Chapter 07 Designing and Implementing Security for WLAN

Slides:



Advertisements
Similar presentations
CN8816: Network Security 1 Security in Wireless LAN i Open System Authentication Security Wired Equivalent Privacy (WEP) Robust Security Network.
Advertisements

IEEE i IT443 Broadband Communications Philip MacCabe October 5, 2005
CSE  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Understanding and Achieving Next-Generation Wireless Security Motorola, Inc James Mateicka.
Wireless Security Ryan Hayles Jonathan Hawes. Introduction  WEP –Protocol Basics –Vulnerability –Attacks –Video  WPA –Overview –Key Hierarchy –Encryption/Decryption.
無線區域網路安全 Wireless LAN Security. 2 Outline  Wireless LAN – b  Security Mechanisms in b  Security Problems in b  Solutions for b.
Implementing Wireless LAN Security
Security+ Guide to Network Security Fundamentals, Third Edition
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
MITP | Master of Information Technology Program Securing Wireless LAN using Cisco-based technology Campus Crew Study Group Paul Matijevic Ed McCulloch.
Wired Equivalent Privacy (WEP)
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University.
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
IEEE Wireless Local Area Networks (WLAN’s).
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
WPA2 By Winway Pang. Overview  What is WPA2?  Wi-Fi Protected Access 2  Introduced September 2004  Two Versions  Enterprise – Server Authentication.
Marwan Al-Namari Week 10. RTS: Ready-to-Send. CTS: Clear-to- Send. ACK: Acknowledgment.NAV: network allocation vector (channel access, expected time to.
WLAN security S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents WEP (Wired Equivalent Privacy) No key management Authentication.
Wireless Security Issues David E. Hudak, Ph.D. Senior Software Architect Karlnet, Inc.
IWD2243 Wireless & Mobile Security Chapter 3 : Wireless LAN Security Prepared by : Zuraidy Adnan, FITM UNISEL1.
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
WLAN What is WLAN? Physical vs. Wireless LAN
Mobile and Wireless Communication Security By Jason Gratto.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
Wireless and Security CSCI 5857: Encoding and Encryption.
Wireless Networking.
Certified Wireless Network Administrator (CWNA) PW0-105 Chapter Network Security Architecture.
Chapter Network Security Architecture Security Basics Legacy security Robust Security Segmentation Infrastructure Security VPN.
Wireless Network Security Dr. John P. Abraham Professor UTPA.
Wireless Security Beyond WEP. Wireless Security Privacy Authorization (access control) Data Integrity (checksum, anti-tampering)
COEN 350 Mobile Security. Wireless Security Wireless offers additional challenges: Physical media can easily be sniffed. War Driving Legal? U.S. federal.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
IEEE i WPA2. IEEE i (WPA2) IEEE i, is an amendment to the standard specifying security mechanisms for wireless networks. The.
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
WEP Protocol Weaknesses and Vulnerabilities
WEP AND WPA by Kunmun Garabadu. Wireless LAN Hot Spot : Hotspot is a readily available wireless connection.  Access Point : It serves as the communication.
Wireless LAN Security. Security Basics Three basic tools – Hash function. SHA-1, SHA-2, MD5… – Block Cipher. AES, RC4,… – Public key / Private key. RSA.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
WLANs & Security Standards (802.11) b - up to 11 Mbps, several hundred feet g - up to 54 Mbps, backward compatible, same frequency a.
.  TJX used WEP security  They lost 45 million customer records  They settled the lawsuits for $40.9 million.
IEEE i Aniss Zakaria Survey Fall 2004 Friday, Dec 3, 2004
Lecture 24 Wireless Network Security
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Csci388 Wireless and Mobile Security – Key Hierarchies for WPA and RSN
WLAN Security Condensed Version. First generation wireless security Many WLANs used the Service Set Identifier (SSID) as a basic form of security. Some.
Wireless security Wi–Fi (802.11) Security
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
802.11b Security CSEP 590 TU Osama Mazahir. Introduction Packets are sent out into the air for anyone to receive Eavesdropping is a much larger concern.
Wireless Network Security CSIS 5857: Encoding and Encryption.
Erik Nicholson COSC 352 March 2, WPA Wi-Fi Protected Access New security standard adopted by Wi-Fi Alliance consortium Ensures compliance with different.
EECS  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Port Based Network Access Control
© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0— © 2003, Cisco Systems, Inc. All rights reserved.
Wireless Security - Encryption Joel Jaeggli For AIT Wireless and Security Workshop.
History and Implementation of the IEEE 802 Security Architecture
Authentication and handoff protocols for wireless mesh networks
Wireless Protocols WEP, WPA & WPA2.
WEP & WPA Mandy Kershishnik.
Wireless LAN Security 4.3 Wireless LAN Security.
IEEE i Dohwan Kim.
Wireless Network Security
Presentation transcript:

