Authentication.

Slides:



Advertisements
Similar presentations
Inter WISP WLAN roaming
Advertisements

Doc.: IEEE /087 Submission May, 2000 Steven Gray, NOKIA Jyri Rinnemaa, Jouni Mikkonen Nokia Slide 1.
Encrypting Wireless Data with VPN Techniques
Internet Protocol Security (IP Sec)
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
Wireless LAN  Setup & Optimizing Wireless Client in Linux  Hacking and Cracking Wireless LAN  Setup Host Based AP ( hostap ) in Linux & freeBSD  Securing.
PEAP & EAP-TTLS 1.EAP-TLS Drawbacks 2.PEAP 3.EAP-TTLS 4.EAP-TTLS – Full Example 5.Security Issues 6.PEAP vs. EAP-TTLS 7.Other EAP methods 8.Summary.
TLS Introduction 14.2 TLS Record Protocol 14.3 TLS Handshake Protocol 14.4 Summary.
Rick Graziani PPP authentication protocols 1. Link establishment - (LCPs) 2. Authentication - Optional (LCPs) 3. Link quality determination.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
1 © NOKIA MitM.PPT/ 6/2/2015 / Kaisa Nyberg (NRC/MNW), N.Asokan (NRC/COM) The Insecurity of Tunnelled Authentication Protocols N. ASOKAN, VALTTERI NIEMI,
802.1x EAP Authentication Protocols
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication.
Ariel Eizenberg PPP Security Features Ariel Eizenberg
(Remote Access Security) AAA. 2 Authentication User named "flannery" dials into an access server that is configured with CHAP. The access server will.
Chapter 5 Secure LAN Switching.  MAC Address Flooding Causing CAM Overflow and Subsequent DOS and Traffic Analysis Attacks.
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
WLAN Security:PEAP Sunanda Kandimalla. Intoduction The primary goals of any security setup for WLANs should include: 1. Access control and mutual authentication,
Master Thesis Proposal By Nirmala Bulusu Advisor – Dr. Edward Chow Implementation of Protected Extensible Protocol (PEAP) – An IEEE 802.1x wireless LAN.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
RADIUS Server PAP & CHAP Protocols. Computer Security  In computer security, AAA protocol commonly stands for authentication, authorization and accounting.
Wireless LAN Security Yen-Cheng Chen Department of Information Management National Chi Nan University
EAP Overview (Extensible Authentication Protocol) Team Golmaal: Vaibhav Sharma Vineet Banga Manender Verma Lovejit Sandhu Abizar Attar.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
Virtual Private Networks (Tunnels). When Are VPN Tunnels Used? VPN with PPTP tunnel Used if: All routers support VPN tunnels You are using MS-CHAP or.
 It defines the format of the frame to be exchanged between devices.  It defines how two devices can negotiate the establishment of the link and the.
PPP (Point to Point Protocol)
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 1 ver.2 Module 7 City College.
Configuring Routing and Remote Access(RRAS) and Wireless Networking
Network Security1 – Chapter 5 (B) – Using IEEE 802.1x Purpose: (a) port authentication (b) access control An IEEE standard
Mobile and Wireless Communication Security By Jason Gratto.
WIRELESS LAN SECURITY Using
Comparative studies on authentication and key exchange methods for wireless LAN Authors: Jun Lei, Xiaoming Fu, Dieter Hogrefe and Jianrong Tan Src:
Wireless and Security CSCI 5857: Encoding and Encryption.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
Authenticating Users Chapter 6. Learning Objectives Understand why authentication is a critical aspect of network security Describe why firewalls authenticate.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
Shambhu Upadhyaya Security –Upper Layer Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 10)
Kerberos Named after a mythological three-headed dog that guards the underworld of Hades, Kerberos is a network authentication protocol that was designed.
Network access security methods Unit objective Explain the methods of ensuring network access security Explain methods of user authentication.
Module 8: Designing Security for Authentication. Overview Creating a Security Plan for Authentication Creating a Design for Security of Authentication.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
Kerberos By Robert Smithers. History of Kerberos Kerberos was created at MIT, and was named after the 3 headed guard dog of Hades in Greek mythology Cerberus.
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
PPP Configuration.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
Wireless Network Security CSIS 5857: Encoding and Encryption.
Introduction to Port-Based Network Access Control EAP, 802.1X, and RADIUS Anthony Critelli Introduction to Port-Based Network Access Control.
Network Security. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Remote Authentication Dial-In User Service (RADIUS)
Port Based Network Access Control
Module 9: Configuring Network Access
PPP Protocol.
PPP Protocol.
Microsoft Windows NT 4.0 Authentication Protocols
Configuring and Troubleshooting Routing and Remote Access
Radius, LDAP, Radius used in Authenticating Users
PPP – Point to Point Protocol
PPP PROTOCOL The First semester
– Chapter 5 (B) – Using IEEE 802.1x
Goals Introduce the Windows Server 2003 family of operating systems
Kerberos Kerberos is an authentication protocol for trusted hosts on untrusted networks.
PPP Protocol.
Virtual Private Networks (VPN)
Presentation transcript:

