from the KaY, with the following parameters:
a)
b)
62
transmits, True if the key has been installed for transmission, i.e., can be referenced by a transmit SA
b)
receives, True if the key has been installed for reception, i.e., can be referenced by a receive SA
c)
createdTime, the system time when the SAK record was created
b)
10.8 Addressing
Frames transmitted between end stations using the MAC Service carry the MAC Address of the source and
destination peer end stations in the source and destination address fields of the frames, respectively.
Communicating peer SecYs can secure communication for all or part of the path used by such frames, and
are not directly addressed by the communicating peers, nor are the frames modified to include additional
addresses. Each SecY does not have a MAC Address of its own, but is associated with a local entity that
forms part of the secure system.
The addressing used by Key Agreement Entities and the means they use to identify SecYs within the same
secure system are outside the scope of this specification.
While destination and source MAC addresses are not required to identify SecYs, they are parameters of the
MAC Internal Sublayer Service (ISS) used and provided by a SecY, and are covered by the ICV, generated
by a Cipher Suite implementation while remaining unencrypted. To facilitate ICV calculation and
verification, all frames processed by SecYs use 48-bit MAC addresses.
10.9 Priority
While priority is a parameter of both an ISS M_UNITDATA.request and corresponding
M_UNITDATA.indications, end-to-end communication of the requested priority is not a service attribute
(6.1). Protocols supporting the ISS can use the requested priority to perform local actions in the originating
station, and do not necessarily attempt to communicate the parameter. Accordingly, the requested and
indicated priorities do not contribute to the ICV, and are not explicitly included in the encoded MSDU by a
transmitting SecY.
NOTEIf communication of priority is desired, either guaranteed unchanged or available to a service provider for
possible modification to meet the admission control and service characteristics of a particular network, use of the EISS
in conjunction with the ISS is indicated. See Clause 7.
63
Permitted values
< 1 second
No frame loss
64
The figures in this clause illustrate the relative position of components within the MAC Service interface
stacks (11.1) of each of these systems. Both the secure MAC Service provided by the Controlled Port and
the insecure service provided to the Uncontrolled Port are shown. This clause shows MACsec as a whole,
including both a SecY and its associated KaY. See Figure 10-2 for their interrelationship.
NOTEFor more information on the Controlled and Uncontrolled Ports and the operation of the SecY, see Clause 10.
LLC
(MS)
MAC Service
802.X
LAN
NOTE 1The term 802.X refers to any one of the IEEE 802 LAN media access control method technologies.
Alternatively, media access method independent functions, such as VLAN tagging of frames (IEEE Std
802.1Q) and MAC Security (as specified by this standard), can be used to support the MAC Service or the
MAC Internal Sublayer Service (ISS, IEEE Std 802.1D) or the EISS (IEEE Std 802.1Q). These functions
use an ISS access point provided by media access method dependent convergence functions, as specified in
Clause 6.5 of IEEE Std 802.1D and IEEE Std 802.1Q. See Figure 11-2.
Clients
(LSAP)
LLC
(MS)
(ISS)
(EISS)
(ISS)
ISS
(ISS)
()
()
802.X
802.X
802.X
65
Each SecY uses an ISS access point and provides the ISS at its Controlled and Uncontrolled Ports. This
allows use of MAC Security with other media-independent functions. However, interoperability between
systems using MAC Security requires not only interoperability between SecY implementations and use of
the same LAN MAC technology, but also that the same, or compatible, media interface functions are used
with the same relative position within the interface stack, as specified in this clause.
NOTE 2MAC Bridges and VLAN-aware Bridges provide interoperability between access points for the MAC
Service, the ISS, and the EISS, using the following common elements of those service specifications. The MAC Service,
the ISS, and the EISS all use the same request and indication primitives. The parameters used by the ISS for each
primitive are a superset of those of the MAC Service. An EISS access point effectively provides access to multiple ISS
instances.
Uncontrolled Port
attached clients
LLC
LLC
(Secure ISS)
(Insecure ISS)
LAN MAC
Figure 11-5 shows the interface stack for each of the Bridge Ports.
66
LLC
IS
LLC
SS
IS
IS
802.1D
Clauses
7.5, 7.6
MAC Relay
Entity
.
,7
SS 7.5
S
1D S
MACsec
IS
802.1D 6.5
IS
802.1D 6.5
LLC
SS
2.
80
IS
802.1D
Clauses
7.5, 7.6
LLC
IS
IS
802.1D Clause 6.5
LLC
IS
.6
LLC
IS
Uncontrolled
Port attached
clients
(if any)
.1 SS
D
S S 7.
5,
7
MAC Relay
Entity
Network Mgt
Uncontrolled
Port attached
clients
(if any)
80
2
Network Mgt
IS
MACsec
IS
802.1D Clause 6.5
IS = Insecure Service
SS = Secure Service
Uncontrolled Port
attached Higher
Layer Entities
LLC
LLC
MAC Relay
Entity
(ISS)
(ISS)
(Insecure ISS)
LAN MAC
IS
802.1D 6.5
IS
802.1Q
Clauses
8.5, 6.7
IS
802.1D 6.5
IS
LLC
LLC
.7
,6
SS 8.5
S
1Q S
2.
80
IS
802.1Q
Clauses
8.5, 6.7
MAC Relay
Entity
LLC
IS
MAC Relay
Entity
MACsec
IS
802.1D Clause 6.5
LLC
IS
.7
LLC
IS
80
2. S
1Q S
SS 8.
5,
6
LLC
IS
IS
MACsec
IS
802.1D Clause 6.5
67
Figure 11-7 shows the interface stack for each of the VLAN-aware Bridge Ports.
Higher Layer
Entities
LLC
MAC Relay
Entity
LLC
(EISS)
(ISS)
(Insecure ISS)
LAN MAC
Figure 11-8 shows the frame format and placement of the VLAN tag within the frame relative to MACsec.
Thus if there is encryption, the VLAN tag is not in the clear.
12 octets
DA/SA
8 or 16 octets
ET
SecTAG
0 to n octets
VLAN
8 to 16 octets
Secure Data
ICV
MPDU
NOTEIf the use of a protocol analyzer and other monitoring tools based on capture and analysis of packets on the wire
is desired, integrity protection only, without confidentiality, should be used.
The position of MACsec, below both the Bridge Port connectivity and VLAN tagging functions, has the
following consequences:
a)
b)
c)
d)
Each Bridge Port uses a single SecY, with a single transmit SC and a single receive SC for each of
the other bridges and stations attached to the LAN, to support all VLANs.
Interoperability with MAC Bridges, that are not VLAN-aware, is supported in the same way as
VLAN-aware and unaware bridges without MAC Security.
Higher-layer entities attached to the Bridge Port, such as the Spanning Tree Protocol Entity and
protocol stacks for network management, do not need to be supported by separate SecYs. In
particular a MACsec protected point-to-point link between two bridges continues to function as a
point-to-point link despite the end station functions associated with each Bridge Port.
Changes in the operation of MAC Security do not cause differences in the network connectivity used
by the MAC Relay Entity and in the network connectivity perceived by the Controlled Port attached
higher-layer entities that execute control protocols for the relay function.
LACP will be protected. In addition, if the authentication provided by the KaYs determines that the two
links do not connect to the same partner system, local system management can change the aggregation keys.
Changes in link aggregation do not cause changes to the MACsec CAs, SCs, SAs, or SAKs.
NOTE 1LACP aggregation keys have nothing to do with cryptography. See Clause 43 of IEEE Std 802.3 for details.
NOTE 2Although specified in IEEE Std 802.3, Link Aggregation is a media access method independent function.
Figure 11-9 shows part of an interface stack with MAC Security and Link Aggregation. The insecure service
access points for each of the SecYs are independently provided to the KaY associated with each SecY, and
may or may not be aggregated separately.
Unctrl Port attached
Higher Layer Entities
LLC
LLC
(Secure ISS)
Link Aggregation
(Insecure ISS)
(Secure ISS)
(Secure ISS)
(Insecure ISS)
LAN MAC
LAN MAC
Figure 11-10 shows the addition of link aggregation to the interface stack for a VLAN-aware Bridge Port
that also uses MACsec.
Unctrl Port attached
Higher Layer Entities
Higher Layer
Entities
LLC
LLC
MAC Relay
Entity
LLC
(EISS)
(ISS)
Link Aggregation
(Insecure ISS)
(Secure ISS)
(Secure ISS)
(Insecure ISS)
LAN MAC
LAN MAC
Figure 11-10IEEE 802.1Q VLAN-aware Bridge Port with MACsec and Link Aggregation
69
LLDP Entity
LLDP
agent
LLDP
agent
Other Controlled
Port clients
(LSAP)
()
LLC
Other Controlled
Port clients
Uncontrolled
Port clients
()
(LSAP)
LLC
(Secure ISS)
LLDP
agent
(Insecure ISS)
()
LLC
()
(Secure ISS)
Other Controlled
Port clients
Uncontrolled
Port clients
(LSAP)
LLC
(Insecure ISS)
()
LLC
()
Uncontrolled
Port clients
LLC
(Secure ISS)
(Insecure ISS)
(ISS)
(ISS)
(ISS)
LAN MAC
LAN MAC
LAN MAC
LLC
LLC
C-TAG
ISS
MAC Relay
(c)
ISS
S-TAG
ISS
C-TAG
ISS
(a)
S-TAG
Customer
Bridge
S-TAG
(b)
MAC Relay
Entity
ISS
S-TAG
ISS
b)
c)
If it is the customers intention to secure only one of item a) or item c), then the use of one of the interface
stacks illustrated in Figure 11-3 (for an end station), Figure 11-5 (for a MAC Bridge), or Figure 11-7 (for a
VLAN-aware Bridge) within the customer equipment is sufficient.
70
Use of the interface stack illustrated in Figure 11-7 within the providers S-VLAN aware Bridge Ports is
sufficient to secure either item b) or item c) as required. If item c) is not to be secured, MACsec is either
omitted from the interface stack for the Customer Network Port (see Figure 11-12), or the Bridge Port
connectivity function (8.5.1 of IEEE Std 802.Q) uses the service provided by the Uncontrolled Port.
If it is the intention to secure both item a) and item c) from the Customer Bridge Port, then the use of two
independent SecYs within the ports interface stack is required as shown in Figure 11-13.
Higher Layer
Entities
LLC
MAC Relay
Entity
(EISS)
(ISS)
(ISS)
MAC Security across providers network
(Insecure ISS)
MAC Security to providers network
LAN MAC
Figure 11-13Interface stack for MAC Security to and across providers network
Figure 11-14 shows the addition of the service access priority selection function described in 6.9 of IEEE
Std 802.1ad to the interface stack of Figure 11-13, together with the use of Link Aggregation to support
attachment to the providers network with two LANs.
Higher Layer
Entities
LLC
MAC Relay
Entity
(EISS)
(ISS)
(ISS)
MAC Security across providers network
Link Aggregation
(Insecure ISS)
(Secure ISS)
(Secure ISS)
(Insecure ISS)
LAN MAC
LAN MAC
71
Station B
PAE
Secure
Service
Uctrl.
(
Port
Uctrl.
(
Port
Uctrl.
(
Port
Secure
Service
PAE
Secure
Service
Secure
Service
PAE
( ) Ctrl.
Port
( )
( )
( )
( )
( ) Ctrl.