Chapter 07 Designing and Implementing Security for WLAN Faculty of Computer Sciense and Engineering Chapter 07 Designing and Implementing Security for WLAN

Objectives Identify and describe the strengths, weaknesses, appropriate uses and implementation of IEEE 802.11 security-related items - Pre-RSNA and RSNA Security - AAA Security Components Describe, explain, and illustrate the appropriate applications for the following client-related wireless security solutions - Role-Based Access Control - Profile-Based Firewalls - Captive Portals/Web Authentication Describe, explain, and illustrate the appropriate applications for the following WLAN system security and management features - Rogue AP - SNMPv3/HTTPS/SSH2

Implementing IEEE 802.11 Security

Pre-RSNA Security Pre-Robust security network association - Open System Authentication - Shared Key Authentication - Wired Equivalent Privacy

Open System Authentication - is a null authentication in that any client requesting authentication is approved as long as AP is configured for Open System authentication. - includes the transfer of 2 frames.

Shared Key Authentication - relies on a specific set of security technologies (WEP and RC4). - uses a secret key that is shared by requestor and responder.

Wired Equivalent Privacy The original IEEE 802.11 standard specified the WEP protocol for the purpose of providing security that was comparable to that of wired networks. WEP-40 uses a 40-bit key for encryption. (64 bits) WEP-104 uses a 104-bit key for encryption. (128 bits) Both uses 24 bits IV (Initialization Vector): different key for different frame Both uses RC4 as the encryption algorithm (stream cipher). Encryption: Transforming plaintext to ciphertext Decryption: Transforming ciphertext to plaintext Cipher: An encryption algorithm. Given a key that is used to encrypt and decrypt messages

Wired Equivalent Privacy Symmetric encryption

Encryption and Decryption process

Encryption and Decryption process WEP encryption process

Robust Security Network Association RSNA implements security technologies in such a way that allows them to evolve as security needs change. This is accomplished through support for the Extensible Authentication Protocol. - IEEE 802.11, Clause 8 (previously IEEE 802.11i) - TKIP and RC4 - CCMP and AES - IEEE 802.1X - Preshared Keys - Certificates and PACs - The four-way handshake - Key Hierarchies - Transition Security Network

IEEE 802.11, Clause 8 – 802.11i Robust security network association An authentication or association between 2 stations that includes the 4-way handshake. Robust security network (RSN) A WLAN that allows for the creation of RSNAs only. Four-way handshake An IEEE 802.11 pairwise key management protocol that confirms mutual possession of a pairwise master key between two parties and distributes a group temporal key. Pairwise master key (PMK) A key derived from an extensible authentication protocol (EAP) method or obtained directly from a pre-shared key (PSK). Group temporal key (GTK) A key used to protect multicast and broadcast traffic in WLANs.

IEEE 802.11, Clause 8 The concepts covered in this clause include both authentication and confidentiality. Entity Authentication is provided by either Open System authentication or Shared Key authentication. Confidentiality is provided through the use of WEP (pre-RSNA), TKIP (RSNA), or CCMP (RSNA). An RSN is a WLAN that will only allow for RSNAs. These RSNAs are established through a 4-way handshake that results in the generation of the PMK and the provision of the GTK to the authenticating STA. Once this RSNA is set up, the STA may communicate on the WLAN with confidentiality and integrity.

