802.1x What it is, How it’s broken, and How to fix it.

Slides:



Advertisements
Similar presentations
Inter WISP WLAN roaming
Advertisements

Authentication.
Doc.: IEEE /178 Submission July 2000 A. Prasad, A. Raji Lucent TechnologiesSlide 1 A Proposal for IEEE e Security IEEE Task Group.
Encrypting Wireless Data with VPN Techniques
Network Security.
Wireless Fidelity.  Short for wireless fidelity.  It is a wireless technology that uses radio frequency to transmit data through the air.  Wi-Fi is.
Wireless LAN  Setup & Optimizing Wireless Client in Linux  Hacking and Cracking Wireless LAN  Setup Host Based AP ( hostap ) in Linux & freeBSD  Securing.
Doc.: IEEE /275 Submission September 2000 David Halasz, Cisco Systems, Inc.Slide 1 IEEE 802.1X for IEEE David Halasz, Stuart Norman, Glen.
無線區域網路安全 Wireless LAN Security. 2 Outline  Wireless LAN – b  Security Mechanisms in b  Security Problems in b  Solutions for b.
Network Access and 802.1X Klaas Wierenga SURFnet
1 © NOKIA MitM.PPT/ 6/2/2015 / Kaisa Nyberg (NRC/MNW), N.Asokan (NRC/COM) The Insecurity of Tunnelled Authentication Protocols N. ASOKAN, VALTTERI NIEMI,
Simple ways to secure Wireless Computers Jay Ferron, ADMT, CISM, CISSP, MCSE, MCSBA, MCT, NSA-IAM, TCI.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
MITP | Master of Information Technology Program Securing Wireless LAN using Cisco-based technology Campus Crew Study Group Paul Matijevic Ed McCulloch.
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
802.1x EAP Authentication Protocols
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
Protected Extensible Authentication Protocol
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
WLAN Security:PEAP Sunanda Kandimalla. Intoduction The primary goals of any security setup for WLANs should include: 1. Access control and mutual authentication,
Master Thesis Proposal By Nirmala Bulusu Advisor – Dr. Edward Chow Implementation of Protected Extensible Protocol (PEAP) – An IEEE 802.1x wireless LAN.
Wi-Fi the Standard and Security. What is Wi-Fi? Short for wireless fidelity. It is a wireless technology that uses radio frequency to transmit.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—3-1 Wireless LANs Understanding WLAN Security.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
Demonstration of Wireless Insecurities Presented by: Jason Wylie, CISM, CISSP.
PKI Network Authentication Dartmouth Applications Robert Brentrup Educause/Dartmouth PKI Summit July 27, 2005.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
Wireless LAN Security Yen-Cheng Chen Department of Information Management National Chi Nan University
EAP Overview (Extensible Authentication Protocol) Team Golmaal: Vaibhav Sharma Vineet Banga Manender Verma Lovejit Sandhu Abizar Attar.
WLAN What is WLAN? Physical vs. Wireless LAN
Windows 2003 and 802.1x Secure Wireless Deployments.
VPN Wireless Security at Penn State Rich Cropp Senior Systems Engineer Information Technology Services The Pennsylvania State University © All rights.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 1 ver.2 Module 7 City College.
Wireless Security Techniques: An Overview Bhagyavati Wayne C. Summers Anthony DeJoie Columbus State University Columbus State University Telcordia Technologies,
WIRELESS LAN SECURITY Using
Wireless Networking.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Wireless Security Beyond WEP. Wireless Security Privacy Authorization (access control) Data Integrity (checksum, anti-tampering)
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
Wireless standards Unit objective Compare and contrast different wireless standards Install and configure a wireless network Implement appropriate wireless.
Securing your wireless LAN Paul DeBeasi VP Marketing
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
Wireless Network Security Presented by: Prabhakaran Theertharaman.
Wireless Networking & Security Greg Stabler Spencer Smith.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
Lecture 24 Wireless Network Security
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Chapter 14 Network Encryption
Wireless security Wi–Fi (802.11) Security
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
 Router › A router is the networking device that integrates two or more networks together, while controlling the data traffic over the entire network.
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Wireless Security.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
Wireless Security - Encryption Joel Jaeggli For AIT Wireless and Security Workshop.
Authentication and handoff protocols for wireless mesh networks
CompTIA Security+ Study Guide (SY0-401)
Wireless Protocols WEP, WPA & WPA2.
Wireless Networking Chapter 23.
Wireless LAN Security 4.3 Wireless LAN Security.
WLAN Security Antti Miettinen.
Antti Miettinen (modified by JJ)
Presentation transcript:

802.1x What it is, How it’s broken, and How to fix it. Bruce Potter The Shmoo Group gdead@shmoo.com Practitioner, not researcher Talk will focus on the operational impact of 802.1x, not the low level technical breakdown.

Drive 12 miles to work in Northern VA, much of it through un-developed land. In Sept, there were 12 AP’s. In May there were 50.

