Wireless LAN Security Mandy Andress ArcSec Technologies Black Hat Briefings July 12, 2001.

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

Guide to Network Defense and Countermeasures Second Edition
LANs and WANs. 2 Chapter Contents Section A: Network Building Blocks Section B: Wired Networks Section C: Wireless Networks Section D: Using LANs Section.
Presentation viewer : _ Mahmoud matter. Ahmed alasy Dr: Rasha Atallah.
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Wireless Technologies Networking for Home and Small Businesses – Chapter.
Wireless Local Area Networks By Edmund Gean August 2, 2000.
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
December 17, Wi-Fi Mark Faggiano GBA 576. December 17, Purpose of the Project  I hear Wi-Fi, WLAN, everywhere  What does it all.
Wireless Networking (WLAN) Reina Trujillo Nathan Ekenberg.
Wi-Fi the Standard and Security. What is Wi-Fi? Short for wireless fidelity. It is a wireless technology that uses radio frequency to transmit.
Marwan Al-Namari Week 10. RTS: Ready-to-Send. CTS: Clear-to- Send. ACK: Acknowledgment.NAV: network allocation vector (channel access, expected time to.
Wireless LAN Provides network connectivity over wireless media An Access Point (AP) is installed to act as Bridge between Wireless and Wired Network.
WLAN b a Johan Montelius
Installing and Maintaining ISA Server. Planning an ISA Server Deployment Understand the current network infrastructure Review company security policies.
Demonstration of Wireless Insecurities Presented by: Jason Wylie, CISM, CISSP.
Wireless LAN Security Yen-Cheng Chen Department of Information Management National Chi Nan University
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
Wireless Networks: Personal, Local, Metropolitan Speedups, Security, Power John Schafer University of Michigan Ann Arbor CSG 10 May 2000
IE 419/519 Wireless Networks Lecture Notes #4 IEEE Wireless LAN Standard Part #2.
Wireless Security Techniques: An Overview Bhagyavati Wayne C. Summers Anthony DeJoie Columbus State University Columbus State University Telcordia Technologies,
Access Control and Site Security (Part 2) (January 28, 2015) © Abdou Illia – Spring 2015.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
ECE 578: COMPUTER NETWORK AND SECURITY
Computer Network Forensics Lecture 5 - Wireless © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
1 Chapter Overview Wireless Technologies Wireless Security.
Wireless LANs Ethernet and all its enhancements is the major wired LAN architecture today Beyond Ethernet, the fastest growing LAN architecture is wireless.
Mobile and Wireless Communication Security By Jason Gratto.
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
WIRELESS LAN SECURITY Using
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 50 – The Wireless LAN.
Overview of Wireless LANs Use wireless transmission medium Issues of high prices, low data rates, occupational safety concerns, & licensing requirements.
Chapter 13 – Network Security
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Chapter 8 Connecting Wirelessly
Communication System Design 2002, KTH1 Security And Availability For Wireless Communication Organization Post & Telestyrelse : Anders Rafting Coach : Lars.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Center of Excellence Wireless and Information Technology CEWIT 2003 Keys To Secure Your Wireless Enterprise Toby Weiss SVP, eTrust Computer Associates.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Wireless Insecurity By: No’eau Kamakani Robert Whitmire.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
PRESENTATION ON WI-FI TECHNOLOGY
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
A PRESENTATION ON “Wireless Networks”
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Wireless Networking & Security Greg Stabler Spencer Smith.
Data and Computer Communications Ninth Edition by William Stallings Chapter 17 – Wireless LANs.
SECURE WIRELESS NETWORK IN IŞIK UNIVERSITY ŞİLE CAMPUS.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
Wireless? A wireless LAN or WLAN is a wireless local area network that uses radio waves as its carrier. The last link with the users is wireless, to give.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
The University of Bolton School of Business & Creative Technologies Wireless Networks - Security 1.
Lecture # 13 Computer Communication & Networks. Today’s Menu ↗Last Lecture Review ↗Wireless LANs ↗Introduction ↗Flavors of Wireless LANs ↗CSMA/CA Wireless.
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
Microsoft ISA Server 2000 Presented by Ricardo Diaz Ryan Fansa.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
Security in Wireless Network MSIT 526 Cuong Quoc Le December 15, 2005.
Cisco Discovery Home and Small Business Networking Chapter 7 – Wireless Networking Jeopardy Review v1.1 Darren Shaver Kubasaki High School – Okinawa,
COMPUTER FUNDAMENTALS David Samuel Bhatti
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Wireless Security.
Instructor Materials Chapter 6 Building a Home Network
SECURE WIRELESS NETWORK IN IŞIK UNIVERSITY ŞİLE CAMPUS
Chapter 4: Wireless LANs
Wireless Networking Chapter 23.
Mandy Andress ArcSec Technologies
Presentation transcript:

