Top Banner
1 Wireless Security Update Mark Ciampa Western Kentucky University [email protected]
94
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

1

Wireless Security Update

Mark Ciampa

Western Kentucky University

[email protected]

Page 2: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

2

Oxymoron Government organization Same difference Pretty ugly Working vacation Tax return

Page 3: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

3

Oxymoron Jumbo shrimp Adult male Act naturally Microsoft Works Wireless security

Page 4: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

4

Wireless Advantages

Mobility Increased productivityEasier installationLess expensive installation

Page 5: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

5

Wireless Disadvantages

Radio signal interference

Health risksSecurity

Page 6: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

6

Wireless Security Vulnerabilities

Unauthorized users access the wireless network

Attackers view transmitted data Employees install rogue access

points Weaknesses in original IEEE 802.11

wireless security and new WPA

Page 7: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

7

Wireless Attack Tools

NetStumbler – Discover wireless network

Airopeek & Airmagnet – Packet sniffers

Kismet & Airsnort – Break security

Page 8: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

8

Wireless Security Attitudes

“It doesn’t matter if someone uses my wireless LAN”

“You can’t make a wireless LAN secure”

“I don’t know what to do”

Page 9: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

9

Does Wireless Security Matter?

Get into any folder set with file sharing enabled

See wireless transmissions Access to network behind

firewall can inject malware Download harmful content

linked to unsuspecting owner

Page 10: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

10

Does Wireless Security Matter?

Legal implications Security begins at home

Page 11: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

11

Can Make Wireless Secure

Significant improvement wireless security

New IEEE wireless standard ratified

Common non-technical wireless security language now used

Vendors making wireless security easier

Page 12: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

12

Wireless Security Update

Wireless security that doesn’t work and why

Wireless security that does work How to secure a home WLAN Contents of wireless curriculum How to secure an enterprise

WLAN

Page 13: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

13

Wireless Security Update

WLAN Defenses That Do Not Work

Page 14: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

14

Common WLAN Defenses

Encrypt transmissions (WEP) Hide my network (Disable

SSID beaconing) Restrict who can join my

network (MAC address filtering)

Use advanced security (WPA)*

Page 15: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

15

WLAN Defenses That Don’t Work

Encrypt transmissions (WEP) Hide my network (Disable

SSID beaconing) Restrict who can join my

network (MAC address filtering)

Use advanced security (WPA)*

Page 16: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

16

WEP Wired equivalent privacy (WEP)

intended to guard confidentiality of data through cryptography

WEP relies on a secret key that is “shared” between device and access point (AP)

Using same (shared) secret key to both encrypt and decrypt is private key cryptography or symmetric encryption

Page 17: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

17

WEP Objectives

Efficient - Algorithm must be proficient enough to be implemented in either hardware or software

Exportable - Must meet the guidelines set by the U.S. Department of Commence so wireless device using WEP can be exported overseas

Optional - The implementation of WEP in wireless LANs is an optional feature

Page 18: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

18

WEP Objectives

Reasonably strong - Security of the algorithm lies in the difficulty of determining the secret keys through attacks, which is related to the length of the secret key and the frequency of changing keys. WEP was to be “reasonably” strong in resisting attacks.

Self-synchronizing - Each packet must be separately encrypted (prevents a single lost packet from making subsequent packets indecipherable)

Page 19: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

19

WEP Keys WEP keys must be a minimum

of 64 bits in length Most vendors add an option to

use a larger 128-bit WEP key for added security (a longer key is more difficult to break)

Page 20: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

20

WEP Key Creation

64-bit WEP key created by entering 5 ASCII characters (5y7js) or 10 hexadecimal characters (456789ABCD)

128-bit WEP key created by entering 13 ASCII characters (98jui2wss35u4) or 26 hexadecimal characters (3344556677889900AABBCCDDEE)

Passphrase created by entering 16 ASCII characters (marchspringbreak)

Page 21: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

21

How WEP Works1. Information has cyclic redundancy

check (CRC) checksum value calculated (WEP calls this integrity check value (ICV)) and appends it to end of text

2. WEP default shared secret key combined with initialization vector (IV), a 24-bit value that changes each time a packet is encrypted

Page 22: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

22

How WEP Works

Page 23: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

23

How WEP Works3. Default shared secret key and IV are

then entered into an RC4 pseudo-random number generator (PRNG) that creates a random number (output is keystream)

4. Text + ICV and keystream combined through exclusive OR (XOR) to create ciphertext

5. IV pre-pended to ciphertext

Page 24: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

24

How WEP Works

Page 25: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

25

WEP Won’t Work WEP creates a detectable pattern for

attackers (weak keys) Attacker who captures packets for

length of time can see the duplication and use it to crack the code

Weakness is with initialization vector (IV), 24-bit value that changes each time a packet is encrypted