Authentication

TOPICS Objectives Legacy Authentication Protocols IEEE 802.1X Authentication Extensible Authentication Protocol (EAP) Authentication Servers

Objectives Learn the legacy authentication protocols. To identify the purpose and characteristics of 802.1X and EAP. Demonstrate the authentication servers: RADIUS/AAA, Kerberos and LDAP used with 802.11 WLANs. Understand the various RADIUS Configuration Scenarios.

Legacy Authentication Protocols The Legacy Authentication Protocols that are still in use today are: PAP CHAP MS-CHAP MS-CHAPv2

PAP Password Authentication Protocol, sometimes abbreviated PAP, is a simple authentication protocol used to authenticate a user to a network access server used for example by internet service providers. PAP was originally designed for the use with Point to Point Protocol. PAP provides no protection of authentication credentials.

CHAP Challenge-Handshake Authentication Protocol (CHAP) authenticates a user or network host to an authenticating entity like an Internet access provider. RFC 1994: Challenge Handshake Authentication Protocol (CHAP) defines the protocol. CHAP is an authentication scheme used by Point to Point Protocol (PPP) servers to validate the identity of remote clients. CHAP periodically verifies the identity of the client by using a three-way handshake, at the time of establishing the initial link. The verification is based on a shared secret (such as the client user's password). After the completion of the link establishment phase, the authenticator sends a "challenge" message to the peer. The peer responds with a value calculated using a one-way hash function, such as an MD5 checksum hash. The authenticator checks the response against its own calculation of the expected hash value. If the values match, the authenticator acknowledges the authentication; otherwise it should terminate the connection. At random intervals the authenticator sends a new challenge to the peer and repeats steps 1 through 3. CHAP is not considered the most secure authentication mechanism by today’s standards.

MS-CHAP MS-CHAP is the Microsoft version of the Challenge-handshake authentication protocol, CHAP. The protocol exist in two versions: MS-CHAPv1 (defined in RFC 2433) and MS-CHAPv2 (defined in RFC 2759). Compared with CHAP, MS-CHAP: is enabled by negotiating CHAP Algorithm 0x80 in LCP option 3, Authentication Protocol provides an authenticator-controlled password change mechanism provides an authenticator-controlled authentication retry mechanism defines failure codes returned in the Failure packet message field MS-CHAPv2 provides mutual authentication between peers by piggybacking a peer challenge on the Response packet and an authenticator response on the Success packet.

MS-CHAPv2 MS-CHAPv2 is a proprietary protocol created by Microsoft, was first released with Windows 2000 Professional and Server. MS-CHAPv2 improves on MS-CHAP by storing the passwords with a stronger hashing and encryption mechanisms and adding mutual authentication. This protocol is commonly used as an internal authentication mechanism in the EAP type known as PEAP.

IEEE 802.1X Authentication IEEE 802.1X is an IEEE standard for port-based Network Access Control. It provides authentication to devices attached to a LAN port, establishing a point-to-point connection or preventing access from that port if authentication fails. 802.1X makes use of EAP to define how authentication messages are to be exchanged between the various network components – Supplicants, Authenticators and Authentication Servers.

Cont… The advantages of using 802.1X port-based network authentication include: Multi-Vendor Standard framework for securing the network. Improves security through session based dynamic keying of encryption keys. Standards based message exchange based on EAP. Uses industry standard authentication serves (ex: RADIUS) Uses existing user security information, if necessary. Centralizes management for network access. Supports both wired and wireless networks.

Extensible Authentication Protocol (EAP) Cont… 802.1X Authentication Components: EAP-MD5 EAP-TLS EAP-TTLS PEAP LEAP Extensible Authentication Protocol (EAP) IEEE 802.1X

How 802.1X/EAP works The more specific functionality of the various EAP types ,the 802.1X supports include: Authentication Roles Controlled and Uncontrolled Ports 802.1X Generic Authentication Flow Framework.