Why Wireless? No cable plant Enhanced mobility Ad hoc relationships Lower cost (initially… TCO may be higher) Rapid deployment Enhanced mobility Ad hoc relationships Many different requirements talk about TCO

Why Not Wireless No physical security Low throughput Unregulated, noisy bands Snooping raw packets is trivial

802.11, 802.11b, etc. IEEE standard – based on well known Ethernet standards 802.11 – FHSS or DSSS, WEP, 2.4 GHz, Infrastructure (BSS) or Ad-Hoc (iBSS) Limited to 2Mb/s due to FCC limits on dwell times per frequency hop 802.11b – DSSS only, WEP, 2.4 GHz, Infrastructure or Ad-Hoc Up to 11Mb/s Also known as Wi-Fi 802.11a and 802.11g

An Association Associations are a basic part of 802.11 Client Requests authentication AP responds with auth type (Open/WEP) Authentication is performed If successful, then Association is requested and granted SSID is sent in the clear, so not advertising SSID is NOT a valid security mechanism

General Principles Deal with the basics Integrity Protecting your packets from modification by other parties Confidentiality Keeping eavesdroppers within range from gaining useful information Keeping unauthorized users off the network Free Internet! Risks to both internal and external network Availability Low level DoS is hard to prevent Like any other environment, there are no silver bullets

Current Security Practices WEP –Wired Equivalent Privacy Link Level Very Broken Firewalls/MAC Filtering Reactionary – IDS/Active Portal Higher level protocols

WEP In a Nutshell 40 bits of security == 64 bits of marketing spam. Not just encryption, also rudimentary authentication of AP’s and clients.

Thoughts on WEP Key management beyond a handful of people is impossible Too much trust Difficult administration Key lifetime can get very short in an enterprise No authentication for management frames No per packet auth False Advertising!!!

What is Lacking? Scalability Protection for all parties Many clients Large networks Protection for all parties Eliminate invalid trust assumptions

802.1x Port based authentication for all IEEE 802 networks (layer 2 authentication) Originally for Campus networks Extended for wireless Allows for unified AAA services Provides means for key transport NOT A WIRELESS PROTOCOL!!! Does not specify means for key transport

May not be Access Point… Originally it was a wired switch.

Pre-Authentication State

Post-Authentication State

EAP Extensible Authentication Protocol Originally designed for PPP Shoehorned into 802.1x Switch/Access point is a pass through for EAP traffic. New authentication mechanisms do not require infrastructure upgrades LEAP – Cisco’s Lightweight EAP Password based and (relatively) widely available De facto mechanism between AS and AServ is RADIUS

EAP Methods EAP-TLS: Uses certs! If implemented properly, solves many problems TTLS – Tunneled TLS. Allows encapsulation of other auth mechanisms. “machine” auth’d by TLS, person by the tunneled protocol PEAP – IETF Draft Like TTLS but with another EAP method encapsulated TLS/TTLS and others require certs We all have a PKI setup, right? and use it properly and regularly?

What’s Right Protection of the infrastructure Authentication mechanism can change as needed address flaws in existing wireless security Lightweight No encapsulation, no per packet overhead… simply periodic authentication transactions

What’s Right In controlled environment, risks can be mitigated by higher level protocols VPN/SSL/SSH NOTE: exchange of WEP key material is not part of 802.1x specification Remember: designed for wired campus networks

What’s Right Association happens BEFORE 802.1x transaction. Good: If 802.1x session is protected by default WEP key then the attacker must first compromise the WEP key to make use of 802.1x vulns Bad: Key management anyone? Just how does the default key get there?

What’s Wrong www.missl.cs.umd.edu/wireless/1x.pdf First Open source supplicant First holes in 802.1x One way authentication Less of a concern in LAN environment Traffic Interception Session Highjacking

What’s Wrong – Technical One way Authentication Gateway authenticates the client Client has no explicit means to authenticate the Gateway Rouge gateways put client at risk Remember – the loudest access point wins Still no Authentication of management frames (assoc/deassoc/beacons/etc…) Some EAP methods provide mutual authentication… but it’s not a requirement.

What’s Wrong - Technical MITM Send “Authentication Successful” to client Client associates with malicious AP Hijacking Send deassociation message to client… AP is in the dark Change MAC to client and have live connection

What’s Wrong – Technical RADIUS uses shared secret with the Authenticator Same issue as WEP, but on a more reasonable scale Authentication after association presents roaming problems Authentication takes a non-trivial amount of time… can disrupt data in transit Failure of RADIUS server == failure of network Many AP implementations don’t allow multiple RADIUS servers Most RADIUS server failover is non-transparent

What’s Wrong – touchy feely They forgot about the client (trust assumptions) Everyone is ask risk Everyone is a threat Lack of physical security requires encrypted channel to secure 802.1x Wired “port” is not the same as wireless “port” Protocol designed to not require hardware replacement Leads to less than stellar solution, esp WRT authentication of management frames.

What’s Wrong – touchy feely Extensibility leads to complexity Complexity leads to mistakes in implementation Read the MS Guide on create EAP methods as an example. Multivendor support is difficult Using a shoehorn to force protocols to work together leads to problems

Why Did it Go Wrong? 802.1x – Designed for Campus networks EAP – Designed for PPP NEITHER designed with wireless threat model in mind Lesson: Don’t apply old protocols to new problems without understanding the risk.

Where Are We Today? Several 802.1x implementations available Windows XP (not PocketPC 2002) Open1x.org EAP implementations Windows IAS FreeRADIUS – MD5 and TLS Cisco Other RADIUS servers NOTE: highest risk applications don’t have 802.1x – Pocket PC2k

Where Are We Today? 802.1x capable Access Points Cisco Lucent RG1000/RG1100 can be hacked with AP500 firmware to become 1x capable Some drawbacks OS authenticator from open1x.org others

What’s Next Integration of existing solutions to “raise the bar” Limited 802.1x implementations 802.11i (Task Group I – Security) On track… the right track Mutual auth, per packet auth 802.1x a part of

What’s Next WEP has the right idea End to End Solutions ala SSL, SSH, IPSec Not likely PocketPC2k2 doesn’t have a robust cert infrastrucuture.

Temporal Key Integrity Protocol Fast Packet Keying Packet MAC Dynamic Rekeying Key distribution via 802.1x 3Q product deployment Still RC4 based to be backward compatible AES with 802.1x keying in the distant future

Questions http://www.shmoo.com/1x/