Port
( )
Insecure
Service
KaY
KaY
SecY
Common
Port
Station C
( )
KaY
( )
PAE
( )
KaY
( )
( )
( )
( )
( )
SecY
SecY
SecY
( )
( )
( )
( ) ISS
( ) ISS
Y function
( ) ISS
LAN
Figure 11-16 shows part of an interface stack for a multi-access capable system. The Y function can simply
copy all indications from its lower service access point to all upper access points, and any request from an
upper service access point to the lower access point. Each KaY and SecY will discard indications for SCIs
that do not match one of their receive SCs. Alternatively, the Y function can selectively deliver indications
for known SCIs to the appropriate SecY, as instructed by the higher-layer entity responsible for virtual port
creation and its association. Its detailed specification is determined by the specification of that entity.
LLC
LLC
(Insecure ISS)
(Insecure ISS)
(Secure ISS)
(Insecure ISS)
(Secure ISS)
(Insecure ISS)
(Insecure ISS)
Y function
(Insecure ISS)
LAN MAC
73
In the OLT, each instance of the secure MAC Service is provided by a distinct SecY that uses the insecure
instance of the MAC Service provided by one of the point-to-point MAC entities in the OLT.
The MAC Service, as specified in ISO/IEC 15802-1, does not provide point-to-multipoint unidirectional
connectivity. However, MACsec can support the SCB service access point with a dedicated SC. Appropriate
distribution to the ONUs of the encryption and authentication keys for the sequence of SAs that compose the
SC ensures the confidentiality, integrity, and origin of each frame sent using the SCB.
NOTE 1Since the SCB MAC interfaces in the OLT lacks a peer interface in each ONU, the keys for the sequence of
SAs that support them are distributed to the Key Agreement Entities of all authorized ONUs using the insecure bidirectional MAC Service associated with each of the point-to-point MAC instances.
74
NOTE 2An ONU can elect to discard frames from the SCB as these are readily identifiable by the EPON MAC.
However, if such frames are received, their integrity and origin should be secured, particularly if the system comprising
the ONU bridges or routes such frames. Otherwise, an attacker could use frames that appear to be sent using the SCB to
penetrate the attached network, even if the point-to-point EPON connectivity has been correctly secured.
75
The attributes in Table 13-1 are part of the required ifGeneralInformationGroup object group specified in
IETF RFC 2863, and are not duplicated in the SecY MIB.
Table 13-1Use of ifGeneralInformationGroup Objects
ifGeneralInformationGroup Objects
ifDescr
ifType
ifSpeed
ifPhysAddress
This object should have an octet string with zero length for a SecYs
controlled port and uncontrolled port.
ifAdminStatus
See interfaces MIB, read only for controlled port and uncontrolled
port.
ifOperStatus
ifLastChange
ifName
ifLinkUpDownTrapEnable
ifHightSpeed
ifConnectorPresent
ifAlias
ifTableLastChange
The attributes in Table 13-2 are part of the required ifCounterDiscontinuityGroup object group specified in
IETF RFC 2863 and are not duplicated in the SecY MIB.
Table 13-2Use of ifCounterDiscontinuityGroup Object
ifCounterDiscontinuityGroup Object
ifCounterDiscontinuityTime
ifStackTable will be used to identify the layer relationships between Controlled Port interface and physical
interface and between Uncontrolled Port interface and physical interface. Use of ifStackTable is necessary to
represent the interface stack with MACsec service capability. Please refer to Figure 13-1.
77
Controlled Port
Interface
Uncontrolled Port
Interface
(ifEntry = k)
(ifEntry = j)
Physical Interface
(ifEntry = i)
LowerLayer
The attributes in Table 13-4 are part of the required ifStackGroup2 object group specified in IETF RFC
2863, and are not duplicated in the SecY MIB.
Table 13-4Use of ifStackGroup2 Objects
ifStackGroup2 Objects
ifStackStatus
ifStackLastChange
The use of ifPacketGroup object group specified in IETF RFC 2863 is described in 10.7.6 for Controlled
Port interface and in the 10.7.3 for Uncontrolled Port interface.
The ifRcvAddressTable is not applicable for Controlled Port and Uncontrolled Port interfaces.
have a negative effect on network operations. These are the tables and objects and their sensitivity/
vulnerability:
a)
b)
secyIfTable contains system level information for each interface supported by the MAC security
entity. SET access to this table by unauthorized persons can disable the MAC security protection
functions, block network connectivity, and impact network performance. Examination of this table
in comparison with the IF-MIB can identify which ports are not protected by the MAC security
entity.
secyRxSANextPN in secyRxSATable provides the capability to change the replay protection
window. SET access to this object by unauthorized persons can affect the MACsec replay protection
function, block network connectivity, and impact network performance.
Some of the readable objects in this MIB module (i.e., objects with a MAX-ACCESS other than notaccessible) may be considered sensitive or vulnerable in some network environments. It is thus important to
control even GET and/or NOTIFY access to these objects and possible to even encrypt the values of these
objects when sending them over the network via SNMP.
The MIB module provides statistics from the interface level (SecY) to each secure association (SA). These
statistics provide information for the diagnosis or debugging of the migration from a non-secure
environment to a secure environment and can be used to observe the activities of MACsec operation. This
information is useful for security monitoring by authorized personnel, but is also potentially useful to
attackers so should be protected against unauthorized access.
These are the tables and objects and their sensitivity/vulnerability:
c)
d)
e)
f)
g)
h)
SNMP versions prior to SNMPv3 did not include adequate security. Even if the network itself is secure (for
example by using IPSec), there is no control as to who on the secure network is allowed to access and GET/
SET (read/change/create/delete) the objects in this MIB module.
If SNMP is to be used, activation of the security features provided by the SNMPv3 framework (see IETF
RFC 3410 [B8], section 8), including the SNMPv3 cryptographic mechanisms (for authentication and
privacy) are required for the security goals of this standard to be met.
79
Further, implementers should not deploy SNMP versions prior to SNMPv3. Instead, implementers should
deploy SNMPv3 to enable cryptographic security. It is then a customer/operator responsibility to ensure that
the SNMP entity giving access to an instance of this MIB module is properly configured to give access to the
objects only to those principals (users) that have legitimate rights to indeed GET or SET (change/create/
delete) them.
Table/Objects
Contents
secyMaxPeerSCs,
secyRxMaxKeys
secyTxMacKeys
secyIfTable
secyTxSCTable
secyTxSATable
secyRxSCTable
secyRxSATable
secyCipherSuiteTable
secyTxSAStatsTable
secyTxSCStatsTable
secyRxSAStatsTable
secyRxSCStatsTable
80
secyStatsTable
MIB Object(s)
SCI
secyTxSCI, secyRxSCI
MAC_Enabled
ifAdminStatus
MAC_Operational
ifOperStatus
adminPointToPointMAC
secyIfAdminPt2PtMAC
operPointToPointMAC
secyIfOperPt2PtMAC
secyMaxPeerSCs
secyRxMaxKeys
validateFrames
secyIfValidateFrames
replayProtect
secyIfReplayProtectEnable
replayWindow
secyIfReplayProtectWindow
currentCipherSuite
secyIfCurrentCipherSuite
InPktsUntagged
secyStatsRxUntaggedPkts
InPktsNoTag
secyStatsRxNoTagPkts
InPktsBadTag
secyStatsRxBadTagPkts
InPktsUnknownSCI
secyStatsRxUnknownSCIPkts
InPktsNoSCI
secyStatsRxNoSCIPkts
InPktsOverrun
secyStatsRxOverrunPkts
InPktsUnchecked
secyRxSCStatsUncheckedPkts
InPktsDelayed
secyRxSCStatsDelayedPkts
InPktsLate
secyRxSCStatsLatePkts
InPktsOK
secyRxSAStatsOKPkts
InPktsInvalid
secyRxSAStatsInvalidPkts
InPktsNotValid
secyRxSAStatsNotValidPkts
InPktsNotUsingSA
secyRxSAStatsNoUsingSAPkts
InPktsUnusedSA
secyRxSAStatsUnusedSAPkts
InOctetsValidated
secyRxSCStatsOctetsValidated
InOctetsDecrypted
secyRxSCStatsOctetsDecrypted
81
(continued)
Definition in 10.7
MIB Object(s)
receive SC status
secyRxSCState
receive SC createdTime
secyRxSCCreatedTime
receive SC startedTime
secyRxSCStartedTime
receive SC stoppedTime
secyRxSCStoppedTime
secyRxSA
secyRxSANextPN
secyRxSAState
secyRxSASAKUnchanged
receive SA createdTime
secyRxSACreatedTime
receive SA startedTime
secyRxSAStartedTime
receive SA stoppedTime
secyRxSAStoppedTime
secyTxMaxKeys
protectFrames
secyIfProtectFramesEnable
alwaysIncludeSCI
secyIfIncludeSCIEnable
useES
secyIfUseESEnable
useSCB
secyIfUseSCBEnable
OutPktsUntagged
secyStatsTxUntaggedPkts
OutPktsTooLong
secyStatsTxTooLongPkts
OutPktsProtected
secyTxSAStatsProtectedPkts
OutPktsEncrypted
secyTxSAStatsEncryptedPkts
OutOctetsProtected
secyTxSCStatsOctetsProtected
OutOctetsEncrypted
secyTxSCStatsOctetsEncrypted
transmit SC status
secyTxSCState
encodingSA
secyTxSCEncodingSA
encipheringSA
secyTxSCEncipheringSA
transmit SC createdTime
secyTxSCCreatedTime
transmit SC startedTime
secyTxSCStartedTime
82
(continued)
Definition in 10.7
MIB Object(s)
transmit SC stoppedTime
secyTxSCStoppedTime
secyTxSAState
secyTxSANextPN
transmit SA confidentiality
secyTxSAConfidentiality
secyTxSASAKUnchanged
transmit SA createdTime
secyTxSACreatedTime
transmit SA startedTime
secyTxSAStartedTime
transmit SA stoppedTime
secyTxSAStoppedTime
transmit SA nextPN
secyTxSANextPN
secyCipherSuiteId
secyCipherSuiteName
integrityProtection, confidentialityProtection
secyCipherSuiteProtection
offsetConfidentiality
secyCipherSuiteProtectionOffset
changesDataLength
secyCipherSuiteDataLengthChange
ICVlength
secyCipherSuiteICVLength
83
*****************************************************************
IEEE8021-SECY-MIB
Definitions of managed objects supporting IEEE 802.1AE MACsec.
January 2006
*****************************************************************
For example :
----------------------------------------------------------|
|
|
|
Controlled Port
|
Uncontrolled Port
|
|
Interface
|
Interface
|
|
(ifEntry = j)
|
(ifEntry = k)
|
| (ifType =
| (ifType =
|
| macSecControlledIF(231)) | macSecUncontrolledIF(232))|
|
|
|
|---------------------------------------------------------|
|
|
|
Physical Interface
|
|
(ifEntry = i)
|
|
(ifType = ethernetCsmacd(6))
|
|_________________________________________________________|
i, j, k are ifIndex to indicate an interface row in the ifTable.
Figure : MACsec Interface Stack
The Controlled Port is the service point to provide one
instance of the secure MAC service in a SecY. The
Uncontrolled Port is the service point to provide one instance
of the insecure MAC service in a SecY.
REVISION
200601100000Z
DESCRIPTION
Initial version of this MIB module. Published as part of
IEEE standard 802.1AE
::= { iso(1) std(0) iso8802(8802) ieee802dot1(1)
ieee802dot1mibs(1) 3 }
secyMIBNotifications OBJECT IDENTIFIER ::= { ieee8021SecyMIB 0 }
secyMIBObjects OBJECT IDENTIFIER ::= { ieee8021SecyMIB 1 }
secyMIBConformance OBJECT IDENTIFIER ::= { ieee8021SecyMIB 2 }
85
system.
For the writeable objects in this table, the configured value
shall be stored in persistent memory and remain unchanged across
a re-initialization of the management system of the entity.