Authentication Roles There are three primary authentication roles in an 802.1X authentication system, that include: Supplicant Authenticator Authentication Server

Cont… 802.11X authentication Roles

Generic 802.1X authentication Flow

Controlled and Uncontrolled Ports Two ports are defined by the 802.1X standard for the purpose of authenticating connected systems, that are: Uncontrolled Port: It is the port that allows communications to pass through the authentication and authorization only. Controlled Port: It is the port that can be used once authentication has completed.

Cont… Authorized connection to a wireless 802.1X authenticator (AP)

Cont… Unauthorized connection to a wireless 802.1X authenticator (AP)

Extensible Authentication Protocol (EAP) Extensible Authentication Protocol, or EAP, is a universal authentication framework frequently used in wireless networks and Point-to-Point connections, defined by RFC 3748. 802.1X implements EAP over local area networks and the protocol used to carry the EAP messages from the supplicant to the authenticator is EAPOL.

Cont… Some of the more common authentication protocols supported by EAP include: EAP-MD5 (Message Digest 5) EAP-TLS (Transport Level Security) EAP-TTLS (Tunneled TLS) EAP-PEAP (Protected EAP Protocol) Cisco LEAP (Lightweight EAP Protocol)

EAP Selection Quick Reference for common Types EAP-MD5 LEAP EAP-TLS EAP-TTLS PEAP Mutual Authentication No Yes Certificates required Client/Server Server only Dynamic Key Generation Costs and Management overhead Low High Low/ Medium Industry Support

EAP-MD5

LEAP

PEAP

EAP-TLS

EAP-TTLS

RADIUS/AAA Remote Authentication Dial In User Service (RADIUS) is an AAA (authentication, authorization and accounting) protocol . AAA are used to manage credentials, provide profiles for what different roles can perform, and track resources. The three components to AAA are: Authentication – allows an entity to provide credentials and asserts to identify. Authorization – declines what functions the entity is permitted to perform. Accounting – provides a way of logging and recording usage information.

Cont…

Cont… Some common RADIUS features include: Scalability EAP support Clustering and Failover Support Accounting Role Based Access Control VLAN Tagging Legacy Authentication Protocol Support Mutual Authentication Support Multiple Vendor Support Software and Appliance Implementation

Authentication Design Considerations Typical deployment Scenarios for RADIUS include: Single site deployment Distributed autonomous sites Distributed Sites, Centralized Authentication & Security Distributes Sites & Security, centralized Authentication Combination Architectures.

Single Site Deployment This scenario is characterized as follows: All WLAN users are located at a single site. A central authentication database handles all user authentication. One or more RADIUS servers manage WLAN and/or remote access use, authenticating users and setting up secure WLAN connections.

Cont…

Distributed Autonomous Sites This scenario is characterized as follows: Distributed Autonomous Sites or networks. The authentication database is replicated from the central site downstream to each autonomous site or network, so that all user authentication happens locally. One or more RADIUS servers managing WLAN and/or remote access use are located at each autonomous site or network.

Cont…

Distributed Sites, Centralized Authentication & Security This scenario is characterized as follows: Distributed sites, networks, or clusters of access points. WLAN access points at each site or on each network authenticate users against an authentication database located at a central site or operating hub. One or more RADIUS servers at the central site manage all WLAN and/or remote access use.

Cont…

Distributes Sites & Security, centralized Authentication This scenario is characterized as follows: Distributed sites, networks, or clusters of access points. The authentication database is located at a central site or network hub. One or more RADIUS servers managing WLAN and/or remote access use are located at each site, network ,or AP cluster.

Cont…

Kerberos Kerberos allows individuals communicating over a non-secure network to prove their identity to one another in a secure manner. It is also a suite of free software published by Massachusetts Institute of Technology (MIT) that implements this protocol. Its designers aimed primarily at a client-server model, and it provides mutual authentication — both the user and the server verify each other's identity. Kerberos protocol messages are protected against eavesdropping and replay attacks.

Cont…

LDAP Lightweight Directory Access Protocol is a data retrieval protocol that information storehouses can implement that provides an inter-application exchange interface. LDAP binds together system information distributed across multiple computers with system services and client applications. LDAP can work in conjunction with RADIUS in order to authenticate users. LDAP is important in RADIUS implementations because RADIUS servers are commonly configured to query LDAP compliant or compatible databases for user authentication. LDAP acts as: A Data Retrieval Protocol An Application Service Protocol An inter-application data exchange interface A system service protocol.

Conclusion To help address the unauthorized access, 802.1X was developed to provide a standard mechanism for port-based authentication. Through the use of standard authentication messaging protocols provided by EAP, multi-vendor solutions are being created to support network authentication. Illustrated in detail the three types of authentication servers RADIUS, Kerberos and LDAP. Source: white paper on 802.1X Authentication & EAP by Foundry Networks.