Top Banner
Wired vs WIRELESS SECURITY Outlines: ff b d d l • Diff erences between Sired and Wireless • Differences based on Security • Wireless Security: Shared key authentication Key Authentication WiFi Protected Access (APA) Wi Fi Protected Access (APA) By: Arash Habibi Lashkari July 2010 1 Network Security – 03
45

Wired vs WIRELESS SECURITY - Arash Habibi Lashkari Personal Website

Feb 03, 2022

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Wired vs WIRELESS SECURITY - Arash Habibi Lashkari Personal Website

Wired vs WIRELESS SECURITY

Outlines:ff b d d l• Differences between Sired and Wireless 

• Differences based on Security

• Wireless Security:

Shared key authentication

Key Authentication

Wi‐Fi Protected Access (APA)Wi Fi Protected Access (APA) 

By: Arash Habibi LashkariJuly ‐ 2010

1Network Security – 03

Page 2: Wired vs WIRELESS SECURITY - Arash Habibi Lashkari Personal Website

what is the difference between a i d LAN (L l A N k)wired LAN (Local Area Network) 

and a wireless LAN?and a wireless LAN?

2Network Security – 03

Page 3: Wired vs WIRELESS SECURITY - Arash Habibi Lashkari Personal Website

Wired LANWired LAN

• Devices being networkedDevices being networked– Include desktop computers, laptop computers, printers, servers, PDAs, video game systems, even TV and stereo systems

• Devices for connecting the above– Include network adapters, hubs, switches, routers, gateways and more

C i di• Connecting medium– Networking cable; most common is Category 5 or CAT‐5 for shortshort

3Network Security – 03

Page 4: Wired vs WIRELESS SECURITY - Arash Habibi Lashkari Personal Website

Simple home wired LAN

4Network Security – 03

Page 5: Wired vs WIRELESS SECURITY - Arash Habibi Lashkari Personal Website

Wireless LAN

• Devices being networked (same as for wired)Devices being networked (same as for wired)– Include desktop computers, laptop computers, printers, servers, PDAs, video game systems, even TV and stereo systems

• Devices for connecting the above– Include wireless adapters, access points, bridges, base stations and more

C i di• Connecting medium– Radio waves; per Einstein, there is no CAT‐5 

5Network Security – 03

Page 6: Wired vs WIRELESS SECURITY - Arash Habibi Lashkari Personal Website

Simple home wireless LAN

6Network Security – 03

Page 7: Wired vs WIRELESS SECURITY - Arash Habibi Lashkari Personal Website

Securing your home LANSecuring your home LAN

Preventing (or limiting)attacks against your network

7Network Security – 03

Page 8: Wired vs WIRELESS SECURITY - Arash Habibi Lashkari Personal Website

Wired LAN outside attacks

• Must come in through Internet GatewayMust come in through Internet Gateway• Attacks workstations and servers on the networknetwork

• Can be prevented by:– Installing a firewall (hardware and/or software)Installing a firewall (hardware and/or software)

• This is often done on the Internet gateway

– Turning off (or limiting) file‐sharing and remote g ( g) gaccess

8Network Security – 03

Page 9: Wired vs WIRELESS SECURITY - Arash Habibi Lashkari Personal Website

Wired LAN attack blocked by firewall

9Network Security – 03

Page 10: Wired vs WIRELESS SECURITY - Arash Habibi Lashkari Personal Website

Wireless LAN outside attacks

• Even if you have a firewall installed on yourEven if you have a firewall installed on your Internet gateway, a wireless LAN attacker is, effectively, already inside your network

– Wireless base station has to signal its existence so clients can connect

• Attackers of wireless LANs therefore need to be kept out by other means in addition to fi llfirewalls

10Network Security – 03

Page 11: Wired vs WIRELESS SECURITY - Arash Habibi Lashkari Personal Website

Wireless attacker is inside firewall!

11Network Security – 03

Page 12: Wired vs WIRELESS SECURITY - Arash Habibi Lashkari Personal Website

Wired vs WirelessWired vs Wireless

12Network Security – 03

Page 13: Wired vs WIRELESS SECURITY - Arash Habibi Lashkari Personal Website

Wired vs Wireless Confidentiality 

Wireless ConfidentialityM ki h i d f k h k ll i dMaking an unauthorized copy of packets on the network allows an intruder to breach confidentiality. Wireless networks broadcast packets in radio waves that can be received by anyone. Wireless networks must encrypt packets to keep them secure Wired Equivalent Privacy or WEP can easily be broken and shouldthem secure. Wired Equivalent Privacy, or WEP, can easily be broken and should be avoided. Wi‐Fi Protected Access, or WPA, is far superior to WEP and should be used whenever possible. 