REFERENCE
IEEE 802.1AE Clause 10.7
::= { secyMgmtMIBObjects 1 }
secyIfEntry
OBJECT-TYPE
SYNTAX
SecyIfEntry
MAX-ACCESS not-accessible
STATUS
current
DESCRIPTION
An entry containing SecY management information applicable to
a particular interface.
INDEX
{ secyIfInterfaceIndex }
::= { secyIfTable 1 }
SecyIfEntry ::= SEQUENCE {
secyIfInterfaceIndex
secyIfMaxPeerSCs
secyIfRxMaxKeys
secyIfTxMaxKeys
secyIfProtectFramesEnable
secyIfValidateFrames
secyIfReplayProtectEnable
secyIfReplayProtectWindow
secyIfCurrentCipherSuite
secyIfAdminPt2PtMAC
secyIfOperPt2PtMAC
secyIfIncludeSCIEnable
secyIfUseESEnable
secyIfUseSCBEnable
}
InterfaceIndex,
Unsigned32,
Unsigned32,
Unsigned32,
TruthValue,
INTEGER,
TruthValue,
Unsigned32,
Unsigned32,
INTEGER,
TruthValue,
TruthValue,
TruthValue,
TruthValue
secyIfInterfaceIndex
OBJECT-TYPE
SYNTAX
InterfaceIndex
MAX-ACCESS not-accessible
STATUS
current
DESCRIPTION
An interface index for a port with SecY management ability.
This interface index should be aligned with ifIndex in the
ifTable to point to the SecY Controlled Port entity.
REFERENCE
IEEE 802.1AE Clause 10.1
::= { secyIfEntry 1 }
secyIfMaxPeerSCs
OBJECT-TYPE
SYNTAX
Unsigned32
UNITS
security connections
MAX-ACCESS read-only
STATUS
current
87
DESCRIPTION
Maximum number of peer SCs that this SecY can support.
REFERENCE
IEEE 802.1AE Clause 10.7.7
::= { secyIfEntry 2 }
secyIfRxMaxKeys
OBJECT-TYPE
SYNTAX
Unsigned32
UNITS
keys
MAX-ACCESS read-only
STATUS
current
DESCRIPTION
Maximum number of keys in simultaneous use for reception
that this SecY can support.
REFERENCE
IEEE 802.1AE Clause 10.7.7
::= { secyIfEntry 3 }
secyIfTxMaxKeys
OBJECT-TYPE
SYNTAX
Unsigned32
UNITS
keys
MAX-ACCESS read-only
STATUS
current
DESCRIPTION
Maximum number of keys in simultaneous use for transmission
that this SecY can support.
REFERENCE
IEEE 802.1AE Clause 10.7.16
::= { secyIfEntry 4 }
secyIfProtectFramesEnable
OBJECT-TYPE
SYNTAX
TruthValue
MAX-ACCESS read-write
STATUS
current
DESCRIPTION
An object to enable or disable the protection function for
egress frames.
REFERENCE
IEEE 802.1AE Clause 10.5
DEFVAL { true }
::= { secyIfEntry 5 }
secyIfValidateFrames
OBJECT-TYPE
SYNTAX
INTEGER {
disabled(1),
check(2),
strict(3)
}
MAX-ACCESS read-write
STATUS
current
DESCRIPTION
An object to control the validation function for ingress
frames.
88
89
auto(3)
}
read-write
current
MAX-ACCESS
STATUS
DESCRIPTION
An object to control the service connectivity to at most one
other system. The secyOperPt2PtMAC indicates operational
status of the service connectivity for this SecY.
forceTrue(1) : allows only one service connection to the
other system.
forceFalse(2) : no restriction on the number of service
connections to the other systems.
auto(3) : means the service connectivity is determined by the
service providing entity.
REFERENCE
IEEE 802.1AE Clause 6.5
DEFVAL { auto }
::= { secyIfEntry 10 }
secyIfOperPt2PtMAC
OBJECT-TYPE
SYNTAX
TruthValue
MAX-ACCESS read-only
STATUS
current
DESCRIPTION
An object to reflect the current service connectivity status.
true(1) : means the service connectivity of this SecY provides
at most one other system.
false(2) : means the service connectivity of this SecY could
provide more than one other system.
REFERENCE
IEEE 802.1AE Clause 6.5
::= { secyIfEntry 11 }
secyIfIncludeSCIEnable
OBJECT-TYPE
SYNTAX
TruthValue
MAX-ACCESS read-write
STATUS
current
DESCRIPTION
An object indicates to include the SCI information in
security TAG (SecTAG) field while transmitting MACsec
frames.
REFERENCE
IEEE 802.1AE Clause 9.3, 10.5.3, 10.7.17
DEFVAL { false }
::= { secyIfEntry 12 }
secyIfUseESEnable
OBJECT-TYPE
SYNTAX
TruthValue
MAX-ACCESS read-write
90
STATUS
current
DESCRIPTION
An object indicates to enable the ES bit in
security TAG (SecTAG) field while transmitting MACsec
frames.
REFERENCE
IEEE 802.1AE Clause 9.3, 10.5.3, 10.7.17
DEFVAL { false }
::= { secyIfEntry 13 }
secyIfUseSCBEnable
OBJECT-TYPE
SYNTAX
TruthValue
MAX-ACCESS read-write
STATUS
current
DESCRIPTION
An object indicates to enable the SCB bit in
security TAG (SecTAG) field while transmitting MACsec
frames.
REFERENCE
IEEE 802.1AE Clause 9.3, 10.5.3, 10.7.17
DEFVAL { false }
::= { secyIfEntry 14 }
--- Tx SC Management Table
-secyTxSCTable
OBJECT-TYPE
SYNTAX
SEQUENCE OF SecyTxSCEntry
MAX-ACCESS not-accessible
STATUS
current
DESCRIPTION
A table for providing information about the status of each
transmitting SC supported by the MAC security entity.
REFERENCE
IEEE 802.1AE Clause 10.7.17, 10.7.20
::= { secyMgmtMIBObjects 2 }
secyTxSCEntry
OBJECT-TYPE
SYNTAX
SecyTxSCEntry
MAX-ACCESS not-accessible
STATUS
current
DESCRIPTION
An entry containing transmitting SC management information
applicable to a particular SecY.
INDEX { secyIfInterfaceIndex }
::= { secyTxSCTable 1 }
SecyTxSCEntry ::= SEQUENCE
secyTxSCI
secyTxSCState
secyTxSCEncodingSA
secyTxSCEncipheringSA
secyTxSCCreatedTime
{
SecySCI,
INTEGER,
RowPointer,
RowPointer,
TimeStamp,
91
secyTxSCStartedTime
secyTxSCStoppedTime
TimeStamp,
TimeStamp
}
secyTxSCI
OBJECT-TYPE
SYNTAX
SecySCI
MAX-ACCESS read-only
STATUS
current
DESCRIPTION
The SCI information for transmitting MACsec frames of the
transmitting SC in the SecY.
REFERENCE
IEEE 802.1AE Clause 7.1.2, 8.2.1, 10.7.1
::= { secyTxSCEntry 1 }
secyTxSCState
SYNTAX
OBJECT-TYPE
INTEGER {
inUse(1),
notInUse(2)
}
read-only
current
MAX-ACCESS
STATUS
DESCRIPTION
The state of the current transmitting SC in the SecY.
inUse(1) : means any of SAs for this SC is in use.
notInUse(2) : means no SAs for this SC is in use.
REFERENCE
IEEE 802.1AE Clause 10.7.20
::= { secyTxSCEntry 2 }
secyTxSCEncodingSA
OBJECT-TYPE
SYNTAX
RowPointer
MAX-ACCESS read-only
STATUS
current
DESCRIPTION
The current transmitting SA in use. The row pointer will point
to an entry in the secyTxSATable. If no such information is
available, the value shall be the OBJECT IDENTIFIER { 0 0 }.
REFERENCE
IEEE 802.1AE Clause 10.5.1, 10.7.20
::= { secyTxSCEntry 3 }
secyTxSCEncipheringSA
OBJECT-TYPE
SYNTAX
RowPointer
MAX-ACCESS read-only
STATUS
current
DESCRIPTION
The previous transmitting SA in use. The row pointer will point
to an entry in the secyTxSATable. If no such information is
available, the value shall be the OBJECT IDENTIFIER { 0 0 }.
REFERENCE
IEEE 802.1AE Clause 10.5.4, 10.7.20
92
::= { secyTxSCEntry 4 }
secyTxSCCreatedTime
OBJECT-TYPE
SYNTAX
TimeStamp
MAX-ACCESS read-only
STATUS
current
DESCRIPTION
The system time when this transmitting SC was created.
REFERENCE
IEEE 802.1AE Clause 10.7.20
::= { secyTxSCEntry 5 }
secyTxSCStartedTime
OBJECT-TYPE
SYNTAX
TimeStamp
MAX-ACCESS read-only
STATUS
current
DESCRIPTION
The system time when this transmitting SC last started
transmitting MACsec frames.
REFERENCE
IEEE 802.1AE Clause 10.7.20
::= { secyTxSCEntry 6 }
secyTxSCStoppedTime
OBJECT-TYPE
SYNTAX
TimeStamp
MAX-ACCESS read-only
STATUS
current
DESCRIPTION
The system time when this transmitting SC last stopped
transmitting MACsec frames.
REFERENCE
IEEE 802.1AE Clause 10.7.20
::= { secyTxSCEntry 7 }
--- Tx SA Management Table
-secyTxSATable
OBJECT-TYPE
SYNTAX
SEQUENCE OF SecyTxSAEntry
MAX-ACCESS not-accessible
STATUS
current
DESCRIPTION
A table for providing information about the status of each
transmitting SA supported by the MAC security entity.
REFERENCE
IEEE 802.1AE Clause 10.7.21
::= { secyMgmtMIBObjects 3 }
secyTxSAEntry
OBJECT-TYPE
SYNTAX
SecyTxSAEntry
MAX-ACCESS not-accessible
STATUS
current
DESCRIPTION
93
SecyAN,
INTEGER,
Unsigned32,
TruthValue,
TruthValue,
TimeStamp,
TimeStamp,
TimeStamp
secyTxSA
OBJECT-TYPE
SYNTAX
SecyAN
MAX-ACCESS not-accessible
STATUS
current
DESCRIPTION
The association number (AN) for identifying a transmitting
SA.
REFERENCE
IEEE 802.1AE Clause 10.7.21
::= { secyTxSAEntry 1 }
secyTxSAState
SYNTAX
OBJECT-TYPE
INTEGER {
inUse(1),
notInUse(2)
}
read-only
current
MAX-ACCESS
STATUS
DESCRIPTION
The current status of the transmitting SA.
inUse(1) : means this SA is in use.
notInUse(2) : means this SA is not in use.
REFERENCE
IEEE 802.1AE Clause 10.7.22
::= { secyTxSAEntry 2 }
secyTxSANextPN
OBJECT-TYPE
SYNTAX
Unsigned32
MAX-ACCESS read-only
STATUS
current
DESCRIPTION
The next packet number (PN) that will be used in transmitting
MACsec frames in the SA.
REFERENCE
IEEE 802.1AE Clause 10.7.21
::= { secyTxSAEntry 3 }
94
secyTxSAConfidentiality
OBJECT-TYPE
SYNTAX
TruthValue
MAX-ACCESS read-only
STATUS
current
DESCRIPTION
Whether this SA supports the confidentiality as well as
integrity function in transmitting frames.
REFERENCE
IEEE 802.1AE Clause 10.7.21
::= { secyTxSAEntry 4 }
secyTxSASAKUnchanged
OBJECT-TYPE
SYNTAX
TruthValue
MAX-ACCESS read-only
STATUS
current
DESCRIPTION
A reference to an SAK that is unchanged for the life
of the transmitting SA.