Wireless LAN Security Mandy Andress ArcSec Technologies Black Hat Briefings July 12, 2001

Agenda Uses Benefits Standards Functionality Security Issues Solutions and Implementations

Uses Key drivers are mobility and accessibility Easily change work locations in the office Internet access at airports, cafes, conferences, etc.

Benefits Increased productivity – Improved collaboration – No need to reconnect to the network – Ability to work in more areas Reduced costs – No need to wire hard-to-reach areas

Standards IEEE IEEE b IEEE a IEEE e HiperLAN/2 Interoperability

Published in June GHz operating frequency 1 to 2 Mbps throughput Can choose between frequency hopping or direct sequence spread modulation

802.11b Published in late 1999 as supplement to Still operates in 2.4GHz band Data rates can be as high as 11 Mbps Only direct sequence modulation is specified Most widely deployed today

802.11a Also published in late 1999 as a supplement to Operates in 5GHz band (less RF interference than 2.4GHz range) Users Orthogonal Frequency Division Multiplexing (OFDM) Supports data rates up to 54 Mbps Currently no products available, expected in fourth quarter

802.11e Currently under development Working to improve security issues Extensions to MAC layer, longer keys, and key management systems Adds 128-bit AES encryption

HiperLAN/2 Development led by the European Telecommunications Standards Institute (ETSI) Operates in the 5 GHz range, uses OFDM technology, and support data rates over 50Mbps like a

Interoperability a and b work on different frequencies, so little chance for interoperability Can coexist in one network HiperLAN/2 is not interoperable with a or b

Functionality Basic Configuration WLAN Communication WLAN Packet Structure

Basic Configuration

Communication CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) instead of Collision Detection WLAN adapter cannot send and receive traffic at the same time on the same channel Hidden Node Problem Four-Way Handshake

Hidden Node Problem

Four-Way Handshake SourceDestination RTS – Request to Send CTS – Clear to Send DATA ACK

OSI Model Application Presentation Session Transport Network Data Link Physical b MAC header PLCP header

Ethernet Packet Structure Graphic Source: Network Computing Magazine August 7, byte header 2 addresses

Packet Structure Graphic Source: Network Computing Magazine August 7, byte header 4 addresses

Ethernet Physical Layer Packet Structure 8 byte header (Preamble) Graphic Source: Network Computing Magazine August 7, 2000

Physical Layer Packet Structure Graphic Source: Network Computing Magazine August 7, byte header (PLCP, Physical Layer Convergence Protocol) Always transferred at 1 Mbps

Security Issues and Solutions Sniffing and War Driving Rogue Networks Policy Management MAC Address SSID WEP

War Driving Default installation allow any wireless NIC to access the network Drive around (or walk) and gain access to wireless networks Provides direct access behind the firewall Heard reports of an 8 mile range using a 24dB gain parabolic dish antenna.

Rogue Networks Network users often set up rogue wireless LANs to simplify their lives Rarely implement security measures Network is vulnerable to War Driving and sniffing and you may not even know it

Policy Management Access is binary Full network access or no network access Need means of identifying and enforcing access policies

MAC Address Can control access by allowing only defined MAC addresses to connect to the network This address can be spoofed Must compile, maintain, and distribute a list of valid MAC addresses to each access point Not a valid solution for public applications

Service Set ID (SSID) SSID is the network name for a wireless network WLAN products common defaults: “101” for 3COM and “tsunami” for Cisco Can be required to specifically request the access point by name (lets SSID act as a password) The more people that know the SSID, the higher the likelihood it will be misused. Changing the SSID requires communicating the change to all users of the network