Wired ConfidentialityAn intruder must have physical access to a wired network in order to copy p y pyinformation from the network. Access controls are usually good enough to prevent unauthorized snooping of packets on a wired network. Encryption is possible, but less frequently used on wired networks. 

13Network Security – 03

Page 14: Wired vs WIRELESS SECURITY - Arash Habibi Lashkari Personal Website

Wired vs Wireless Access Controls

Wireless Access ControlsWireless Access ControlsWireless networks require that a user know the name of the network, called the Service Set Identifier, or SSID, and the WPA passphrase. If the WPA passphrase is kept secret, unauthorized users cannot gain access to the network. 

Wired Access ControlsUnauthorized access in wired networks can have additional controls by using IEEE 802.1x Port‐Based Network Access Control. This requires a user enter a password when a computer is physically connected to the network. It is possible to use 802 1x on wireless networks but it is not a common practicepossible to use 802.1x on wireless networks, but it is not a common practice. 

14Network Security – 03

Page 15: Wired vs WIRELESS SECURITY - Arash Habibi Lashkari Personal Website

Wired vs WirelessWired vs Wireless

15Network Security – 03

Page 16: Wired vs WIRELESS SECURITY - Arash Habibi Lashkari Personal Website

Introduction to WirelessIntroduction to WirelessWireless networks broadcast their packets using radio frequencyor optical wavelengths A modern laptop computer can listen inor optical wavelengths. A modern laptop computer can listen in,but also an attacker can manufacture new packets on the fly andpersuade wireless stations to accept his packets as legitimate.

This presentation covers the following subjects:• WLAN Overview – Basic Concepts• The IEEE 802.11 Standards • IEEE 802.11 Security Measures • WEP Encryption and Related Attacks• WEP Encryption and Related Attacks• WPA Encryption  and Related Attacks• WPA 2 Encryption• Wireless Networks Best Practices

16Network Security – 03

Page 17: Wired vs WIRELESS SECURITY - Arash Habibi Lashkari Personal Website

Before we start…Before we start…Who is a hacker?

(originally) Someone who makes furniture with an axe! 

From the Jargon DictionaryFrom the Jargon Dictionary1. A person who enjoys exploring the details of programmable systems and

how to stretch their capabilities, as opposed to most users, who preferto learn only the minimum necessary.

2. One who programs enthusiastically or who enjoys programming ratherthan just theorizing about programming.

3. A person capable of appreciating hack value.4 A person who is good at programming quickly4. A person who is good at programming quickly.5. An expert at a particular program, or one who frequently does work

using it or on it.6. One who enjoys the intellectual challenge of creatively overcoming orj y g y g

circumventing limitations.

17Network Security – 03

Page 18: Wired vs WIRELESS SECURITY - Arash Habibi Lashkari Personal Website

Before we start…Before we start…Who is a hacker?

(originally) Someone who makes furniture with an axe! 

From the Jargon DictionaryFrom the Jargon Dictionary1. A person who enjoys exploring the details of programmable systems and

how to stretch their capabilities, as opposed to most users, who preferto learn only the minimum necessary.

2. One who programs enthusiastically or who enjoys programming ratherthan just theorizing about programming.

3. A person capable of appreciating hack value.4 A person who is good at programming quickly4. A person who is good at programming quickly.5. An expert at a particular program, or one who frequently does work

using it or on it.6. One who enjoys the intellectual challenge of creatively overcoming orj y g y g

circumventing limitations.

18Network Security – 03

Page 19: Wired vs WIRELESS SECURITY - Arash Habibi Lashkari Personal Website

WLAN Overview dStations and Access Points

A wireless network interface card (adapter) is a device, called a station, providing the network physical layer over a radio link to another station.

An access point (AP) is a station that provides frame di ib i i i i d i h i

The AP itself is typically connected by wire to a LAN.

distribution service to stations associated with it.

19Network Security – 03

Page 20: Wired vs WIRELESS SECURITY - Arash Habibi Lashkari Personal Website

WLAN Overview dd d h lMAC Address, SSID and Channels 

• Media Access Control (MAC) address:The station and AP each contain a network interface that has a MAC address– The station and AP each contain a network interface that has a MAC address. 