REFERENCE
IEEE 802.1AE Clause 10.7.21
::= { secyTxSAEntry 5 }
secyTxSACreatedTime
OBJECT-TYPE
SYNTAX
TimeStamp
MAX-ACCESS read-only
STATUS
current
DESCRIPTION
The system time when this transmitting SA was created.
REFERENCE
IEEE 802.1AE Clause 10.7.22
::= { secyTxSAEntry 6 }
secyTxSAStartedTime
OBJECT-TYPE
SYNTAX
TimeStamp
MAX-ACCESS read-only
STATUS
current
DESCRIPTION
The system time when this transmitting SA last started
transmitting MACsec frames.
REFERENCE
IEEE 802.1AE Clause 10.7.22
::= { secyTxSAEntry 7 }
secyTxSAStoppedTime
OBJECT-TYPE
SYNTAX
TimeStamp
MAX-ACCESS read-only
STATUS
current
DESCRIPTION
The system time when this transmitting SA last stopped
transmitting MACsec frames.
REFERENCE
IEEE 802.1AE Clause 10.7.22
::= { secyTxSAEntry 8 }
95
{
SecySCI,
INTEGER,
RowPointer,
TimeStamp,
TimeStamp,
TimeStamp
secyRxSCI
OBJECT-TYPE
SYNTAX
SecySCI
MAX-ACCESS not-accessible
STATUS
current
DESCRIPTION
The SCI for identifying the receiving SC in the SecY.
REFERENCE
IEEE 802.1AE Clause 10.7.11
::= { secyRxSCEntry 1 }
secyRxSCState
SYNTAX
OBJECT-TYPE
INTEGER {
inUse(1),
notInUse(2)
}
read-only
current
MAX-ACCESS
STATUS
DESCRIPTION
The state of the receiving SC in the SecY.
96
97
{
SecyAN,
INTEGER,
Unsigned32,
TruthValue,
TimeStamp,
TimeStamp,
TimeStamp
secyRxSA
OBJECT-TYPE
SYNTAX
SecyAN
MAX-ACCESS not-accessible
STATUS
current
DESCRIPTION
The association number (AN) for identifying a receiving
SA.
REFERENCE
IEEE 802.1AE Clause 10.7.13
::= { secyRxSAEntry 1 }
secyRxSAState
SYNTAX
MAX-ACCESS
STATUS
DESCRIPTION
98
OBJECT-TYPE
INTEGER {
inUse(1),
notInUse(2)
}
read-only
current
99
STATUS
current
DESCRIPTION
The system time when this receiving SA last stopped
receiving MACsec frames.
REFERENCE
IEEE 802.1AE Clause 10.7.14
::= { secyRxSAEntry 7 }
----
secyCipherSuiteTable
OBJECT-TYPE
SYNTAX
SEQUENCE OF SecyCipherSuiteEntry
MAX-ACCESS not-accessible
STATUS
current
DESCRIPTION
The table of selectable cipher suites for the MAC security
entity.
For the writeable objects in this table, the configured value
shall be stored in persistent memory and remain unchanged across
a re-initialization of the management system of the entity.
REFERENCE
IEEE 802.1AE Clause 10.7.24
::= { secyMgmtMIBObjects 6 }
secyCipherSuiteEntry
OBJECT-TYPE
SYNTAX
SecyCipherSuiteEntry
MAX-ACCESS not-accessible
STATUS
current
DESCRIPTION
An entry containing the management information for a cipher
suite.
INDEX { secyCipherSuiteIndex }
::= { secyCipherSuiteTable 1 }
SecyCipherSuiteEntry ::= SEQUENCE {
secyCipherSuiteIndex
secyCipherSuiteId
secyCipherSuiteName
secyCipherSuiteCapability
secyCipherSuiteProtection
secyCipherSuiteProtectionOffset
secyCipherSuiteDataLengthChange
secyCipherSuiteICVLength
secyCipherSuiteRowStatus
}
Unsigned32,
OCTET STRING,
SnmpAdminString,
BITS,
BITS,
INTEGER,
TruthValue,
Unsigned32,
RowStatus
secyCipherSuiteIndex
OBJECT-TYPE
SYNTAX
Unsigned32 (1..4294967295)
MAX-ACCESS not-accessible
STATUS
current
DESCRIPTION
100
This is a global
secyCipherSuiteName
OBJECT-TYPE
SYNTAX
SnmpAdminString (SIZE (1..128))
MAX-ACCESS read-create
STATUS
current
DESCRIPTION
The name of the cipher suite. If the name is composed of
multi-byte characters, the total length must fit within 128
octets.
REFERENCE
IEEE 802.1AE Clause 10.7.24
::= { secyCipherSuiteEntry 3 }
secyCipherSuiteCapability
OBJECT-TYPE
SYNTAX
BITS {
integrity(0),
confidentiality(1),
offsetConfidentiality(2)
}
MAX-ACCESS read-create
STATUS
current
DESCRIPTION
The capability of this cipher suite.
integrity(0) : integrity protection capability for this
cipher suite..
confidentiality(1) : confidentiality protection
capability for this cipher suite.
offsetConfidentiality(2) : offset confidentiality protection
capability for this cipher suite.
REFERENCE
IEEE 802.1AE Clause 10.7.24, 10.7.25
::= { secyCipherSuiteEntry 4 }
secyCipherSuiteProtection
OBJECT-TYPE
SYNTAX
BITS {
integrity(0),
confidentiality(1),
offsetConfidentiality(2)
101
}
MAX-ACCESS read-create
STATUS
current
DESCRIPTION
The protection options of this cipher suite. The options
should depend on the object secyCipherSuiteCapability.
If the value of secyCipherSuiteCapability is only integerity
bit on, users can only choose to turn on integrity bit for
this object.
If the value of secyCipherSuiteCapability is integrity and
confidentiality bits on, users can choose to turn on
integrity or confidentiality bits, but if confidentiality
bit is on, the integrity bit has to be on.
If the value of secyCipherSuiteCapability is integrity and
offsetConfidentiality bits on, users can choose to turn on
integrity or offsetConfidentiality bits, but if
offsetConfidentiality bit is on, the integrity bit has to be
on.
If the value of secyCipherSuiteCapability is integrity and
confidentiality and offsetConfidentiality bits on, users can
choose to turn on integrity or confidentiality or
offsetConfidentiality bits, but if confidentiality or
offsetConfidentiality bits are on, the integrity bit has to
be on.
integrity(0) : on or off the function of supporting integrity
protection for this cipher suite.
confidentiality(1) : on or off the function of supporting
confidentiality for this cipher suite.
offsetConfidentiality(2) : on or off the function of
supporting offset confidentiality for this cipher suite.
REFERENCE
IEEE 802.1AE Clause 10.7.24, 10.7.25
DEFVAL { { integrity } }
::= { secyCipherSuiteEntry 5 }
secyCipherSuiteProtectionOffset
OBJECT-TYPE
SYNTAX
Integer32 (0 | 30 | 50)
UNITS
bytes
MAX-ACCESS read-create
STATUS
current
DESCRIPTION
The confidentiality protection offset options of this
cipher suite. The options should depend on the choice of
secyCipherSuiteProtection.
If the value of secyCipherSuiteProtection only turns on
integrity bit, users can only choose 0 byte for this
102
object.
If the value of secyCipherSuiteProtection only turns on
integrity and confidentiality bits, users can only choose
0 byte for this object.
If the value of secyCipherSuiteProtection only turns on
integrity and offsetConfidentiality bits, users can choose
30 or 50 bytes for this object.
If the value of secyCipherSuiteProtection turns on
integrity and confidentiality and offsetConfidentiality
bits, users can choose 0 or 30 or 50 bytes for this object.
REFERENCE
IEEE 802.1AE Clause 10.7.24, 10.7.25
DEFVAL { 0 }
::= { secyCipherSuiteEntry 6 }
secyCipherSuiteDataLengthChange
OBJECT-TYPE
SYNTAX
TruthValue
MAX-ACCESS read-create
STATUS
current
DESCRIPTION
This indicates whether the data length will be
changed after encryption by the cipher suite.
REFERENCE
IEEE 802.1AE Clause 10.7.24
::= { secyCipherSuiteEntry 7 }
secyCipherSuiteICVLength
OBJECT-TYPE
SYNTAX
Unsigned32 (8..16)
UNITS
octets
MAX-ACCESS read-create
STATUS
current
DESCRIPTION
The length of integrity check value (ICV) field.
REFERENCE
IEEE 802.1AE Clause 10.7.24
::= { secyCipherSuiteEntry 8 }
secyCipherSuiteRowStatus
OBJECT-TYPE
SYNTAX
RowStatus
MAX-ACCESS read-create
STATUS
current
DESCRIPTION
The object to create the paramaters for the supported
Cipher Suites in the system. If the specified
secyCipherSuiteId object information is not supported
in the system or the secyCipherSuiteCapability object
is not matched the capability of the corresponding
specified Cipher Suite in the same entry, the corresponding
entry should not be active, i.e., this object should not be
active or notInService.
REFERENCE
103
An SA
REFERENCE
IEEE 802.1AE Clause 10.7.18, figure 10.4
::= { secyTxSAStatsEntry 1 }
secyTxSAStatsEncryptedPkts
OBJECT-TYPE
SYNTAX
Counter32
UNITS
Packets
MAX-ACCESS read-only
STATUS
current
DESCRIPTION
The number of integrity protected and encrypted packets for
this transmitting SA.
REFERENCE
IEEE 802.1AE Clause 10.7.18, figure 10.4
::= { secyTxSAStatsEntry 2 }
--- TX SC Statistics Information
-secyTxSCStatsTable
OBJECT-TYPE
SYNTAX
SEQUENCE OF SecyTxSCStatsEntry
MAX-ACCESS not-accessible
STATUS
current
DESCRIPTION
A table that contains statistics information for each
transmitting SC in the MAC security entity.
REFERENCE
IEEE 802.1AE Clause 10.7.18, 10.7.19, figure 10.4
::= { secyStatsMIBObjects 2 }
secyTxSCStatsEntry
OBJECT-TYPE
SYNTAX
SecyTxSCStatsEntry
MAX-ACCESS not-accessible
STATUS
current
DESCRIPTION
The entry contains the counters of a transmitting SC. Since some
counters in the transmitting SA will be reset while the SA is
reused, in order to maintain complete statistics information
for the SC, the counters information on the SAs need to be kept
in the SC.
Those counters that may be reset are :
secyTxSAStatsProtectedPkts,
secyTxSAStatsEncryptedPkts
Each counter for a SC is in the summation of the corresponding
counter information for all the SAs, current and prior SAs,
belonging to this SC.
AUGMENTS { secyTxSCEntry }
::= { secyTxSCStatsTable 1 }
SecyTxSCStatsEntry ::= SEQUENCE {
secyTxSCStatsProtectedPkts
Counter64,
105
secyTxSCStatsEncryptedPkts
secyTxSCStatsOctetsProtected
secyTxSCStatsOctetsEncrypted
Counter64,
Counter64,
Counter64
}
secyTxSCStatsProtectedPkts
OBJECT-TYPE
SYNTAX
Counter64
UNITS
Packets
MAX-ACCESS read-only
STATUS
current
DESCRIPTION
The number of integrity protected but not encrypted packets
for this transmitting SC.
REFERENCE
IEEE 802.1AE Clause 10.7.18, figure 10.4
::= { secyTxSCStatsEntry 1 }
secyTxSCStatsEncryptedPkts
OBJECT-TYPE
SYNTAX
Counter64
UNITS
Packets
MAX-ACCESS read-only
STATUS
current
DESCRIPTION
The number of integrity protected and encrypted packets for
this transmitting SC.
