September 2011 doc.: IEEE 802.11-11/1110r6

IEEE P802.11
Wireless LANs

Aug-Sep Teleconference Minutes
Date: 2011-09-16
Author(s):
Name / Affiliation / Address / Phone / email
Hitoshi Morioka / ROOT Inc. / 2-14-38 Tenjin, Chuo-ku, Fukuoka 810-0001 JAPAN / +81 92 771 7630 /

Tuesday August 2, 2011

10:00am EDT

1.  Attendee

1.1.  Hiroshi Mano (ROOT)

1.2.  Marc Emmelmann (Fraunhofer FOKUS)

1.3.  Tom Siep (CSR)

1.4.  Hitoshi Morioka (ROOT)

1.5.  Dwight Smith (Motorola Mobility)

1.6.  Hiroki Nakano (Trans New Technology)

1.7.  George Cherian (Qualcomm)

1.8.  Katsuo Yunoki (KDDI R&D Laboratories)

1.9.  Lee Armstrong (US DoT)

1.10.  Robert Moskowitz (Verizon Business)

1.11.  Paul Lambert (Marvell)

1.12.  Phillip Barber (Huawei)

2.  Meeting call to order at 10:05am.

3.  Chair reminder on meeting and patent policy.

4.  Agenda 11-11/1105r0.

4.1.  Add IETF report by Robert Moskowitz.

5.  IETF report by Robert Moskowitz.

5.1.  No presentation material.

6.  Plan for submission by Tom Siep.

6.1.  Discuss in next week.

7.  Adjourn at 10:34am


Tuesday August 9, 2011

10:00am EDT

1.  Attendee

1.1.  Hiroshi Mano (ROOT)

1.2.  Marc Emmelmann (Fraunhofer FOKUS)

1.3.  Tom Siep (CSR)

1.4.  Hitoshi Morioka (ROOT)

1.5.  Hiroki Nakano (Trans New Technology)

1.6.  George Cherian (Qualcomm)

1.7.  Katsuo Yunoki (KDDI R&D Laboratories)

1.8.  Lee Armstrong (US DoT)

1.9.  Paul Lambert (Marvell)

1.10.  Phillip Barber (Huawei)

1.11.  George Calcev (Huawei)

1.12.  Stephen McCann (RIM)

1.13.  Gabor Bajko (Nokia)

1.14.  Ping Fang (Huawei)

1.15.  Carl Kain (Noblis)

2.  Meeting call to order at 10:02am.

3.  Chair reminder on meeting and patent policy.

4.  Agenda 11-11/1105r1.

5.  11-11/1109r0 Amendment_Creation_Process by Tom Siep.

5.1.  Postponed to next week

5.2.  Normative text, such as 11-11/1014r0 by Nokia, is preferable.

6.  11-11/1108r0 IP address configuration during association by Gabor Bajko

6.1.  voices were not clear.

7.  Plan for next week

7.1.  11-11/1109r0 Amendment Creation Process by Tom

7.2.  IP address assignment presentation by Gabor

7.3.  IP address assignment presentation by Hiroki Nakano

8.  Adjourn at 10:50am


Tuesday August 16, 2011

10:00am EDT

1.  Attendee

1.1.  Hiroshi Mano (ROOT)

1.2.  Marc Emmelmann (Fraunhofer FOKUS)

1.3.  Tom Siep (CSR)

1.4.  Hitoshi Morioka (ROOT)

1.5.  Hiroki Nakano (Trans New Technology)

1.6.  George Cherian (Qualcomm)

1.7.  Katsuo Yunoki (KDDI R&D Laboratories)

1.8.  Phillip Barber (Huawei)

1.9.  George Calcev (Huawei)

1.10.  Gabor Bajko (Nokia)

1.11.  Ping Fang (Huawei)

1.12.  Jihyun Lee (LG)

2.  Meeting call to order at 10:05am.

3.  Chair reminder on meeting and patent policy.

4.  Agenda 11-11/1105r1.

5.  11-11/1108r1 IP address configuration during association by Gabor Bajko

5.1.  Continue discussion.

6.  11-11/1109r0 Amendment_Creation_Process by Tom Siep.

6.1.  Baseline: IEEE Draft P802.11-REVmb/D9.0, May 2011

7.  Plan for next week

7.1.  IP address assignment presentation by Hiroki Nakano.

7.2.  Presentation by Ping Fang.

7.3.  Tutorial in Okinawa session.

8.  Adjourn at 11:01am


Tuesday August 23, 2011

10:00am EDT

1.  Attendee

1.1.  Hiroshi Mano (ROOT)

1.2.  Marc Emmelmann (Fraunhofer FOKUS)

1.3.  Tom Siep (CSR)

1.4.  Hiroki Nakano (Trans New Technology)

1.5.  George Cherian (Qualcomm)

1.6.  Katsuo Yunoki (KDDI R&D Laboratories)

1.7.  Phillip Barber (Huawei)

1.8.  George Calcev (Huawei)

1.9.  Gabor Bajko (Nokia)

1.10.  Ping Fang (Huawei)

1.11.  Jihyun Lee (LG)

1.12.  Carl Kain (Noblis)

1.13.  Paul Lambert (Marvell)

2.  Meeting call to order at 10:05am.

3.  Chair reminder on meeting and patent policy.

4.  Agenda 11-11/1105r2.

4.1.  Unanimously approved.

5.  11-11/1124r0 Example of IP address assignment using Generic Upper Layer Message IE by Hiroki Nakano

5.1.  Agreement with idea of providing generic container for upper layer information

5.2. Have to pay attention that a generic container does not provide a security vulnerability as it might be used to convey traffic via an unauthenticated link. Such a generic container concept must be paired with a security concept that might be not scope of TGai / 802.11.

