Security at the Data Link layer is not a new topic. It has gotten a lot of press recently in the context of WLANs, but the IEEE 802.11 WG is only the latest subgroup of IEEE 802.11 to address the concept of security at the Data Link layer. The IEEE LMSC (a.k.a. Project 802) created the IEEE 802.10 WG in May 1988 and tasked it to create the Standard for Interoperable LAN/MAN Security (SILS). The introduction to the IEEE 802.10-1998 standard states very clearly when[1] and why the WG was created.[2]
The author is not aware of any LAN products that include implementations of IEEE 802.10's security mechanisms. However, the demand for products that incorporate security is present, and seems to be growing, as evidenced by the many different ways that exist to provide security services for networks. The IEEE 802.10 WG was created because LANs and MANs do have some unique properties that distinguish them from point-to-point or point-to-multipoint WAN technologies. The chief difference, from a security perspective, is that the LANs and MANs may operate over a shared medium (frequently, these media are referred to as being "broadcast-capable," as opposed to WAN technologies, which are either point-to-point[3], or point-to-multipoint[4]), and it is possible that traffic may be seen by a station even though it was not addressed to that station.
There are a number of reasons for this. First, in the case of a shared-medium LAN, such as half-duplex Ethernet ("classic Ethernet"), all stations will hear all the frames (but they only process frames that match certain filters based on a given frame's MAC Destination Address). It is a requirement of Ethernet's medium access control protocol (CSMA/CD) that a station be able to defer transmission of a frame if it detects that another station is transmitting. In effect, the protocol depends at its lowest level on the ability to eavesdrop on the medium. Moreover, a station that is transmitting must be able monitor the medium as it is transmitting, in order to determine if another station has collided with its transmission. Both of these "features" require that each station be able to detect all the traffic on the shared medium. Moreover, in any bridged LAN, the first time a frame is sent to a MAC address, it may need to be broadcast (in the most literal interpretation of the word) across the LAN since the location of that MAC address has not yet been learned (once a bridge sees a frame from any new MAC Source Address, it remembers on which interface that MAC address was seen, so that future frames to that MAC address can be delivered only to the interface that is known to lead toward the actual location of that MAC address. Another aspect of bridged topologies is that any multicast or broadcast traffic that is sent by a station may be flooded to all the ports in the LAN. The most popular[5] LAN technology, Ethernet, has evolved to the point where the most common access device is a switch, to which each attached station has direct, dedicated access (i.e., a wire, patched through to a locked closet where the wire attaches to a port on an Ethernet switch). In the beginning, however, Ethernet was a shared-medium protocol in which each station attached to a broadcast-capable bus comprised of coaxial cable, or a slightly evolved version of the bus, in which the bus was buried inside a network hub, allowing the convenience of star-wiring, but logically identical to a physical coaxial cable. In the shared mode, Ethernet was equivalent to a data-oriented party line. There was no privacy. As Ethernet evolved to be switch-based, the traffic that a given station would see would be primarily only addressed to it, since the switch is a bridge, and it learned the station's MAC address.
An Ethernet switch isn't a perfect filter, since as mentioned previously, a station may see the occasional unknown-destination unicast frame that was broadcast (flooded) by the switch in an attempt to find the station to which the frame had been addressed. In general, though, the switch provides a weak level of privacy, in that each station cannot typically overhear the conversations between other stations. Eliminating eavesdropping is a significant advance in security, and it provides a very minimal level of privacy (the proper term is actually "confidentiality") due to physically separating the traffic. Contrast the current state of the art in Ethernet bridging (i.e., layer-2 switching), where minimal confidentiality is an essential by-product of using the technology, with the fundamentally shared aspects of the WM, and we see a completely different situation. Within the range of its receiver, an IEEE 802.11 STA can hear everything that is transmitted by any other STA. The frame may be encrypted, which coverts the data portion of the frame into random-looking "noise" that only makes sense to someone who possesses the necessary decryption key. However, the header of the MPDU is observable by all STAs, and the header's Duration/Identification field is used by the sending STA to indicate the amount of time it expects to use the medium, including both the time to transmit the frame and to receive the corresponding ACK, so that the other STAs can update their NAVs and know to remain quiet until that frame/ACK exchange is complete. The other STAs can remain quiet even if the data that is being sent is encrypted such that they cannot understand it. The fact that all the STAs can hear at least the headers of all frames is a basic unalterable fact of WLAN technology today.[6] The only way to prevent unwanted eavesdropping is to perform some sort of encryption of the frame's data, preferably using keys that are only known to a given (sender, receiver) pair. Such a key is known as a pairwise key.
It is fair to say that the state of the art in WLANs today, with respect to eavesdropping, is equivalent to where Ethernet was before the early 1990s, when high-speed multiport bridges (i.e., layer-2 switches) began to appear. |