REFERENCE
IEEE 802.1AE Clause 10.7.18, figure 10.4
::= { secyTxSCStatsEntry 4 }
secyTxSCStatsOctetsProtected
OBJECT-TYPE
SYNTAX
Counter64
UNITS
Octets
MAX-ACCESS read-only
STATUS
current
DESCRIPTION
The number of plain text octets that are integrity protected
but not encrypted on the transmitting SC.
REFERENCE
IEEE 802.1AE Clause 10.7.19, figure 10.4
::= { secyTxSCStatsEntry 10 }
secyTxSCStatsOctetsEncrypted
OBJECT-TYPE
SYNTAX
Counter64
UNITS
Octets
MAX-ACCESS read-only
STATUS
current
DESCRIPTION
The number of plain text octets that are integrity protected
and encrypted on the transmitting SC.
REFERENCE
IEEE 802.1AE Clause 10.7.19, figure 10.4
::= { secyTxSCStatsEntry 11 }
-106
-- RX SA Statistics Information
-secyRxSAStatsTable
OBJECT-TYPE
SYNTAX
SEQUENCE OF SecyRxSAStatsEntry
MAX-ACCESS not-accessible
STATUS
current
DESCRIPTION
A table that contains the statistics objects for each
receiving SA in the MAC security entity.
REFERENCE
IEEE 802.1AE Clause 10.7.9, figure 10.5
::= { secyStatsMIBObjects 3 }
secyRxSAStatsEntry
OBJECT-TYPE
SYNTAX
SecyRxSAStatsEntry
MAX-ACCESS not-accessible
STATUS
current
DESCRIPTION
The entry holds the statistics for a receiving SA.
may be reused once a while.
An SA
107
secyRxSAStatsNoUsingSAPkts
OBJECT-TYPE
SYNTAX
Counter32
UNITS
Packets
MAX-ACCESS read-only
STATUS
current
DESCRIPTION
For this SA which is not currently in use, the number of
received packets that have been discarded, and have
either the packets encrypted or the secyValidateFrames set to
strict mode.
REFERENCE
IEEE 802.1AE Clause 10.7.9, figure 10.5
::= { secyRxSAStatsEntry 4 }
secyRxSAStatsNotValidPkts
OBJECT-TYPE
SYNTAX
Counter32
UNITS
Packets
MAX-ACCESS read-only
STATUS
current
DESCRIPTION
For this SA, the number discarded packets with the
condition that the packets are not valid and one of the
following conditions are true: either secyValidateFrames in
strict mode or the packets encrypted.
REFERENCE
IEEE 802.1AE Clause 10.7.9, figure 10.5
::= { secyRxSAStatsEntry 13 }
secyRxSAStatsInvalidPkts
OBJECT-TYPE
SYNTAX
Counter32
UNITS
Packets
MAX-ACCESS read-only
STATUS
current
DESCRIPTION
For this SA, the number of packets with the condition
that the packets are not valid and secyValidateFrames is in
check mode.
REFERENCE
IEEE 802.1AE Clause 10.7.9, figure 10.5
::= { secyRxSAStatsEntry 16 }
secyRxSAStatsOKPkts
OBJECT-TYPE
SYNTAX
Counter32
UNITS
Packets
MAX-ACCESS read-only
STATUS
current
DESCRIPTION
For this SA, the number of validated packets.
REFERENCE
IEEE 802.1AE Clause 10.7.9, figure 10.5
::= { secyRxSAStatsEntry 25 }
--- RX SC Statistics Information
108
-secyRxSCStatsTable
OBJECT-TYPE
SYNTAX
SEQUENCE OF SecyRxSCStatsEntry
MAX-ACCESS not-accessible
STATUS
current
DESCRIPTION
A table for the statistics information of each receiving SC
supported by the MAC security entity.
REFERENCE
IEEE 802.1AE Clause 10.7.9, 10.7.10, figure 10.5
::= { secyStatsMIBObjects 4 }
secyRxSCStatsEntry
OBJECT-TYPE
SYNTAX
SecyRxSCStatsEntry
MAX-ACCESS not-accessible
STATUS
current
DESCRIPTION
The entry contains the counters of a receiving SC. Since some
counters in the receiving SA will be reset while the SA is
reused, in order to maintain complete statistics information
for the SC, the counters information on the SAs need to be kept
in the SC.
Those counters that may be reset are :
secyRxSAStatsUnusedSAPkts,
secyRxSAStatsNoUsingSAPkts,
secyRxSAStatsNotValidPkts,
secyRxSAStatsInvalidPkts,
secyRxSAStatsOKPkts
Each counter for a SC is in the summation of the corresponding
counter information for all the SAs, current and prior SAs,
belonging to this SC.
AUGMENTS { secyRxSCEntry }
::= { secyRxSCStatsTable 1 }
SecyRxSCStatsEntry ::= SEQUENCE {
secyRxSCStatsUnusedSAPkts
secyRxSCStatsNoUsingSAPkts
secyRxSCStatsLatePkts
secyRxSCStatsNotValidPkts
secyRxSCStatsInvalidPkts
secyRxSCStatsDelayedPkts
secyRxSCStatsUncheckedPkts
secyRxSCStatsOKPkts
secyRxSCStatsOctetsValidated
secyRxSCStatsOctetsDecrypted
}
secyRxSCStatsUnusedSAPkts
SYNTAX
Counter64
UNITS
Packets
MAX-ACCESS read-only
Counter64,
Counter64,
Counter64,
Counter64,
Counter64,
Counter64,
Counter64,
Counter64,
Counter64,
Counter64
OBJECT-TYPE
109
STATUS
current
DESCRIPTION
The summation of counter secyRxSAStatsUnusedSAPkts
information for all the SAs which belong to this SC.
Since the secyRxSAStatsUnusedSAPkts counters in the SAs
will be reset, in order to maintain complete statistics
information for the SC, the counter information on the SAs
need to be kept in the SC.
REFERENCE
IEEE 802.1AE Clause 10.7.9, figure 10.5
::= { secyRxSCStatsEntry 1 }
secyRxSCStatsNoUsingSAPkts
OBJECT-TYPE
SYNTAX
Counter64
UNITS
Packets
MAX-ACCESS read-only
STATUS
current
DESCRIPTION
The summation of counter secyRxSAStatsNoUsingSAPkts
information for all the SAs which belong to this SC.
Since the secyRxSAStatsNoUsingSAPkts counters in the SAs
will be reset, in order to maintain complete statistics
information for the SC, the counter information on the SAs
need to be kept in the SC.
REFERENCE
IEEE 802.1AE Clause 10.7.9, figure 10.5
::= { secyRxSCStatsEntry 2 }
secyRxSCStatsLatePkts
OBJECT-TYPE
SYNTAX
Counter64
UNITS
Packets
MAX-ACCESS read-only
STATUS
current
DESCRIPTION
For this SC, the number of received packets that have
been discarded with the condition : secyReplayProtect is equal
to true and the PN of the packet is lower than the lower bound
replay check PN.
REFERENCE
IEEE 802.1AE Clause 10.7.9, figure 10.5
::= { secyRxSCStatsEntry 3 }
secyRxSCStatsNotValidPkts
OBJECT-TYPE
SYNTAX
Counter64
UNITS
Packets
MAX-ACCESS read-only
STATUS
current
DESCRIPTION
The summation of counter secyRxSAStatsNotValidPkts
information for all the SAs which belong to this SC.
Since the secyRxSAStatsNotValidPkts counters in the SAs
110
111
secyRxSCStatsOKPkts
OBJECT-TYPE
SYNTAX
Counter64
UNITS
Packets
MAX-ACCESS read-only
STATUS
current
DESCRIPTION
The summation of counter secyRxSAStatsOKPkts
information for all the SAs which belong to this SC.
Since the secyRxSAStatsOKPkts counters in the SAs
will be reset, in order to maintain complete statistics
information for the SC, the counter information on the SAs
need to be kept in the SC.
REFERENCE
IEEE 802.1AE Clause 10.7.9, figure 10.5
::= { secyRxSCStatsEntry 8 }
secyRxSCStatsOctetsValidated
OBJECT-TYPE
SYNTAX
Counter64
UNITS
Octets
MAX-ACCESS read-only
STATUS
current
DESCRIPTION
The number of octets of plaintext recovered from received
packets that were integrity protected but not encrypted.
REFERENCE
IEEE 802.1AE Clause 10.7.10, figure 10.5
::= { secyRxSCStatsEntry 9 }
secyRxSCStatsOctetsDecrypted
OBJECT-TYPE
SYNTAX
Counter64
UNITS
Octets
MAX-ACCESS read-only
STATUS
current
DESCRIPTION
The number of octets of plaintext recovered from received
packets that were integrity protected and encrypted.
REFERENCE
IEEE 802.1AE Clause 10.7.10, figure 10.5
::= { secyRxSCStatsEntry 10 }
--- SecY statistics table
-secyStatsTable
OBJECT-TYPE
SYNTAX
SEQUENCE OF SecyStatsEntry
MAX-ACCESS not-accessible
STATUS
current
DESCRIPTION
A table for the statistics information of each SecY supported by
the MAC security entity.
REFERENCE
IEEE 802.1AE Clause 10.7.9, 10.7.18, figure 10.4, 10.5
112
::= { secyStatsMIBObjects 5 }
secyStatsEntry
OBJECT-TYPE
SYNTAX
SecyStatsEntry
MAX-ACCESS not-accessible
STATUS
current
DESCRIPTION
An entry containing counters for statistics or diagnosis for
a SecY.
AUGMENTS { secyIfEntry }
::= { secyStatsTable 1 }
SecyStatsEntry ::= SEQUENCE {
secyStatsTxUntaggedPkts
secyStatsTxTooLongPkts
secyStatsRxUntaggedPkts
secyStatsRxNoTagPkts
secyStatsRxBadTagPkts
secyStatsRxUnknownSCIPkts
secyStatsRxNoSCIPkts
secyStatsRxOverrunPkts
}
Counter64,
Counter64,
Counter64,
Counter64,
Counter64,
Counter64,
Counter64,
Counter64
secyStatsTxUntaggedPkts
OBJECT-TYPE
SYNTAX
Counter64
UNITS
Packets
MAX-ACCESS read-only
STATUS
current
DESCRIPTION
The number of transmitted packets without the MAC
security tag (SecTAG) because secyProtectFramesEnable is
configured as false.
REFERENCE
IEEE 802.1AE Clause 10.7.18, figure 10.4
::= { secyStatsEntry 1 }
secyStatsTxTooLongPkts
OBJECT-TYPE
SYNTAX
Counter64
UNITS
Packets
MAX-ACCESS read-only
STATUS
current
DESCRIPTION
The number of transmitted packets discarded because the packet
length is greater than the ifMtu of the Common Port interface.
REFERENCE
IEEE 802.1AE Clause 10.7.18, figure 10.4
::= { secyStatsEntry 2 }
secyStatsRxUntaggedPkts
SYNTAX
Counter64
UNITS
Packets
MAX-ACCESS read-only
STATUS
current
DESCRIPTION
OBJECT-TYPE
113
-- Compliance
secyMIBCompliance MODULE-COMPLIANCE
STATUS current
DESCRIPTION
The compliance statement for entities which implement
the IEEE8021-SECY-MIB.
MODULE -- this module
MANDATORY-GROUPS {
secyIfCtrlGroup,
secyTxSCGroup,
secyTxSAGroup,
secyRxSCGroup,
secyRxSAGroup,
secyCipherSuiteGroup,
secyTxSAStatsGroup,
secyTxSCStatsGroup,
secyRxSAStatsGroup,
secyRxSCStatsGroup,
secyStatsGroup
}
OBJECT secyIfCurrentCipherSuite
MIN-ACCESS
read-only
DESCRIPTION
write access is not required.
read-only.