Page 26: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

26

WEP Won’t Work IV is 24-bit number = 16,777,216 possible

values “Expanded” WEP not increase IV AP transmitting at only 11 Mbps can send and

receive 700 packets each second Since different IV used for each packet IVs

start repeating in less than 7 hours Ways to reduce time needed to minutes Some WLANs always start with the same IV

after the system is restarted and then follow the same sequence of incrementing IVs

Page 27: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

27

WEP Won’t Work RC4 uses a pseudo-random number

generator (PRNG) to create keystream PRNG does not create true random

number but what appears to be (pseudo) random number

First 256 bytes of the RC4 cipher can be determined by bytes in the key itself

RC4 cipher is not considered the most effective cipher for the task

Page 28: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

28

WLAN Defenses That Don’t Work

Encrypt transmissions (WEP) Hide my network (Disable

SSID beaconing) Restrict who can join my

network (MAC address filtering)

Use advanced security (WPA)*

Page 29: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

29

SSID Beaconing Service Set Identifier (SSID) is

“beaconed” from AP Provides information to wireless

devices wanting to join network Beaconing SSID is default mode Some users disable SSID beaconing

so network not appear on Windows list of available wireless networks

Page 30: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

30

Disable SSID Beaconing

Page 31: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

31

Disable SSID Beaconing Won’t

Work SSID is initially transmitted in

cleartext when device negotiating with AP

Attacker only has to watch for any authorized device to negotiate

If attacker cannot capture initial negotiation process can force one to occur

Page 32: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

32

Force Renegotiation

Page 33: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

33

Disable SSID Beaconing Won’t

Work If SSID suppressed from beacon

frames, still transmitted in other management frames sent by the AP Windows can’t see it Netstumbler can see it

Many users do not change default SSID and these well known; an attacker can try default SSIDs until a connection is accepted

Page 34: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

34

Disable SSID Beaconing Won’t

Work Steps to manually enter SSID on

wireless device that not receive beaconed SSID are inconvenient

Turning off SSID beaconing prevents wireless devices from freely roaming from one wireless network to another

Many access points prohibit or discourage turning off SSID beaconing

Page 35: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

35

Discourage Turning Off SSID Beaconing

Page 36: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

36

Disable SSID Beaconing Won’t

Work Not uncommon to detect multiple

wireless signals at home or work May received signal with broadcast

SSID and signal where broadcast SSID turned off

If using Windows XP the device will always connect to the access point that is broadcasting its SSID

Page 37: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

37

WLAN Defenses That Don’t Work

Encrypt transmissions (WEP) Hide my network (Disable

SSID beaconing) Restrict who can join my

network (MAC address filtering)

Use advanced security (WPA)*

Page 38: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

38

MAC Address Filtering

Access control - Intended to limit a user’s admission to the AP (only those authorized able to become part of wireless LAN)

Most common type of access control is Media Access Control (MAC) address filtering (not part IEEE standard)

MAC address is unique 48-bit number “burned” into the network interface card adapter when manufactured

Page 39: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

39

MAC Address

Page 40: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

40

MAC Address

Page 41: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

41

MAC Address Filtering

Access to the wireless network can be restricted by entering the MAC address of approved or denied devices

Once the MAC addresses are entered, only specific devices can be authenticated based on MAC address

Page 42: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

42

MAC Address Filtering

Page 43: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

43

MAC Filtering

Page 44: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

44

MAC Address Filtering Won’t Work

MAC addresses initially exchanged in cleartext between device and access point

MAC address can be “spoofed” Some wireless NICs allow for a

substitute MAC address to be used Programs available that allow users to

spoof MAC address

Page 45: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

45

MAC Address Filtering Won’t

Work

Page 46: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

46

WLAN Defenses That Don’t Work

Encrypt transmissions (WEP) Hide my network (Disable

SSID beaconing) Restrict who can join my

network (MAC address filtering)

Use advanced security (WPA)*

Page 47: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

47

WPA Won’t Work* Wi-Fi Protected Access (WPA) Intended to provide enhanced

security using older wireless equipment

Must enter same passphrase on access point and wireless device

Passphrases less than 20 characters subject to offline dictionary attacks

Page 48: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

48

Wireless Security Update

Wireless Security Solutions

Page 49: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

49

802.11i By IEEE organization Designed specifically

address WLAN vulnerabilities

Ratified June 2004

Page 50: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

50

Common Security Models

By Wi-Fi organization Personal Security Model

WPA – Personal WPA2 - Personal

Enterprise Security Model WPA - Enterprise WPA2 - Enterprise

Page 51: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

51

Wireless Security Update

Personal Security Model - WPA

Page 52: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

52

Personal Security Model

Designed for single users or small office home office (SOHO) settings of < 10 devices and authentication server unavailable

Personal security model has 2 options WPA – Legacy hardware WPA2 – Newer hardware

