Visible to Intel only — GUID: oxm1672426962467
Ixiasoft
Visible to Intel only — GUID: oxm1672426962467
Ixiasoft
6.1. MACsec Key Agreement Protocol
The 802.1X standard is a Port-Based Network Access Control Protocol that provides an authentication mechanism for LAN and wireless LAN. The third edition, IEEE Std 802.1X-2010, added authenticated key agreement supporting IEEE Std 802.1AE (MACsec).
MAC Security Key Agreement protocol (MKA -IEEE 802.1X REV-2010) is used for discovering MACsec peers and negotiating keys.
MKA key hierarchy:
The root of the key hierarchy for any given instance of MKA is the Secure Connectivity Association Key (CAK). For every MACsec potential peer of the same LAN, the possession of the same CAK for the connectivity association is a must.
- It can be a pre-shared key (PSK).
- Or it can use EAP for automatic CAK management.
Each CAK is identified by a secure Connectivity Association Key Name (CKN) that allows each of the MKA participants to select which CAK or CAK-derived key, to process a received MKPDU.
- The ICV Key (ICV): It is used to verify the integrity of MPDUs and to prove that the transmitter of the MKPDU possesses the CAK.
- The Key Encrypting Key (KEK): It is used by Key Server which is elected by MKA, to transport a succession of Secure Association Keys (SAKs) to the other members of a Connectivity Association (CA).
The Key Server uses these ICK and KEK to transport/distribute the SAKs. Here, a Key Server is elected based on the lower priority among the peers.
Pre-shared keys (CAK) are configured on MACsec enabled devices. Once peer authentication is done, Connectivity Association is formed between the peers. Further, the peers exchange CKN and validate ICV with the pre-shared keys.
Key sever election takes space based on the priority and it generates and distributes SAKs. Peers then use these SAKs to encrypt the data traffic and forwards it over the protected link.