This may be
115
OBJECT
secyCipherSuiteId
MIN-ACCESS
read-only
DESCRIPTION
read-create access is not required.
read-only.
OBJECT
secyCipherSuiteName
MIN-ACCESS
read-only
DESCRIPTION
read-create access is not required.
read-only.
OBJECT
secyCipherSuiteCapability
MIN-ACCESS
read-only
DESCRIPTION
read-create access is not required.
read-only.
OBJECT
secyCipherSuiteProtection
MIN-ACCESS
read-only
DESCRIPTION
read-create access is not required.
read-only.
OBJECT
secyCipherSuiteProtectionOffset
MIN-ACCESS
read-only
DESCRIPTION
read-create access is not required.
read-only.
OBJECT
secyCipherSuiteDataLengthChange
MIN-ACCESS
read-only
DESCRIPTION
read-create access is not required.
read-only.
OBJECT
secyCipherSuiteICVLength
MIN-ACCESS
read-only
DESCRIPTION
read-create access is not required.
read-only.
OBJECT
secyCipherSuiteRowStatus
MIN-ACCESS
read-only
DESCRIPTION
read-create access is not required.
read-only.
This may be
This may be
This may be
This may be
This may be
This may be
This may be
This may be
::= { secyMIBCompliances 1 }
-- Units of Conformance
116
secyIfCtrlGroup
OBJECT-GROUP
OBJECTS {
secyIfMaxPeerSCs,
secyIfRxMaxKeys,
secyIfTxMaxKeys,
secyIfProtectFramesEnable,
secyIfValidateFrames,
secyIfReplayProtectEnable,
secyIfReplayProtectWindow,
secyIfCurrentCipherSuite,
secyIfAdminPt2PtMAC,
secyIfOperPt2PtMAC,
secyIfIncludeSCIEnable,
secyIfUseESEnable,
secyIfUseSCBEnable
}
STATUS
current
DESCRIPTION
A collection of objects providing a SecY control management
information.
::= { secyMIBGroups 1 }
secyTxSCGroup
OBJECT-GROUP
OBJECTS {
secyTxSCI,
secyTxSCState,
secyTxSCEncodingSA,
secyTxSCEncipheringSA,
secyTxSCCreatedTime,
secyTxSCStartedTime,
secyTxSCStoppedTime
}
STATUS
current
DESCRIPTION
A collection of objects providing a transmitting SC control
management information.
::= { secyMIBGroups 2 }
secyTxSAGroup
OBJECT-GROUP
OBJECTS {
secyTxSAState,
secyTxSANextPN,
secyTxSAConfidentiality,
secyTxSASAKUnchanged,
secyTxSACreatedTime,
secyTxSAStartedTime,
secyTxSAStoppedTime
}
STATUS
current
DESCRIPTION
A collection of objects providing a transmitting SA control
management information.
::= { secyMIBGroups 3 }
117
secyRxSCGroup
OBJECT-GROUP
OBJECTS {
secyRxSCState,
secyRxSCCurrentSA,
secyRxSCCreatedTime,
secyRxSCStartedTime,
secyRxSCStoppedTime
}
STATUS
current
DESCRIPTION
A collection of objects providing a receiving SC control
management information.
::= { secyMIBGroups 4 }
secyRxSAGroup
OBJECT-GROUP
OBJECTS {
secyRxSAState,
secyRxSANextPN,
secyRxSASAKUnchanged,
secyRxSACreatedTime,
secyRxSAStartedTime,
secyRxSAStoppedTime
}
STATUS
current
DESCRIPTION
A collection of objects providing a receiving SA control
management information.
::= { secyMIBGroups 5 }
secyCipherSuiteGroup
OBJECT-GROUP
OBJECTS {
secyCipherSuiteId,
secyCipherSuiteName,
secyCipherSuiteCapability,
secyCipherSuiteProtection,
secyCipherSuiteProtectionOffset,
secyCipherSuiteDataLengthChange,
secyCipherSuiteICVLength,
secyCipherSuiteRowStatus
}
STATUS
current
DESCRIPTION
A collection of objects providing a cipher suite information.
::= { secyMIBGroups 6 }
secyTxSAStatsGroup
OBJECT-GROUP
OBJECTS {
secyTxSAStatsProtectedPkts,
secyTxSAStatsEncryptedPkts
}
STATUS
current
DESCRIPTION
A collection of objects providing a transmitting SA statistics
information.
118
::= { secyMIBGroups 7 }
secyRxSAStatsGroup
OBJECT-GROUP
OBJECTS {
secyRxSAStatsUnusedSAPkts,
secyRxSAStatsNoUsingSAPkts,
secyRxSAStatsNotValidPkts,
secyRxSAStatsInvalidPkts,
secyRxSAStatsOKPkts
}
STATUS
current
DESCRIPTION
A collection of objects providing a receiving SA statistics
information.
::= { secyMIBGroups 8 }
secyTxSCStatsGroup
OBJECT-GROUP
OBJECTS {
secyTxSCStatsProtectedPkts,
secyTxSCStatsEncryptedPkts,
secyTxSCStatsOctetsProtected,
secyTxSCStatsOctetsEncrypted
}
STATUS
current
DESCRIPTION
A collection of objects providing a transmitting SC statistics
information.
::= { secyMIBGroups 9 }
secyRxSCStatsGroup
OBJECT-GROUP
OBJECTS {
secyRxSCStatsUnusedSAPkts,
secyRxSCStatsNoUsingSAPkts,
secyRxSCStatsLatePkts,
secyRxSCStatsNotValidPkts,
secyRxSCStatsInvalidPkts,
secyRxSCStatsDelayedPkts,
secyRxSCStatsUncheckedPkts,
secyRxSCStatsOKPkts,
secyRxSCStatsOctetsValidated,
secyRxSCStatsOctetsDecrypted
}
STATUS
current
DESCRIPTION
A collection of objects providing a receiving SC statistics
information.
::= { secyMIBGroups 10 }
secyStatsGroup
OBJECT-GROUP
OBJECTS {
secyStatsTxUntaggedPkts,
secyStatsTxTooLongPkts,
secyStatsRxUntaggedPkts,
secyStatsRxNoTagPkts,
119
secyStatsRxBadTagPkts,
secyStatsRxUnknownSCIPkts,
secyStatsRxNoSCIPkts,
secyStatsRxOverrunPkts
}
STATUS
current
DESCRIPTION
A collection of objects providing a SecY statistics
information.
::= { secyMIBGroups 11 }
END
120
Terms that describe the use of each Cipher Suite by the MAC Security Entity (SecY).
Capabilities required of each Cipher Suite.
Requirements this standard places on Cipher Suite specification.
Mandatory and optional Cipher Suites for use in conjunction with this standard.
Criteria for the use of additional Cipher Suites in conjunction with MAC Security for
implementations for which a claim of conformance to this standard is made.
NOTE The choice and combination of cryptographic methods is notorious for the introduction of unexpected security
exposures. Each Cipher Suite is an algorithm or combination of algorithms whose interactions have been studied by the
professional security community.
SAK1
SCI
SCI2
PN
PN3
Destination Address
Source Address
Destination Address
PROTECT
SecTAG
User
PN4
Data7
Source Address
SecTAG
Secure
Destination Address
VALIDATE
Source Address
SecTAG6
Data8
ICV
User Data7
VALID
The SAK to be used on receipt of the frame is identified by the SCI and the AN.
The SCI is extracted from the SCI field of the SecTAG if present. A value conveyed by key agreement (point-to-point only) is used otherwise.
3 The PN is conveyed in the SecTAG
4 The validated PN can be used for replay protection.
5
All the transmitted octets of the SecTAG are protected, including the optional SCI field if present
6
The validated received SecTAG contains bits of the TCI, and optionally the SCI, these can be used for service multiplexing (11.7).
7 The length, in octets, of the User Data is conveyed by the User Data parameter, and is protected by Cipher Suite operation.
8 The length, in octets, of the Secure Data is conveyed by the MACsec frame, unless it is short, when it is conveyed by the SL parameter in the SecTAG TCI
2
Protect (
SAK,
Validate ( SAK,
SCI, PN,
SCI, PN,
Destination Address, Source Address,
Destination Address, Source Address,
SecTAG,
SecTAG,
User Data
Secure Data, ICV
Secure Data, ICV
) User Data, VALID
121
The SAK (Secure Association Key, 3.36, 7.1) is the value of the Cipher Suite dependent key(s).
The SCI (Secure Channel Identifier, 3.36, 7.1.2) is a 64-bit identifier that is globally unique amongst all
correctly configured Cipher Suite implementation instances protecting MACsec protocol parameters.
The PN (Packet Number, 3.27, 8.3) is a 32-bit number that is never zero, is incremented each time a protect
request is made for a given SCI, and is never repeated for an SCI unless the SAK is changed.
The Destination Address and Source Address are the MAC addresses of the frame. MAC Addresses are
specified as octet strings, using the canonical format specified in IEEE Std 802.
The SecTAG is as specified in Clause 9.
The ICV (Integrity Check Value, 3.13, 8.3) is a string of octets. VALID is a Boolean parameter. If TRUE the
validation was successful.
Given the SAK, SCI, PN, Source Address, Destination Address, SecTAG, and the User Data, the Protect
operation returns the Secure Data and ICV.
Given the same SAK, SCI, PN, Source Address, Destination Address, and SecTAG, and the Secure Data and
ICV, the Verify operation returns the original User Data and VALID. If any of the parameters were modified,
VALID is returned False.
Provide integrity protection for the SCI, PN, Source Address, Destination Address, SecTAG, and
from 0 through 216 1 octets of User Data on each invocation.
Provide integrity and confidentiality (if specified) for up to 232 1 invocations, each with a different
PN, without requiring a fresh SAK.
Given any specific number of octets of User Data, generate a predictable number of octets of Secure
Data and ICV.
and may
d)
e)
Provide confidentiality protection for all the octets of the User Data.
Provide confidentiality protection for all the octets of the User Data following an initial number of
octets, as specified in 10.7.24.
Generate Secure Data that when added to the number of octets in the ICV contains over 896 octets
more than the User Data.
NOTEA Cipher Suite may introduce additional fields into the Secure Data even if confidentiality is not
provided.
g)
h)
i)
122
Modify or constrain the values of the SCI, PN, Source Address, Destination Address, or SecTAG
fields, other than as specified in this Clause (14).
Require an SAK exceeding 1024 bits long (in total for all keys that compose the SAK).
Require different keys for the protect and validate operations.
Copyright 2006 IEEE. All rights reserved.
An implementation of MACsec for which conformance to this standard is claimed includes at least one
Cipher Suite that provides integrity without confidentiality, with the Secure Data the same as the User Data,
and the ICV comprising 16 octets. This requirement is met by the mandatory Default Cipher Suite.
NOTEWhile this standard provides definitive specifications of the Cipher Suites that support full conformance, those
specifications make the greatest possible use of other public and established standards, and are principally concerned
with ensuring unambiguous application of those standards in the context of MAC Security.
00-80-02-00-01-00-00-01
GCM-AES-128
Yes
Yes
Mandatory/Optional
Defining Clause
Integrity and
confidentiality
Cipher Suite #
Integrity without
confidentiality
Services provided
Mandatory
14.5
NOTE Currently, Table 14-1 does not include any optional Cipher Suites.