Page 53: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

53

Wi-Fi Protected Access (WPA)

Wi-Fi Alliance introduced Wi-Fi Protected Access (WPA) in October 2003

Subset of 802.11i Addresses encryption &

authentication Designed to enhance security on

older WLAN devices

Page 54: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

54

Temporal Key Integrity

Protocol (TKIP) WPA replaces WEP with new encryption

Temporal Key Integrity Protocol (TKIP)

TKIP uses 128-bit per-packet key (dynamically generates a new key for each packet and prevents collisions)

TKIP distributes key to client and AP, setting up automated key hierarchy and management system

TKIP dynamically generates unique keys to encrypt every data packet

Page 55: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

55

TKIP Encryption TKIP strong substitution WEP encryption Instead of replacing WEP engine TKIP

designed to fit into the existing WEP procedure with a minimal amount of change

Device starts with 2 keys, a 128-bit encryption key (temporal key) and 64-bit MIC

Page 56: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

56

TKIP Encryption1. Temporal key XORed with sender’s MAC

address to create an intermediate Value 1

2. Value 1 then mixed with a sequence number to produce Value 2 (the per-packet key) and then entered into the (PRNG), just as with normal WEP

3. Sender’s MAC address and receiver’s MAC address are all run through a MIC function and creates text with MIC key appended; value is then XORed with keystream to create ciphertext

Page 57: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

57

TKIP Encryption

Page 58: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

58

TKIP Key Mixing

WEP constructs a per-packet RC4 key by concatenating a key and packet IV

TKIP per-packet key construction (TKIP key mixing) substitutes temporary (temporal) key for WEP base key and constructs a per-packet key that changes with each packet

Temporal keys have fixed lifetime and are replaced frequently

Page 59: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

59

IV Sequencing

TKIP reuses the WEP IV field as a sequence number for each packet

Both the transmitter and receiver initialize the packet sequence space to zero whenever new TKIP keys are set, and the transmitter increments the sequence number with each packet it sends

Length of the sequence number (IV) has been doubled, from 24 bits to 48 bits.

Page 60: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

60

Message IntegrityCheck (MIC)

WPA replaces Cyclic Redundancy Check (CRC) with Message Integrity Check (MIC), designed to prevent an attacker from altering packets

Attacker can modify a packet and the CRC, making it appear that the packet contents were the original

Receiver and transmitter each compute and then compare the MIC

If not match, the data is assumed to have been tampered with and the packet is dropped

Optional countermeasure all clients are de-authenticated and new associations are prevented for one minute if MIC error occurs

Page 61: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

61

Pre-Shared Key (PSK) Authentication

WPA authentication can be accomplished by either authentication server or pre-shared key (PSK)

Passphrase (the PSK) is manually entered to generate encryption key on AP and devices in advance

PSK not used for encryption but instead serves as the starting point (seed) for generating the encryption keys

Disadvantage of key management: key must be created and entered in any device (“shared”) prior to (“pre”) communicating

Page 62: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

62

Wi-Fi Protected Access (WPA)

Designed to enhance security on older WLAN devices

Should only be used if devices cannot support WPA2

Page 63: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

63

Personal Security Model

Page 64: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

64

Wireless Security Update

Personal Security Model – WPA2

Page 65: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

65

Wi-Fi Protected Access 2 (WPA2)

Wi-Fi Alliance introduced Wi-Fi Protected Access 2 (WPA2) in September 2004

WPA2 based on the final IEEE 802.11i WPA2 uses AES for data encryption and

supports authentication server or PSK technology

WPA2 allows both AES and TKIP clients to operate in the same WLAN; IEEE 802.11i only recognizes AES

Page 66: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

66

AES AES algorithm processes blocks of 128 bits,

yet the length of the cipher keys and number of rounds can vary, depending upon the level of security that is required

Available key lengths are of 128, 192 and 256 bits, and the number of available rounds are 10, 12, and 14

Only the 128-bit key and 128-bit block are mandatory for WPA2

It is recommended that AES encryption and decryption be performed in hardware because of the computationally intensive nature of AES

Page 67: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

67

AES Security

Page 68: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

68

Personal Security Model

Page 69: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

69

Wireless Security Update

How To Make a Home Wireless LAN

Secure

Page 70: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

70

Steps Protect Personal Wireless

Install Microsoft Hot Fix (KB893357) Turn on WPA2

On older equipment use WPA MUST use 20+ character WPA passphrase

Turn on wireless VLAN If want to deter “casual” users

Use MAC address filtering Use unidentifiable SSID Turn off SSID beaconing

Page 71: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

71

Set WPA2 on AP

Page 72: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

72

Set WPA2 on AP

Page 73: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

73

Set WPA2 on Device

Page 74: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

74

Show WPA2

Page 75: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

75

Turn on VLAN

Page 76: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

76

Secure Easy Setup

Collaboration between Linksys and Broadcom Activate WPA security “at the push of a button” Automatically configures custom SSID and

enables WPA dynamic key encryption settings No need to manually enter a passphrase or key Two step process