– World‐wide‐unique 48‐bit number. – Represented as a string of six octets separated by colons (00:02:2D:17:B9:E8).– Can be changed in software. 

• Service Set Identifier (SSID):– Every AP has a SSID, which is used to segment the airwaves for usage.– If two wireless networks are physically close the SSIDs label the respective– If two wireless networks are physically close, the SSIDs label the respective 

networks and allow the components of one network to ignore those of the other. 

– It is possible that two unrelated networks use the same SSID.  

• Channels– The stations communicate with each other using radio frequencies between 2.4 

GHz and 2.5 GHz. – Neighboring channels are only 5 MHz apart. – Networks with neighboring channels may interfere with each other.

20Network Security – 03

Page 21: Wired vs WIRELESS SECURITY - Arash Habibi Lashkari Personal Website

WLAN Overview Frames 

Both the station and AP radiate and gatherBoth the station and AP radiate and gather 802.11 frames as needed.

21Network Security – 03

Page 22: Wired vs WIRELESS SECURITY - Arash Habibi Lashkari Personal Website

WLAN Overview hAuthentication 

Authentication is the process of proving identity of aAuthentication is the process of proving identity of a station to another station or AP.

• Open system authentication ‐> all stations areOpen system authentication  > all stations are authenticated without any checking.

• Shared key authentication ‐> standard challenge• Shared key authentication ‐> standard challenge and response along with a shared secret key.

authentication management frame

recognition framerecognition frame

22Network Security – 03

Page 23: Wired vs WIRELESS SECURITY - Arash Habibi Lashkari Personal Website

WLAN Overview Association 

• Data can be exchanged between theData can be exchanged between the station and AP only after a station is associated with:– an AP in the infrastructure mode – another station in the ad hoc mode.

• A station can be authenticated with l AP t th ti b tseveral APs at the same time, but 

associated with at most one AP at any time.

• Association implies authentication.There is no state where a station is associated but not authenticated.

23Network Security – 03

Page 24: Wired vs WIRELESS SECURITY - Arash Habibi Lashkari Personal Website

IEEE 802.11 StandardsIEEE 802 is a dominant collection of networking standards developed by IEEE.IEEE 802.11 is a family of standards for wireless LANs.• Baseline IEEE Std 802.11‐1997 was approved in June 1997.

– Offering 1 Mbps and 2Mbps rates.g p p– Typical indoor range of 20m.

• 802.11b added 5.5 Mbps and 11 Mbps in 1999– range of 30‐40m (indoor)– range of 30‐40m (indoor)

• 802.11g added 54 Mbps in 2002– range of 30‐40m (indoor)

bli h d i b• 802.11n was published in October 2009.– Aiming for typical 75Mbps and maximum of 600Mbps– Range of 70m (indoor).– Products already available, based on draft standard.

24Network Security – 03

Page 25: Wired vs WIRELESS SECURITY - Arash Habibi Lashkari Personal Website

IEEE 802 11 Standard in OSI ModelIEEE 802.11 Standard in OSI Model

Application

PresentationPresentation

Session

TransportTransport

Network

Data Link802 11b

802.11 MAC header

Physical802.11b

802.11 PLCP header

25Network Security – 03

Page 26: Wired vs WIRELESS SECURITY - Arash Habibi Lashkari Personal Website

Security of IEEE 802.11 WLANsOpen System AuthenticationOpen System Authentication

• Relies on Service Set Identifier (SSID).

• Station must specify SSID to Access Point when requesting association.

• APs can broadcast their SSID as a beacon.

• Some clients allow * as SSID.– Associates with strongest AP regardless of SSID.

26Network Security – 03

Page 27: Wired vs WIRELESS SECURITY - Arash Habibi Lashkari Personal Website

Security of IEEE 802.11 WLANsidiSSID Hiding

• AP can choose not to transmit SSID in its beacons.

• Can still attack APs that don’t transmit SSID:– Send deauthenticate frames to client. 

– SSID then captured when client sends reauthenticateframes containing SSIDframes containing SSID. 

• Open System Authentication only provides triviallevel of security.level of security.– Even with SSID hiding.

27Network Security – 03

Page 28: Wired vs WIRELESS SECURITY - Arash Habibi Lashkari Personal Website

Security of IEEE 802.11 WLANsSSID HidingSSID Hiding

• 802.11b does not contain adequate authentication qmechanisms.  The two forms of authentication included with 802.11b are Open System Authentication (OSA) and Shared Key Authentication (SKA)Key Authentication (SKA).