TKIP and RC4 The temporal key integrity protocol (TKIP) uses RC4 encryption like WEP; however, the weaknesses of WEP are addressed by enlarging the IV pool (it is 48 bits instead of 24 bits) and using true 128-bit static keys. TKIP also implements a stronger integrity checking algorithm in the Message Integrity Check (MIC) algorithm instead of the ICV (CRC-32) used with WEP. The Wi-Fi Alliance released a certification known as Wi-Fi WPA before the IEEE 802.11i amendment was ratified in 2004. WPA is essentially the TKIP/RC4 implementation documented in Clause 8 of IEEE 802.11 as amended.

Problem with CRC-32 in WEP MIC Message Integrity Check Designed to prevent attackers from capturing, altering, and resending data packets Problem with CRC-32 in WEP

CCMP and AES Clause 8 stipulates a default encryption method called counter mode with cipher block chaining-message authentication code. CCMP uses the Advanced Encryption Standard instead of RC4. CCMP/AES utilizes a 128-bit encryption key and actually encrypts in 128-bit blocks. The protocol uses an 8-byte MIC for integrity checks that is stronger than that used in the TKIP implementation.

AES Time needed to break AES

802.1X Authentication & Key Management The IEEE 802.1X standard specifies port-based authentication. In order for a port to be used for normal network operations, the device connected to the port must be authenticated. An AP implements an authenticator PAE (port access entity) role, and an associating STA implements a supplicant PAE role. These roles play a part in the IEEE 802.1X framework. Both wired and wireless LANs can use IEEE 802.1X, and they both include the following concepts: - Authentication roles - Controlled and uncontrolled ports - IEEE 802.1X generic authentication flow framework

802.1X Authentication & Key Management Authentication Roles The three authentication roles specified in IEEE 802.1X are the supplicant, the authenticator, and the authentication server (AS). In a WLAN: The supplicant is the STA desiring to be authenticated. The authenticator is usually an AP. The AS is most frequently a RADIUS server installed on a network. Controlled and Uncontrolled Ports Two ports are defined by the IEEE 802.1X standard for the purpose of authenticating connected systems. The controlled port is enabled for use once authentication and key management exchange has occurred successfully.

802.1X Authentication & Key Management IEEE 802.1X Generic Authentication Flow Framework allows for the use of many different authentication types. These types are known as extensible authentication protocol (EAP)

802.1X Authentication & Key Management IEEE 802.1X

Preshared Key/Passphrase Authentication When a preshared key (PSK) is used, the IEEE standard specifies the following operations be carried out: - STAs discover the AP’s security policies through passive monitoring of the Beacon frames or through active probing. The pairwise master key (PMK) is set to the value of the PSK. - The four-way handshake is performed - The authenticator sends the GTK to the supplicant for use in decryption of multicast and broadcast frames. PSK authentication is also called passphrase authentication. This is because the standard configuration interfaces allow typing a passphrase that is converted to the PSK.

The 4-Way Handshake The 4-way handshake occurs after the determination of the PMK. It is used to establish the temporary or transient keys with the AP. Number used once (nonce)

Key Hierarchies The commonly referenced key types are the pairwise master key (PMK), the pairwise transient key (PTK), and the group temporal key (GTK). The PMK is the highest key in the IEEE 802.11 hierarchy. This key is used to generate the other keys known as transient or temporal keys. The PMK is used to generate the PTK keys that are actually used to encrypt the data traveling across network. The GTK is used to secure multicast and broadcast frames and may be derived randomly or from a GMK.

Certificates and PACs A certificate can be defined as a digitally signed statement that contains information about an entity and the entity’s public key. Certificates may be generated internally if the generating organization has implemented a public key infrastructure or they may be acquired externally through third-party organizations. One particular EAP type, EAP-FAST, uses a shared secret known as the protected access credential (PAC). The PAC is the combination of the PAC-Key (shared secret), an opaque element, and other PAC data. The PAC is used to create a tunnel that is then used to perform the actual authentication.

Certificates

Transition Security Network If a WLAN allows the creation of pre-RSNA and RSNA security associations at the same time, it is said to be a transition security network (TSN). TSN supports both the older WEP technologies and the newer TKIP and CCMP solutions at the same time. Because of this, TSN networks are not considered secure. WEP attack methods work against a TSN as if it did not support RSNA security associations. The unicast data being transferred between authenticator and supplicant using an RSNA is still protected.