Wired Equivalent Privacy (WEP) Designed to be computationally efficient, self- synchronizing, and exportable Vulnerable to attack – Passive attacks to decrypt traffic based on statistical analysis – Active attacks to inject new traffic from unauthorized mobile stations, based on known plaintext – Dictionary-building attack that, after analysis of a day’s worth of traffic, allows real-time automated decryption of all traffic All users of a given access point share the same encryption key Data headers remain unencrypted so anyone can see the source and destination of the data stream

WLAN Implementations Varies due to organization size and security concerns Current technology not ideal for large-scale deployment and management Will discuss a few tricks that can help the process and a few technologies under development to ease enterprise deployments

Basic WLAN Great for small (5-10 users) environments Use WEP (some vendors provide 128-bit proprietary solution) Only allow specific MAC addresses to access the network Rotate SSID and WEP keys every days No need to purchase additional hardware or software.

Basic WLAN Architecture

Secure LAN (SLAN) Intent to protect link between wireless client and (assumed) more secure wired network Similar to a VPN and provides server authentication, client authentication, data privacy, and integrity using per session and per user short life keys Simpler and more cost efficient than a VPN Cross-platform support and interoperability, not highly scaleable, though Supports Linux and Windows Open Source (slan.sourceforge.net)

SLAN Architecture

SLAN Steps 1. Client/Server Version Handshake 2. Diffie-Hellman Key Exchange 3. Server Authentication (public key fingerprint) 4. Client Authentication (optional) with PAM on Linux 5. IP Configuration – IP address pool and adjust routing table

SLAN Client SLAN Driver User Space Process Physical Driver Client Application ie Web Browser Plaintext Traffic Plaintext Traffic Encrypted Traffic Encrypted Traffic to SLAN Server Encrypted Traffic

Intermediate WLAN users Can use MAC addresses, WEP and rotate keys if you want. Some vendors have limited MAC storage ability SLAN also an option Another solution is to tunnel traffic through a VPN

Intermediate WLAN Architecture

VPN Provides a scaleable authentication and encryption solution Does require end user configuration and a strong knowledge of VPN technology Users must re-authenticate if roaming between VPN servers

VPN Architecture

Enterprise WLAN 100+ users Reconfiguring WEP keys not feasible Multiple access points and subnets Possible solutions include VLANs, VPNs, custom solutions, and 802.1x

VLANs Combine wireless networks on one VLAN segment, even geographically separated networks. Use 802.1Q VLAN tagging to create a wireless subnet and a VPN gateway for authentication and encryption

VLAN Architecture

Customized Gateway Georgia Institute of Technology Allows students with laptops to log on to the campus network Uses VLANs, IP Tables, and a Web browser No end user configuration required – User access a web site and enters a userid and password – Gateway runs specialized code authenticating the user with Kerberos and packet filtering with IPTables, adding the user’s IP address to the allowed list to provide network access

Gateway Architecture

802.1x General-purpose port based network access control mechanism for 802 technologies Based on AAA infrastructure (RADIUS) Also uses Extensible Authentication Protocol (EAP, RFC 2284) Can provide dynamic encryption key exchange, eliminating some of the issues with WEP Roaming is transparent to the end user

802.1x (cont) Could be implemented as early as Cisco Aironet 350 supports the draft standard. Microsoft includes support in Windows XP

802.1x Architecture

Third-Party Products NetMotion Wireless authenticates against a Windows domain and uses better encryption (3DES) than WEP. Also offers the ability to remotely disable a wireless network card’s connection. Fortress Wireless Link Layer Security (WLLS). Improves WEP and works with 802.1x. Enterasys provides proprietary RADIUS solution similar to 802.1x

Client Considerations Cannot forget client security Distributed Personal Firewalls Strong end user security policies and configurations Laptop Theft Controls

Conclusion Wireless LANs very useful and convenient, but current security state not ideal for sensitive environments. Cahners In-Stat group predicts the market for wireless LANs will be $2.2 billion in 2004, up from $771 million in Growing use and popularity require increased focus on security

Contact Information Presentation available for download at and