Table 14-1 assigns a Cipher Suite reference number for use in protocol identification within a MACsec
context, provides a short name for use in this standard, indicates the type of cryptographic algorithm used
and the security services provided, specifies whether the Cipher Suite is mandatory or optional for
conformance to this standard, and references the clause of this standard that provides the definitive
description of the Cipher Suite.
14.4.1 Conformance with Cipher Suite variance
An implementation of MAC Security that claims conformance to this standard with Cipher Suite variance,
shall implement the mandatory Cipher Suites in Table 14-1, may implement one or more of the optional
Cipher Suites in Table 14-1, and may implement alternate Cipher Suites that meet the requirements of 14.2
123
and 14.3, and the following guidelines, and shall not implement any other Cipher Suite, or other
combination of cryptographic algorithms and parameters.
The use of additional Cipher Suites shall meet the following guidelines:
a)
b)
c)
Algorithms chosen have an effective key length of at least 128 bits. In schemes built on block
ciphers, the underlying block cipher has a block width of at least 128 bits.
If serviced by separate algorithms, the properties of the authentication and confidentiality
mechanisms are combinable in accordance with well-established security results. Either the
encryption happens before authentication, or the encryption is performed through keystream
generation.
Either of the following holds true:
1) The underlying cryptographic cipher is approved by either a national or international standards
body or a government agency; or
2) The following conditions i) through iv) apply:
i) The Cipher Suite provides message authentication using a message authentication
algorithm with a publicly available proof of security against forgery attacks, even in a
model where the attacker has the ability to choose messages for the sender.
ii) If confidentiality is provided, the confidentiality mechanism has a publicly available proof
of security in a model where the attacker has the ability to adaptively choose both
plaintext and cipher text.
iii) Mechanisms for confidentiality and message authentication are used in a way that is
consistent with their proof of security. For example, if using the Cipher Block Chaining
(AES-CBC) mode of operation the IV is performed through keystream generation.
iv) Mechanisms for confidentiality and message authentication are used in a way that is
consistent with their proof of security. For instance, if using the Cipher Block Chaining
(AES-CBC) mode of operation, the IV is randomly selected with each message, and not
sequentially.
A is the Destination MAC Address, Source MAC Address, and the octets of the SecTAG and User
Data concatenated in that order.
P is null.
The Secure Data is the octets of the User Data, without modification.
When the Default Cipher Suite is used for Confidentiality Protection without a confidentiality offset
124
A is the Destination MAC Address, Source MAC Address, and the octets of the SecTAG
concatenated in that order.
P is the octets of the User Data.
The Secure Data is C.
When the Default Cipher Suite is used for Confidentiality Protection with a confidentiality offset
A is the Destination MAC Address, Source MAC Address, and the octets of the SecTAG and the first
confidentialityOffset (10.7.24) octets of the User Data concatenated in that order.
P is the remaining octets of the User Data.
The Secure Data is the first confidentialityOffset octets of the User Data concatenated with C, in that
order.
125
Annex A
(normative)
PICS Proforma16
A.1 Introduction
The supplier of a protocol implementation which is claimed to conform to this standard shall complete the
following Protocol Implementation Conformance Statement (PICS) proforma.
A completed PICS proforma is the PICS for the implementation in question. The PICS is a statement of
which capabilities and options of the protocol have been implemented. The PICS can have a number of uses,
including use
a)
By the protocol implementor, as a checklist to reduce the risk of failure to conform to the standard
through oversight;
b)
By the supplier and acquireror potential acquirerof the implementation, as a detailed indication
of the capabilities of the implementation, stated relative to the common basis for understanding
provided by the standard PICS proforma;
c)
By the useror potential userof the implementation, as a basis for initially checking the
possibility of interworking with another implementation (note that, while interworking can never be
guaranteed, failure to interwork can often be predicted from incompatible PICSs);
d)
By a protocol tester, as the basis for selecting appropriate tests against which to assess the claim for
conformance of the implementation.
mandatory
optional
optional, but support of at least one of the group of options labelled by the same numeral n
is required
prohibited
conditional-item symbol, including predicate identification: see A.3.4
logical negation, applied to a conditional items predicate
not applicable
Protocol Implementation Conformance Statement
16
Copyright release for PICS proformas: Users of this standard may freely reproduce the PICS proforma in this annex so that it can be
used for its intended purpose and may further publish the completed PICS.
126
127
An implementation for which an Exception item is required in this way does not conform to this standard.
NOTEA possible reason for the situation described above is that a defect in this standard has been reported, a
correction for which is expected to change the requirement not met by the implementation.
c)
d)
An item-reference for an item in the PICS proforma: the value of the predicate is True if the item is
marked as supported, and is False otherwise;
A predicate-name, for a predicate defined as a Boolean expression constructed by combining itemreferences using the Boolean operator OR: the value of the predicate is True if one or more of the
items is marked as supported;
A predicate-name, for a predicate defined as a Boolean expression constructed by combining itemreferences using the boolean operator AND: the value of the predicate is True if all of the items are
marked as supported;
The logical negation symbol prefixed to an item-reference or predicate-name: the value of the
predicate is True if the value of the predicate formed by omitting the symbol is False, and vice
versa.
Each item whose reference is used in a predicate or predicate definition, or in a preliminary question for
grouped conditional items, is indicated by an asterisk in the Item column.
128
NOTE 1Only the first three items are required for all implementations; other information may be completed as
appropriate in meeting the requirement for full identification.
NOTE 2The terms Name and Version should be interpreted appropriately to correspond with a suppliers
terminology (e.g., Type, Series, Model).
IEEE Std 802.1AE, IEEE Standard for Local and Metropolitan Area
Networks: Media Access Control (MAC) Security
Amd.
Corr.
Amd.
Corr.
No [ ]
Yes [ ]
Date of Statement
129
Feature
Status
References
Support
SAP
5.3(a),
10,
A.6
Yes [ ]
STAT
5.3(b),
6.4, 6.5, 10.7,
A.7
Yes [ ]
GEN
5.3(c),
10.5,
A.8
Yes [ ]
VER
5.3(d),
10.6,
A.9
Yes[ ]
FMT
5.3(e),
9,
A.10
Yes [ ]
SCI
5.3(f),
8.2.1
Yes [ ]
PERF
5.3(g), 10.1,
Table 10-1, 8.2.2
Yes [ ]
FCS
5.3(n),
10.4, 6.10
KAY
5.3(h),
10,
A.11
Yes [ ]
MGT
5.3(i),
10.7,
A.11.1
Yes [ ]
MIB
5.3(a),
13
Yes [ ] No[ ]
SNMP
5.4(b),
13
Yes [ ] No[ ]
SNMX
5.3(p)
No[ ]
MSC
5.4(c)
Yes [ ] No[ ]
MSAK
5.4(d)
Yes [ ] No[ ]
CS
5.3(j),
14.1
Yes [ ]
CSI
5.3(k),
14, 14.5
Yes [ ]
CSC
CSO:O
CSO:M
5.4(e),
14, 14.5
Yes [ ]
130
No [ ]
Feature
Status
References
Support
CSO
Does the implementation support Confidentiality Protection using the Default Cipher Suite with a Confidentiality
Offset as specified in Clause 14?
5.4(f),
14, 14.5,
Yes [ ]
CSA
5.4(g),
A.12
Yes [ ] No[ ]
CSX
5.3(o),
14.2, 14.3, 14.4.1
CSV
5.4(h),
A.13
Yes [ ] No[ ]
CSR
5.3(l),
14
Yes [ ]
CSS
5.3(m),
A.12, A.13
Yes [ ]
CSRC
5.3(i)
CSRK
5.3(i)
FULL
VAR
CSV:X
CSV:O
No[ ]
5.3
Yes [ ] No[ ]
5.3
Yes [ ] No[ ]
Feature
Status
References
Support
SAP-1
10.4
Yes [ ]
SAP-2
10.4
Yes [ ]
SAP-3
10.4
Yes [ ]
SAP-4
10.4
Yes [ ]
131
Feature
Status
References
Support
SAP-5
10.4
No [ ]
SAP-6
10.4
No [ ]
SAP-7
10.4
Yes [ ]
SAP-8
10.4
Yes [ ]
SAP-9
10.4
Yes [ ]
SAP-10
10.4, 10.5
Yes [ ]
SAP-11
M
Is each receive indication from the Common Port
processed in accordance with the specification of
the Secure Frame Verification process prior to causing a possible corresponding indication at the Controlled Port?
10.4, 10.6
Yes [ ]
Feature
Status
Support
6.4, 10.7.2
Yes [ ]
Yes [ ]
STAT-3
6.4, 10.5.2
Yes [ ]
STAT-4
6.4, 10.7.4
Yes [ ]
STAT-5
Is the value of operPointToPointMAC for the Controlled Port always as specified in 10.7.4.
6.5, 10.7.4
Yes [ ]
STAT-1
Are the values for MAC_Operational and operPointToPointMAC for the Uncontrolled Port identical to
those for the Common Port?
STAT-2
132
References
Feature
Status
References
Support
GEN-1
10.5
Yes [ ]
GEN-2
10.5
Yes[ ]
GEN-3
10.5.1
Yes[ ]
GEN-4
10.5.1
Yes[ ]
GEN-5
10.5.2
GEN-6
10.5.2
GEN-7
10.5.3, 9
GEN-8
Is the ES bit set or clear as required by the management controls useES and alwaysIncludeSCI?
10.5.3
GEN-9
10.5.3
GEN-10
10.5.3
GEN-11
Is the E bit set if the frame is confidentiality protected, and clear otherwise?
9.5
GEN-12
9.5
GEN-13
10.5
GEN-14
10.5.4
GEN-15
10.5.5
No [ ]
Yes[ ]
133
Feature
Status
References
Support
VER-1
10.6,
9.3 through 9.9,
9.10, 9.11, 9.12
Yes[ ]
VER-2
10.6
Yes[ ]
VER-3
10.6
Yes[ ]
VER-4
M
Is the received frame discarded if the SC is
unknown and validateFrames is Strict or the C bit is
set, and delivered to the Controlled Port otherwise?
10.6.1
Yes[ ]
VER-5
10.6.1
Yes[ ]
VER-6
10.6.2, 10.6.4
Yes[ ]
VER-7
10.6.3
Yes[ ]
VER-8
10.6.3, 10.6.5
Yes[ ]
VER-9
10.6.3
Yes[ ]
VER-10
10.6.5
Yes[ ]
VER-11
M
Are the values for the next expected and lowest
acceptable PN updated as specified in 10.6.5 following receipt of a MACsec PDU successfully validate by the Cipher Suite, and not modified by
received frames otherwise?
10.6.5
Yes[ ]
VER-12
10.6
Yes[ ]
134
Feature
FMT-1
FMT-2
Status
M
References
Support
9.1
Yes[ ]
Yes[ ]
FMT-3
9.3, 9.4
Yes[ ]
FMT-4
9.5
Yes[ ]
FMT-5
9.5
Yes[ ]
FMT-6
9.5
Yes[ ]
FMT-7
9.5
Yes[ ]
FMT-8
9.7
Yes[ ]
FMT-9
9.5
Yes[ ]
Feature
Status
References
Support
KAY-1
10.7.2
Yes[ ]
KAY-2
10.7.4, 10.7.5
Yes[ ]
KAY-3
10.2, 10.7.7,
10.7.16, 10.7.24
Yes[ ]
KAY-4
10.6.1, 10.7.11
Yes[ ]
KAY-5
10.7.13
Yes[ ]
KAY-6
10.7.15
Yes[ ]
KAY-7
10.7.21, 10.5.2
Yes[ ]
135
Feature
Status
References
Support
KAY-8
10.7.23, 10.5.1,
10.5.2
Yes[ ]
KAY-9
10.7.2
Yes[ ]
KAY-10
10.7.25
Yes[ ]
KAY-11
10.7.26, 10.7.28
Yes[ ]
Feature
Status
References
Support
10.7.1
Yes[ ]
MGT1-2
10.7.2
Yes[ ]
MGT1-3
10.7.4
Yes[ ]
MGT1-4
10.7.7
Yes[ ]
MGT1-5
10.7.8
Yes[ ]
MGT1-6
10.7.12
Yes[ ]
MGT1-7
10.7.14
Yes[ ]
MGT1-8
10.7.16
Yes[ ]
MGT1-9
10.7.17
Yes[ ]
MGT1-10
10.7.20
Yes[ ]
MGT1-11
10.7.22
Yes[ ]
MGT1-12
10.7.25
Yes[ ]
MGT1-13
10.7.27
Yes[ ]
MGT1-14
Can the management information for each implemented Cipher Suite be read?