Push the SES button on access point Click the START SES button on client

To add more wireless devices to network simply push the button on the router again to repeat process

Page 77: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

77

Secure Easy Setup

Page 78: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

78

Wireless Security Update

Contents of Wireless Curriculum

Page 79: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

79

Wireless Curriculum CompTIA dropped proposed

Wireless+ certification Most popular wireless certifications

from CWNA (Planet3) Wireless# Certified Wireless Network Administrator Certified Network Security Professional

Page 80: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

80

Course Technology Wireless Textbooks

Guide to Wireless Communications 2ed (Wireless#) – May 2006

CWNA Guide to Wireless LANs 2ed (CWNA) – August 2005

CWSP Guide to Wireless Security 1st (CWSP) – August 2006

Page 81: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

81

Wireless Security Update

Enterprise Security Model – WPA &

WPA2

Page 82: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

82

Enterprise Security Model

Designed for medium to large-size organizations such as businesses, government agencies, and universities with authentication server

The personal security model has 2 options: WPA & WPA2 (older equipment may be forced to implement WPA, while newer equipment can support WPA2)

Page 83: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

83

802.1x IEEE 802.11i authentication and key

management uses IEEE 802.1x (originally developed for wired networks)

802.1x port security (device requests access to network prevented from receiving any traffic until its identity can be verified)

802.1x blocks all traffic on port-by-port basis until the client is authenticated using credentials stored on authentication server

Page 84: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

84

802.1x Authentication

The supplicant is device which requires secure network access and sends request to an authenticator that serves as an intermediary device (authenticator can be an access point on a wireless network or a switch on a wired network)

The authenticator sends request from supplicant to authentication server, which accepts/rejects the supplicant’s request and sends that information back to the authenticator, which in turn grants or denies access to the supplicant

Strength of the 802.1x protocol is that supplicant never has direct communication with authentication server

Page 85: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

85

802.1x1. Device requests from AP permission to join

WLAN 2. AP asks device to verify its identity3. Device sends identity information to AP,

which passes encrypted information to authentication server

4. Authentication server verifies/rejects client’s identity and returns information to AP

5. Approved client now join the network

Page 86: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

86

802.1x

Page 87: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

87

802.1x Supplicant Supplicant, required on the wireless device,

is software that is installed on the client to implement the IEEE 802.1x protocol framework

Supplicant software may be included in client operating system, integrated into device drivers, or installed as third-party “standalone” software

Some vendors of wireless NICs supply supplicant with their cards

Page 88: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

88

Authentication Server

Authentication server stores the list of the names and credentials of authorized users

Wireless user credentials may also be stored in an external database, such as Structured Query Language (SQL), Lightweight Directory Access Protocol (LDAP), or Microsoft Active Directory

Typically a Remote Authentication Dial-In User Service (RADIUS) server is used

Page 89: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

89

RADIUS Request is first sent to authenticator, which

relays the information (username, password, type of connection) to RADIUS server

Server first determines if AP itself is permitted to send requests

RADIUS server attempts to find the user’s name in its database

Then applies the password to decide whether access should be granted to this user

Page 90: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

90

Encryption Once authenticated by IEEE 802.1x

same protocol next provides the wireless device a unique encryption key called the MK

From single key all the necessary encryption keys for encrypted communication can then be created

Keys can also be changed during a session

Page 91: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

91

Encryption Eliminates difficulties and potential

dangers associated with PSK Each user has a unique key Keys remain strong and require no

management Adding additional APs only requires

that the newly installed APs connect to the existing authentication server

Page 92: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

92

Extensible Authentication Protocol (EAP)

EAP-Transport Layer Security (EAP-TLS) - Requires the use of certificates to validate a supplicant and supported by Microsoft and included in Microsoft Windows XP and Windows Server 2003

Lightweight EAP (LEAP) - Propriety standard supported by Cisco; LEAP provides authentication based on the Windows username and password logon (certificates are not required)

EAP-TunneledTLS (EAP-TTLS) - Supports advanced authentication methods such as using tokens

Protected EAP (PEAP) - Uses certificates similar to Secure Sockets Layer (SSL) with Web browsers; supplicant presents a certificate to the authentication server (via the authenticator) but does not require a certificate from the server in return

Flexible Authentication via Secure Tunneling (FAST) - Most recent variation; can set up a tunnel without checking digital certificates and also support tokens

Page 93: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

93

Enterprise Security Model

Page 94: 1 Wireless Security Update Mark Ciampa Western Kentucky University mark.ciampa@wku.edu.

94

Wireless Security Update

Mark Ciampa

Western Kentucky University

[email protected]