Open System AuthenticationAll you need is the SSIDNegotiation is done in clear

Shared Key AuthenticationSSID and WEP Encrypted key

requiredNegotiation is done in clear text

required

Request (SSID) Request (SSID)

Accepted (SSID) Challenge Text (WEP)

Challenge Response (WEP)

Accepted (SSID)

28Network Security – 03

Page 29: Wired vs WIRELESS SECURITY - Arash Habibi Lashkari Personal Website

Security of IEEE 802.11 WLANsMAC Access Control ListsMAC Access Control Lists

• Access points may have Access Control Lists ccess po ts ay a e ccess Co t o sts(ACLs).

• ACL is a list of allowed MAC addresses.– E.g. only allow access to:

• 00:01:42:0E:12:1F00 01 42 F1 72 AE• 00:01:42:F1:72:AE

• 00:01:42:4F:E2:01

• But MAC addresses are sniffable and spoofable.But MAC addresses are sniffable and spoofable.• Hence MAC ACLs are of limited value.

– Will not prevent determined attacker.p

29Network Security – 03

Page 30: Wired vs WIRELESS SECURITY - Arash Habibi Lashkari Personal Website

Interception

• Wireless LAN uses radio signal.e ess uses ad o s g a .• Not limited to physical building.• Signal is weakened by:Signal is weakened by:

– Walls– Floors– Interference

• Directional antenna allows interception over longer distances.– Record is 124 miles for an unamplified 802.11b signal (using a 4 metre dish)(using a 4 metre dish).

30Network Security – 03

Page 31: Wired vs WIRELESS SECURITY - Arash Habibi Lashkari Personal Website

Directional Antennae

• Directional antenna provides focused reception.• DIY plans available, using:

– Aluminium cake tins– Chinese cooking sievesChinese cooking sieves.

31Network Security – 03

Page 32: Wired vs WIRELESS SECURITY - Arash Habibi Lashkari Personal Website

Wired Equivalence Privacy (WEP)

• Shared key between stations and an Access Point.S a ed ey bet ee stat o s a d a ccess o t.• Key used in stream cipher to encrypt WLAN traffic.

• Uses RC4 stream cipher – RC4 algorithm generates a stream of pseudo‐random bits using key and Initialisation Vector (IV) as input.

– RC4 is also used in the decryption of the ciphertext.

U 32 bit C li R d d Ch k (CRC32)• Uses 32‐bit Cyclic Redundancy Check (CRC32)– Basically a hash functionUsed to compute Integrity Check Vector (ICV)– Used to compute Integrity Check Vector (ICV)

32Network Security – 03

Page 33: Wired vs WIRELESS SECURITY - Arash Habibi Lashkari Personal Website

WEP Encryption

IV

RC4Cipher

||

InitialisationVector (IV) Key‐stream

⊕Ciphertext

Plaintext

Secret key

ICV computation using CRC32

||Plaintext

|| append XOR⊕33Network Security – 03

Page 34: Wired vs WIRELESS SECURITY - Arash Habibi Lashkari Personal Website

Shared Key Authentication (SKA)

• Station requests association with APStation requests association with AP.

• AP sends challenge to station.

S i h ll i• Station encrypts challenge using WEP to produce response.

• Response received by AP, decrypted by AP and result compared to initial challenge. If they match AP sends a successful message and the station is authenticated.

34Network Security – 03

Page 35: Wired vs WIRELESS SECURITY - Arash Habibi Lashkari Personal Website

WEP Safeguards

• Shared secret key required for:y q– Associating with an access point.– Sending data.– Receiving data.

• Messages are encrypted.fid i li– Confidentiality.

• Messages have checksum.Intended to provide integrity– Intended to provide integrity.

• But has serious vulnerabilities…

35Network Security – 03

Page 36: Wired vs WIRELESS SECURITY - Arash Habibi Lashkari Personal Website

Initialization Vector (IV)

• IV should be different for every message y gtransmitted.

• But 802.11 standard doesn’t specify how IV is calculatedcalculated.

• Wireless cards use several methods:– Some use a simple ascending counter for each messageSome use a simple ascending counter for each message.– Some switch between alternate ascending and descending counters.

– Some use a pseudo‐random IV generator– Some use a pseudo‐random IV generator.

• If 24‐bit IV is an ascending counter, and if AP transmits at 11 Mbps, then all IVs are exhausted in roughly 5 hours!