10.7.24
Yes[ ]
136
Feature
Status
References
Support
validateFrames
10.7.8, 10.6
Yes[ ] No [ ]
MGT2-2
replayProtect
10.7.8, 10.6.2,
10.6.4
Yes[ ] No [ ]
MGT2-3
replayWindow
10.7.8, 10.6.5
Yes[ ] No [ ]
MGT2-4
protectFrames
10.7.17, 10.5
Yes[ ] No [ ]
MGT2-5
useES
10.7.17, 10.5.3
Yes[ ] No [ ]
MGT2-6
useSCB
10.7.17, 10.5.3
Yes[ ] No [ ]
MGT2-7
alwaysIncludeSCI
10.7.17, 10.5.3
Yes[ ] No [ ]
Can write access by management to each of the following parameters be disabled individually?
MGT2-8
validateFrames
MGT2-1:M
10.7.8
Yes[ ]
MGT2-9
replayProtect
MGT2-2:M
10.7.8
Yes[ ]
MGT2-10
replayWindow
MGT2-3:M
10.7.8
Yes[ ]
MGT2-11
protectFrames
MGT2-4:M
10.7.17
Yes[ ]
MGT2-12
useES
MGT2-5:M
10.7.17
Yes[ ]
MGT2-13
useSCB
MGT2-6:M
10.7.17
Yes[ ]
MGT2-14
alwaysIncludeSCI
MGT2-7:M
10.7.17
Yes[ ]
Feature
Status
References
Support
10.7.11, 10.7.13,
10.7.15
Yes[ ] No [ ]
MGT3-2
Transmit SAs
10.7.21, 10.7.23
Yes[ ] No [ ]
MGT3-3
10.7.25
Yes[ ] No [ ]
MGT3-4
confidentialityOffset
10.7.25
Yes[ ] No [ ]
MGT3-5
SAKs
10.7.26, 10.7.28
Yes[ ] No [ ]
MGT3-1:M
10.7.11
Yes[ ]
MGT3-2
Transmit SAs
MGT3-2:M
10.7.21, 10.7.23
Yes[ ]
MGT3-3
MGT3-3:M
10.7.25
Yes[ ]
MGT3-4
confidentialityOffset
MGT3-4:M
10.7.25
Yes[ ]
MGT3-5
SAKs
MGT3-5:M
10.7.25
Yes[ ]
137
A.11.4 Managementstatistics
Item
Feature
Status
References
Support
Are each of the following interface statistics provided for the Controlled Port as specified in 10.7.6?
MGT4-1
ifInOctets
10.7.6
Yes[ ]
MGT4-2
10.7.6
Yes[ ]
MGT4-3
ifInDiscards
10.7.6
Yes[ ]
MGT4-4
ifInErrors
10.7.6
Yes[ ]
MGT4-5
ifOutOctets
10.7.6
Yes[ ]
MGT4-6
ifOutUcastPkts, ifOutMulticastPkts,
ifOutBroadcastPkts
10.7.6
Yes[ ]
MGT4-7
ifOutErrors
10.7.6
Yes[ ]
Are each of the following frame verification statistics recorded as specified in 10.6 and maintained for the frame verification process as a whole?
MGT4-8
InPktsUntagged
10.7.9, 10.6
Figure 10-5
Yes[ ]
MGT4-9
InPktsNoTag
10.7.9, 10.6
Figure 10-5
Yes[ ]
MGT4-10
InPktsBadTag
10.7.9, 10.6
Figure 10-5
Yes[ ]
MGT4-11
InPktsUnknownSCI
10.7.9, 10.6.1
Yes[ ]
MGT4-12
InPktsNoSCI
10.7.9, 10.6.1
Yes[ ]
MGT4-13
InPktsOverrun
10.7.9, 10.6.3
Yes[ ]
Are each of the following frame verification statistics recorded as specified in 10.6 and maintained for each receive
SC?
MGT4-14
InPktsUnchecked
10.7.9, 10.6.5
Yes[ ]
MGT4-15
InPktsDelayed
10.7.9, 10.6.5
Yes[ ]
MGT4-16
InPktsLate
10.7.9, 10.6.2,
10.6.4
Yes[ ]
Are each of the following frame verification statistics recorded as specified in 10.6 and maintained for each receive SC
and for each of the four receive SAs corresponding to the last use of AN for that SC?
MGT4-17
InPktsOK
10.7.9, 10.6.5
Yes[ ]
MGT4-18
InPktsInvalid
10.7.9, 10.6.5
Yes[ ]
MGT4-19
InPktsNotValid
10.7.9, 10.6.5
Yes[ ]
MGT4-20
InPktsNotUsingSA
10.7.9, 10.6.1
Yes[ ]
MGT4-21
InPktsUnusedSA
10.7.9, 10.6.1
Yes[ ]
Are each of the following frame validation statistics recorded as specified in 10.7?
MGT4-22
InOctetsValidated
10.7.10
Yes[ ]
MGT4-23
InOctetsDecrypted
10.7.10
Yes[ ]
Are each of the following frame generation statistics recorded as specified in 10.5 and maintained for the frame verification process as a whole?
MGT4-24
138
OutPktsUntagged
10.7.18, 10.5
Yes[ ]
Feature
Status
OutPktsTooLong
References
10.7.18, 10.5.5,
Figure 10-4
Support
Yes[ ]
Are each of the following frame generation statistics recorded as specified in 10.5 and maintained for each of the four
transmit SAs corresponding to the last use of AN for the transmit SC?
MGT4-26
OutPktsProtected
10.7.18, 10.5.4
Yes[ ]
MGT4-27
OutPktsEncrypted
10.7.18, 10.5.4
Yes[ ]
Are each of the following frame protection statistics recorded as specified in 10.7?
MGT4-28
OutOctetsProtected
10.7.19
Yes[ ]
MGT4-29
OutOctetsEncrypted
10.7.19
Yes[ ]
Feature
Status
References
Support
CSA-2
14.2(a)
Yes[ ] No [ ]
CSA-3
14.2(d), 14.3(c)
Yes[ ] No [ ]
CSA-4
14.2(e), 14.3(c)
Yes[ ] No [ ]
CSA-5
5.3(i)
CSA-6
What is the maximum number of receive SAKs supported by the Cipher Suite implementation?
_____
5.3(i)
CSV-19: O
CSV-19: M
139
Feature
Status
References
Support
CSV-2
14.3
____________________________
____________________________
____________________________
____________________________
CSV-3
CSV-4
M
Does the specification state:
Whether confidentiality of the User Data is provided?
The maximum difference in the lengths of the User
Data and Secure Data?
The length of the ICV?
The length and properties of the keys required,
including assumptions of the scope and uniqueness?
14.3, 14.1
Yes [ ]
14.3(a)
Yes [ ]
14.3(b)
14.3(c)
Yes [ ]
Yes [ ]
14.3(d)
Yes [ ]
CSV-5
14.4.1(a)
Yes[ ]
CSV-6
14.4.1(b)
Yes[ ]
CSV-7a
14.4.1(c)(1)
Yes[ ] No[ ]
CSV-7b
Does the additional Cipher Suite meet the conditions expressed in 14.4.1(c)(2)?
O.1
14.4.1(c)(2)
Yes[ ] No[ ]
CSV-8
CSV-7b:M
14.4.1(c)(2)(i)
Yes [ ]
CSV-7b:M
14.4.1(c)(2)(ii)
Yes [ ]
____________________________
____________________________
CSV-9
140
Feature
Status
References
Support
CSV-10
14.4.1(c)(2)(iii),
14.4.1(c)(2)(iv),
Yes[ ]
CSV-11
14.2(a)
Yes[ ]
CSV-12
14.2(b)
Yes[ ]
CSV-13
14.2(c)
Yes[ ]
CSV-14
14.2(f)
Yes[ ]
CSV-15
14.3(b)
_ _ _ _ _ octets
CSV-16
14.3(e)
_ _ _ _ _ octets
CSV-17
14.3(f)
Yes[ ]
CSV-18
14.2(d), 14.3(c)
Yes[ ] No [ ]
CSV-19
14.2(e), 14.3(c)
Yes[ ] No [ ]
CSV-20
X
Does the Cipher Suite modify or constrain the
values of the SCI, PN, Source Address, Destination
Address, or SecTAG fields other than as specified in
Clause 14?
14.2(g)
No [ ]
CSV-21
14.2(h)
No [ ]
CSV-22
14.2(i)
No [ ]
CSV-23
5.3(i)
CSV-24
5.3(i)
141
Annex B
(informative)
Bibliography
[B1] Fowler, M., UML Distilled: A Brief Guide to the Standard Object Modeling Language, Third Edition, Pearson Education Inc., Boston, 2004, ISBN 0-321-19368-7.
[B2] IEEE P802.1af, Draft Standard for Key Agreement for MAC Security.17
[B3] IEEE 100, The Authoritative Dictionary of IEEE Standards Terms, Seventh Edition.
[B4] IETF RFC 2279, UTF-8, a Transformation format of ISO 10646, Yergeau, F., January 1998.
[B5] IETF RFC 2406, IP Encapsulating Security Payload (ESP), Kent, S., Atkinson, R., November 1998.
[B6] IETF RFC 2737, Entity MIB (Version 2), McCloghrie, K., Bierman, A., December 1999.
[B7] IETF RFC 3232, Assigned Numbers: RFC 1700 is Replaced by an On-line Database, Reynolds, J., January 2002.
[B8] IETF RFC 3410, Introduction and Applicability Statements for Internet-Standard Management Framework, Case, J., Mundy, R., Partain, D., and Stewart, B., December 2002.
[B9] IETF RFC 3411, An Architecture for Describing Simple Network Management Protocol (SNMP)
Manage-ment Frameworks, Harrington, D., Presuhn, R., and Wijnen, B., December 2002.
[B10] ISO 6937-2: 1983, Information processingCoded character sets for text communicationPart 2:
Latin alphabetic and non-alphabetic graphic characters.18
[B11] ISO/IEC TR 11802-2: 1997, Information technologyTelecommunications and information
exchange between systemsLocal and metropolitan area networksTechnical reports and guidelines
Part 2: Standard Group MAC addresses.
[B12] McGrew, D. A., Viega, J., The Security and Performance of the Galois/Counter Mode (GCM) of
Operation (Full Version), http://eprint.iacr.org/2004/193.pdf.
17Numbers preceded by P are IEEE authorized standards projects that were not approved by the IEEE-SA Standards Board at the time
this publication went to press. (The most recent draft should be used.) For information about obtaining drafts, contact the IEEE.
18
ISO and ISO/IEC documents are available from the ISO Central Secretariat, 1 rue de Varemb, Case Postale 56, CH-1211, Genve
20, Switzerland/Suisse; and from the Sales Department, American National Standards Institute, 11 West 42nd Street, 13th Floor, New
York, NY 10036, USA.
142