Download presentation
Presentation is loading. Please wait.
Published byMarvin Haynes Modified over 9 years ago
1
CSC – Tieteen tietotekniikan keskus Oy CSC – IT Center for Science Ltd. WLAN Information Security Workshop on Wireless Belgrade - 12.09.2011 Wenche Backman-Kamila
2
802.1x AES WEP TKIP WPA WPA2 WPA- Personal WPA- Enterpise PSK Let’s clean up the mess! web- authentication
3
Agenda The physical interface Authentication Encryption Traffic management Recommendations and comments
4
The physical interface Licence-free frequency bands –2,4 – 2,5 GHz (802.11b/g/n) –5,2 – 5,7 GHz (802.11a/n) Threaths –Interference from Microwave owens and motion sensors Bluetooth, other wireless equipment, other WLANs RF jammers –DoS attacks (assosiation or EAPOL Start)
5
AUTHENTICATION
6
Overall security of authentication methods
7
802.1x networks - alternatives 802.1x networks = eduroam networks 802.1x based on EAP EAP alternatives –TLS Requires personal certificates but no username and password –TTLS, PEAP and FAST Authentication based on username and password
8
Supplicant configuration considerations For 802.1x to be really secure pay attention to which server certificate is used In the supplicant –Define correct CA –Define server name More info in WLAN monitoring and supplicants - session
9
Information security risks in web-authentication The authenticity of the login page cannot be verified User IDs and passwords can be intercepted and sessions hijacked.
10
Authentication considerations Content of database –Eliminate authentication with shared user identities Impact of compromised credentials
11
ENCRYPTION
12
Wireless security vs wired security Signals from Access Points can be captured at the air interface Information security risks –Sniffing –Spoofing –Probing
13
More security risks – and countermeasures Firesheep –Users may get their profiles to e.g. Facebook hijacked Countermeasures –VPN encryption High requirements on the VPN server Performance usually drops –->Link-layer encryption
14
Overview of encryption development
15
Personal and Enterprise WPA-Personal WPA2-Personal (=WPA- PSK WPA2-PSK) WPA-Enterprise WPA2-Enterprise (=802.1x)
16
Details on WPA-TKIP and WPA2-AES WPA-TKIP regular key rotation per-frame key mixing a frame sequence counter to protect against replay attacks an improved message integrity check algorithm. WPA2-AES Actually AES-CCMP at link layer A single component handles –per-frame key management –integrity checks
17
TKIP-vulnerability End of 2008 –Injecting false messages of a few types (e.g. ARP) possible September 2009 –Forging short encypted packes (e.g. ARP messages) in shorter time (1 min vs 12 min) –Increased likelihood of session being hijacked Although encryption key never exposed –-> use only WPA2-AES
18
Wi-Fi alliance and WPA- TKIP Wi-Fi alliance will abandon WPA-TKIP in stages 2011-2014.
19
Encryption conclusions Always use the most secure encryption method WPA2-AES Why? –When all use the same method roaming becomes easier –The Wi-Fi alliance is discontinuing support of WPA-TKIP For access to intranets etc. include also VPN encryption
20
TRAFFIC MANAGEMENT
21
Authorisation Minimum requirement is Internet access Separate VLAN for own users and visitors –@myorganisation more rights and privilegies Check visitor VLAN carefully –no protected networks or machines using the same VLAN If possible access to printers and journals for all
22
MAC address blacklisting Information security and stability can be improved –by stopping Too frequent authentication requests Spreading a worm constantly receiving new IP-addresses –by handling notifications of copyright violations The user should be notified of blacklisting
23
Other restrictions SMTP –Only access to own servers allowed –Block connections from the Internet Block devices from acting as DHCP servers Make terminals communicate with each other through the AP
24
RECOMMENDATIONS
25
Regarding authentication Inform of the weaknesses of unencrypted networks –and of the need to switch to 802.1x Consider implications of stolen passwords Or use different passwords for WLAN Grant access to VPN without web- authentication Don’t allow use of unencrypted protocols in unencrypted networks
26
Comments regarding authentication Open networks are misused and copywright infringements occur MAC address blacklisting improves security and stability
27
Regarding encryption Use only WPA2-AES –If you have VERY good reasons allow also WPA-TKIP –Acknowledge supplicant configuration implications Unencrypted networks are risky –Open networks –Pre-shared key networks –Web-authenticated networks
28
References and contact info Main reference –WLAN Information Security BPD http://www.terena.org/campus-bp/bpd.html Wenche.Backman-Kamila@csc.fi
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.