Wireless Network Authentication Regnauld / Büttrich, Edit: Sept 2011 Wireless Network Authentication Regnauld / Büttrich, Edit: Sept 2011.

Slides:



Advertisements
Similar presentations
Authentication.
Advertisements

Enabling Secure Internet Access with ISA Server
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Campus Networking Best Practices Session 5: Wireless LAN Hervey Allen NSRC & University of Oregon Dale Smith University of Oregon & NSRC.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
Chapter 12 Network Security.
802.1x EAP Authentication Protocols
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco NAC Guest Server Guest Access - Simplified Tim Wellborn SE Sangeeta.
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
Chapter 5 Secure LAN Switching.  MAC Address Flooding Causing CAM Overflow and Subsequent DOS and Traffic Analysis Attacks.
Master Thesis Proposal By Nirmala Bulusu Advisor – Dr. Edward Chow Implementation of Protected Extensible Protocol (PEAP) – An IEEE 802.1x wireless LAN.
Top-Down Network Design Chapter Eight Developing Network Security Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Wireless Security with 802.1X Copyright 2005 Michael Griego This work is the intellectual property of the author. Permission is granted for this material.
Point-to-Point Protocol (PPP) Security Connecting to remote access servers (RASs) PPP authentication PPP confidentiality Point-to-Point Tunneling Protocol.
SSL (Secure Socket Layer) and Secure Web Pages Rob Sodders, University of Florida CIS4930 “Advanced Web Design” Spring 2004
Wireless LAN Security Yen-Cheng Chen Department of Information Management National Chi Nan University
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
What about 802.1X? An overview of possibilities for safe access to fixed and wireless networks Amsterdam, October Erik Dobbelsteijn.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
Chapter 10: Authentication Guide to Computer Network Security.
Guide to Operating System Security Chapter 9 Web, Remote Access, and VPN Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Troubleshooting Your Network Networking for Home and Small Businesses.
1 Network Admission Control to WLAN at WIT Presented by: Aidan McGrath B.Sc. M.A.
Configuring Routing and Remote Access(RRAS) and Wireless Networking
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Network Security1 – Chapter 5 (B) – Using IEEE 802.1x Purpose: (a) port authentication (b) access control An IEEE standard
WIRELESS LAN SECURITY Using
Wireless and Security CSCI 5857: Encoding and Encryption.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Altai Certification Training Backend Network Planning
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
Chapter Network Security Architecture Security Basics Legacy security Robust Security Segmentation Infrastructure Security VPN.
Registration Processing for the Wireless Internet Ian Gordon Director, Market Development Entrust Technologies.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
Module 8: Designing Network Access Solutions. Module Overview Securing and Controlling Network Access Designing Remote Access Services Designing RADIUS.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Module 11: Remote Access Fundamentals
Shambhu Upadhyaya Security –Upper Layer Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 10)
Module 9: Designing Network Access Protection. Scenarios for Implementing NAP Verifying the health of: Roaming laptops Desktop computers Visiting laptops.
Cisco’s Secure Access Control Server (ACS)
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
Network access security methods Unit objective Explain the methods of ensuring network access security Explain methods of user authentication.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Secure Authentication System for Public WLAN Roaming Ana Sanz Merino, Yasuhiko.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Internet Authentication Service.
Module 11: Securing a Microsoft ASP.NET Web Application.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
Data Communications and Networks Chapter 10 – Network Hardware and Software ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
20 November 2015 RE Meyers, Ms.Ed., CCAI CCNA Discovery Curriculum Review Networking for Home and Small Businesses Chapter 7: Wireless Technologies.
1 Kerberos – Private Key System Ahmad Ibrahim. History Cerberus, the hound of Hades, (Kerberos in Greek) Developed at MIT in the mid 1980s Available as.
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Introduction to Port-Based Network Access Control EAP, 802.1X, and RADIUS Anthony Critelli Introduction to Port-Based Network Access Control.
Port Based Network Access Control
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
Wireless Security - Encryption Joel Jaeggli For AIT Wireless and Security Workshop.
Understand Wireless Security LESSON Security Fundamentals.
Top-Down Network Design Chapter Eight Developing Network Security Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Configuring and Troubleshooting Routing and Remote Access
2018 Real Cisco Dumps IT-Dumps
– Chapter 5 (B) – Using IEEE 802.1x
Presentation transcript:

Wireless Network Authentication Regnauld / Büttrich, Edit: Sept 2011 Wireless Network Authentication Regnauld / Büttrich, Edit: Sept 2011

- We will be talking about the various models of network authentication on wireless network - We will cover the protocols and mechanisms, as well as the architectures and components to implement it Wireless Network Authentication