AAA Security Components - EAP types - Remote authentication dial-in user service (RADIUS) - LDAP databases - Local authentication databases

EAP Types The IEEE 802.11 standard as amended does not dictate the EAP type that should be used, but it does suggest that an EAP type supporting mutual authentication should be used in order to implement an RSNA. EAP stands for extensible authentication protocol. Different EAP types are used for authentication. The fundamental concept of EAP is extensible in that the authentication can be handled in many ways. Key factors to consider when selecting an EAP type are the need for certificates, whether mutual authentication is provided, and if the protection of authentication credentials is strong.

RADIUS The remote authentication dial-in user service is implemented as the AS protocol.

LDAP-Compliant/Compatible & Local Databases Many RADIUS servers support connectivity with an LDAP-compatible database for user authentication. Novell eDirectory and Microsoft Active Directory are both LDAP-compliant databases. It is common to support a limited number of users in the internal database of the RADIUS server. Many can only support a few hundred users, and some can support thousands. Few RADIUS servers scale as well as a dedicated directory service, which can handle hundreds of thousands of users.

Wi-Fi Protected Access (WPA) Subset of 802.11i that addresses encryption and authentication Temporal Key Integrity Protocol (TKIP): Replaces WEP’s encryption key with 128-bit per-packet key Message Integrity Check (MIC): Designed to prevent attackers from capturing, altering, and resending data packets Authentication accomplished via IEEE 802.1x or pre-shared key (PSK) technology

Wi-Fi Protected Access 2 (WPA2) Second generation of WPA security - Based on final IEEE 802.11i standard - Uses AES for data encryption - Supports IEEE 802.1x authentication or PSK technology - Allows both AES and TKIP clients to operate in same WLAN

Summary of Wireless Security Solutions Wi-Fi Alliance categorizes WPA and WPA2 by modes that apply to personal use and to larger enterprises Security timeline

Summary of Wireless Security Solutions Wi-Fi modes Wireless security solutions

WLAN Client Security Solutions

Role-Based Access Control Role-based access control (RBAC) provides the ability to restrict network access to authorized users. It can granularly limit access to portions of the network or specific services on the network. RBAC involves users, roles, and permissions. Roles as resembling groups in traditional network Users as resembling user accounts in traditional network. Permissions include firewall-type filters, Layer 2 permissions, Layer 3 permissions, and even bandwidth-limiting permissions. We can create users and assign them a role and then grant permissions to the role rather than the individual users.

Profile-Based firewalls Profile-based firewalls are firewalls that can enforce differing filtering rules based on profiles built from usernames, groupnames. WLAN switches may support the concept of a profile-based firewall, and the rules for the firewall may complement those enforced by RBAC. If the user logs on as a member of a filtered group, the user may not be able to pass specified types of traffic. When logged on as a member of another group, the user may have no limitations imposed by the profile-based firewall.

Captive Portals/Web Authentication - Web page that wireless users are forced to visit before they are granted access to Internet - Used in one of the following ways: + Notify users of wireless policies and rules + Advertise to users specific services or products + Authenticate users against a RADIUS server - Often used in public hotspots

WLAN System Security and Management

HTTP traffic is transmitted as clear text.

SNMPv3/HTTPS/SSH2 HTTPS should always be used when a web-based interface is used to manage APs. HTTPS uses SSL (Secure Sockets Layer) and requires that a certificate be made available to the server. SSL is a Layer 7 encryption technology. Another Layer 7 encryption solution is SSH (Secure SHell). SSH2 is considered secure at this time. SSH2 is usually used to provide command-line interface (CLI) access to the managed device. The Simple Network Management Protocol(SNMP)is a standard solution for centrally monitoring and managing network devices. Version 3 has added authentication and privacy controls to help protect the management information passed on network.

Rogue AP A rogue AP can be defined as any AP that is operating in our “owned” space but that has not been authorized by us. Preventing Rogue APs - Disabling unused Ethernet ports. - Using port security on switches. - State clearly in our acceptable use policy that users cannot install APs. - Implement network access control technology. - Implement enterprise-capable WLAN solutions that automatically detect and report rogue APs and graphically show their locations.