5.3.  --> need to identify and specify which kind of protocols are allowed (under which situation) may make use of such a container. A state machine verifying such use of the container needs to be specified (open: is this state machine part of the TGai amendment, e.g. in form of an informal annex?).

6.  Tutorial in Okinawa Interim

6.1.  Might be good to add a security expert to cover security related questions / aspects

6.2.  --> Paul L. volunteers to step in . He will give next week a first talk based on a WiFi Alliance Hotspot 2.0 presentation focusing on security requirements.

6.3.  Tutorial should not present solutions as TGai has not yet agreed on any. It should be similar to the presentations given during the final phase of the study group showing where there is "potential for improvement" and sketching some initial ideas (in general) on how to proceed.

6.4.  The parts on the use cases and TGai requirements can be more specific as we have corresponding documents approved by TGai.

7.  Plan for next week

7.1.  Ping Fang prefers to present at the next teleconference.

8.  Adjourn at 10:57am


Tuesday August 30, 2011

10:00am EDT

1.  Attendee

1.1.  Hiroshi Mano (ROOT)

1.2.  Marc Emmelmann (Fraunhofer FOKUS)

1.3.  Tom Siep (CSR)

1.4.  Hitoshi Morioka (ROOT)

1.5.  Hiroki Nakano (Trans New Technology)

1.6.  George Cherian (Qualcomm)

1.7.  Katsuo Yunoki (KDDI R&D Laboratories)

1.8.  Phillip Barber (Huawei)

1.9.  George Calcev (Huawei)

1.10.  Gabor Bajko (Nokia)

1.11.  Ping Fang (Huawei)

1.12.  Jihyun Lee (LG)

1.13.  Carl Kain (Noblis)

1.14.  Paul Lambert (Marvell)

2.  Meeting call to order at 10:05am.

3.  Chair reminder on meeting and patent policy.

4.  Agenda 11-11/1105r3.

4.1.  Unanimously approved.

5.  11-11/1047r2 Using Upper Layer Message IE in TGai by Ping Fang

5.1.  Tom: Why 3GPP?

5.2.  Ping: According to the use case.

6.  WiFi Alliance Hotspot 2.0 presentation focusing on security requirements by Paul Lambert

6.1.  Gabor: In IPv6, Neighbor Discovery will make another vulnerability.

7.  Tutorial in Okinawa Interim

7.1.  Paul will make a presentation described above.

8.  Plan for next week

8.1.  Open discussion.

9.  Adjourn at 10:54am


Tuesday September 6, 2011

10:00am EDT

1.  Attendee

1.1.  Hiroshi Mano (ROOT)

1.2.  Marc Emmelmann (Fraunhofer FOKUS)

1.3.  Hitoshi Morioka (ROOT)

1.4.  Hiroki Nakano (Trans New Technology)

1.5.  George Cherian (Qualcomm)

1.6.  Katsuo Yunoki (KDDI R&D Laboratories)

1.7.  Phillip Barber (Huawei)

1.8.  Ping Fang (Huawei)

1.9.  Jihyun Lee (LG)

1.10.  Carl Kain (Noblis)

1.11.  Lee Armstrong (US DoT)

2.  Meeting call to order at 10:02am.

3.  Chair reminder on meeting and patent policy.

4.  Agenda 11-11/1105r4.

4.1.  Unanimously approved.

5.  Call for proposal in Okinawa session

5.1.  Presenter must e-mail title and DCN to the chair and reflector by Sep. 9th.

5.2.  Presentation materials must be uploaded to the document server by Sep. 19th.

5.3.  Refer the e-mail on reflector transmitted by the chair on Jul. 23rd.

6.  Plan for next week

6.1.  Technical presentation by George Cherian.

7.  Adjourn at 10:17am


Tuesday September 13, 2011

10:00am EDT

1.  Attendee

1.1.  Hiroshi Mano (ROOT)

1.2.  Marc Emmelmann (Fraunhofer FOKUS)

1.3.  Tom Siep (CSR)

1.4.  Hitoshi Morioka (ROOT)

1.5.  Hiroki Nakano (Trans New Technology)

1.6.  George Cherian (Qualcomm)

1.7.  Katsuo Yunoki (KDDI R&D Laboratories)

1.8.  Ping Fang (Huawei)

1.9.  Carl Kain (Noblis)

1.10.  Lee Armstrong (US DoT)

1.11.  Bery Press (Washington Core)

1.12.  Gabor Bajko (Nokia)

1.13.  Jouni Malinen (Qualcomm)

1.14.  Santosh Abraham (Qualcomm)

2.  Meeting call to order at 10:01am.

3.  Chair reminder on meeting and patent policy.

4.  Agenda 11-11/1105r5.

4.1.  Unanimously approved.

5.  11-11/1160r1 Fast Re-authentication by George Cherian

5.1.  Tom: PAR says Fast “Initial” Authentication, not re-authentication.

5.2.  George: The term “re-authentication” is used in different context in EAP-RP.
It can be used for “Initial” authentication in IEEE802.11 context.

5.3.  Hitoshi: How long interval is allowed in EAP-RP?

5.4.  George: Root key lifetime is not specified in RFC. It depends on operators’ policy.
Full authentication may be required once a month, 3 months or 1 year…

6.  11-11/1154r2 Use Cases for FILS by Tom Siep

7.  Call for general submission in Okinawa session

7.1.  Presenter should send request to the chair by 17th September.

8.  Adjourn at 11:02am

Submission page 1 Hitoshi Morioka, ROOT