Overview What are we trying to solve Protocols & Implementation (mechs) & Layers Ways to regulate access to the network (mech) - out of scope: MAC filtering, WEP/WPA - Captive portal X (EAPoL and EAP-TLS) Architectural components - authentication server (Radius) - Access Point - Supplicant (module to authenticate) Non-tech aspects - Captive Portal vs 802.1x, Helpdesk, support issues

Basic Terminology - Some basic terms - EAP – Extensible Authentication Protocol - PNAC – Port-based Network Access Control - Supplicant – a software application, installed on a user's computer, which submits credentials provided by the user, to an ”authenticator” - Authenticator – challenges, receives, processes, and replies to authentication requests from a supplicant

What is authentication ? Let's agree: Authentication is the process of verifying the claim that an entity is allowed to act on behalf of a given known identity In plain speak: - Is this person says who they say they claim to be ? - Can they prove it (password, signature) In this case, the entity is the software, acting on behalf of the user controlling the computer

Some core concepts - Important to distinguish between the following concepts - confidentiality - access control - authentication - authorization

Some core concepts (2) Confidentiality - Ensure that only those who should have access to information can indeed do so (usually encryption) Authorization & access control - Authorization defines what an entity (here, a user, a device) is authorized (allowed), to access or do - Which networks (ACLs/filters) - Which systems, which files ? (FS ACLs, permissions) - When can they log on (time policies) ? - Can they send ? - Can they run this application ? Access control are the mechanisms by which these rights and restrictions are controlled and enforced

What are we trying to solve Require authentication so not anyone can access our wireless networks We want to know WHO, WHERE(*), and WHEN This is NOT the same as using password- based WEP/WPA encryption - WEP/WPA keys can be shared between users - No way to identify who has connected, where, and when We want to know: - Which user ? - What area of the wireless network (AP) did they associate with ? - When did they log on ?

What solutions do we have ? WEP/WPA - As explained, they only provide confidentiality at the network level, they do not tell us who is connected MAC filtering - Problem: doesn't identify a person - Easily spoofed, and not a secret information IP address - Doesn't restrict physical access to the medium - Easily spoofed

Captive portals - Very popular (public areas, airports, hotels, …) - Very flexible - Self-explanatory (web page), can enforce AUP (Acceptable Use Policy) validation - Easy to implement Downsides: - Not transparent - Not standardized (different looks, different credentials, …) - Requires regular re-authentication (disruptive) - May require an external authentication server

Captive portals (2) To ”redirect” you to a welcome page, any one of the following methods may be used: - HTTP silent redirection - HTTP 30x redirect - IP hijacking - DNS hijacking Certain URLs may be allowed - Commercial / advert - Information page (think: Airport Flight info)

Captive portals (3) Many vendors and open source projects - CoovaChilli, CoovaAP - WiFidog - M0n0wall, pfSense - zeroshell And many others Many general networking vendors offer some form of integrated captive portals, e.g. - Microtik - HP - Cisco - Aruba - Aptilo

802.1x & EAP ”Port-based Network Access Control” (PNAC) Originally designed for wired networks (EAPoL), but design accomodated for wireless networks RFC5216 Layer 2 protocol 4 states: 1. initialization (all traffic blocked – no DHCP or anything) 2. initiation (authenticator sends EAP-Requests, and client responds with EAP-Response- Identity) 3. negotiation of a method of authentication 4. authentication if negotiation succeeds Traffic is allowed through

802.1x & EAP (2) Advantages - transparent for Applications - ”inline” - doesn't require interaction with upper layers like DHCP, IP, HTTP to function - standardized for both wired and wireless LANs - authentication mechanism is well known (MS- CHAP or PAP, from PPP/PPPoE) Downsides - may require new network equipment and/or firmware upgrade - may require an external authentication server

How does it work source: wikipedia

802.1x & EAP vs captive portals They are complementary: Captive portals may be preferable for networks, or parts of the network, where there are many non-regular, guest users Captive portals can guide users, provide helpdesk contact information 802.1x is more streamlined – and standardized – making it preferable for known, pre-configured users A combination of both may be useful x everywhere is possible, on LAN/WLAN (dedicated SSID) - ”Guest”-style captive portal for the rest (different SSID) - Captive portal remains more intuitive for first time users … if it is your policy to have guests! (may not be the case)

802.1x & EAP vs captive portals - 2 Function at different levels x is layer 2 (0x888E frame type) - Captive Portals use layers 3 - 7

Authentication backends & components Already discussed, but as a reminder: - SQL or LDAP - Local flat text file - Radius (which can use any of the above solutions) - Backends can be shared between technologies (captive portal x)