36Network Security – 03

Page 37: Wired vs WIRELESS SECURITY - Arash Habibi Lashkari Personal Website

Insecurity of SKA

• Rogue station records run of authentication protocol.• Uses known plaintext (challenge) to compute portion of key‐

stream for the (known) IV.– C = P XOR key‐stream– C = P XOR key‐stream.

• Rogue station can now respond to any future authentication challenge from AP encrypted with same key and same IV.

f h h ll– Rogue receives fresh challenge.– Wireless station gets to choose IV in protocol.– But same IV (and same secret key) means that RC4 produces the 

same key‐stream bits.– Hence rogue who repeats IV can reuse old key‐stream portion to 

encrypt, producing correct response

37Network Security – 03

Page 38: Wired vs WIRELESS SECURITY - Arash Habibi Lashkari Personal Website

Wi‐Fi Protected Access (WPA)

• The IEEE 802.11 community has responded toThe IEEE 802.11 community has responded to the many security problems identified in WEP.

• Intermediate solution: Wi‐Fi Protected AccessIntermediate solution: Wi Fi Protected Access (WPA).

• Longer‐term solution: WPA2.Longer term solution: WPA2.• WPA and WPA2 are standardised in IEEE 802.11i802.11i 

• Recently WPA has been cracked in just 60 seconds by Japanese researchersseconds by Japanese researchers

38Network Security – 03

Page 39: Wired vs WIRELESS SECURITY - Arash Habibi Lashkari Personal Website

Wi‐Fi Protected Access (WPA)

• Wi‐Fi Protected Access (WPA)( )– Works with 802.11b, a and g.

– An intermediate solution to address WEP’s problems.

Existing hardware can still be used; only firmware upgrade needed– Existing hardware can still be used; only firmware upgrade needed.

• WPA introduced new authentication protocol, improved integrity protection measure and per‐packet keys.– To provide stronger authentication than in WEP.

– To prevent spoofing attacks (i e bit flipping on WEP CRC)To prevent spoofing attacks (i.e. bit flipping on WEP CRC).

– To prevent FMS‐style attacks.

39Network Security – 03

Page 40: Wired vs WIRELESS SECURITY - Arash Habibi Lashkari Personal Website

Temporal Key Integrity Protocol (TKIP)

WPA introduced Temporal Key Integrity Protocol p y g y(TKIP).

• It is designed to be usable on already existing hardware by installing a new firmware.

• It is known to have several security weaknesses, but raises bar considerably compared to WEPbut raises bar considerably compared to WEP.

40Network Security – 03

Page 41: Wired vs WIRELESS SECURITY - Arash Habibi Lashkari Personal Website

TKIP Security Measures (I)

• A cryptographic message integrity code (MIC) is addedA cryptographic message integrity code (MIC) is added to every packet before fragmentation.– Prevents attacks like fragmentation or chopchop, where fragments of a packet are rearranged or packets are modified

Protects the plaintext of the fragments to prevent an– Protects the plaintext of the fragments to prevent an attacker from modifying the source or destination address of a packet.

• TKIP exchanges the per packet key completely after every single packet.– WEP changes only the first 3 bytes of the per packet key.

41Network Security – 03

Page 42: Wired vs WIRELESS SECURITY - Arash Habibi Lashkari Personal Website

TKIP Security Measures (II)

• TKIP only allows a small number of messages where the CRC32 checksum is correct but the MIC is incorrect.

If more than two such messages are received by a station– If more than two such messages are received by a station within a minute, TKIP is disabled for a minute and a renegotiation of the keys is suggested.

• A per packet sequence counter is used to prevent replay attacksreplay attacks.– If a packet is received out of order, it is dropped by the receiving station.

– This prevents all kind of injection attacks where a packet is replayed.

42Network Security – 03

Page 43: Wired vs WIRELESS SECURITY - Arash Habibi Lashkari Personal Website

WPA attacks

• Dictionary attack on pre‐shared key modeDictionary attack on pre shared key mode

• Denial of service attack If WPA i t t k t ith i lid– If WPA equipment sees two packets with invalid MICs in 1 second, then:

• All clients are disassociated• All clients are disassociated.

• All activity stopped for one minute.

• So two malicious packets per minute is enough to stop a So t o a c ous pac ets pe ute s e oug to stop awireless network.

43Network Security – 03

Page 44: Wired vs WIRELESS SECURITY - Arash Habibi Lashkari Personal Website

WPA2

Supersedes WPA’s interim solution to WEP issues but does require h dnew hardware.

• An enterprise level key management was added to IEEE 802 11• An enterprise level key management was added to IEEE 802.11, which allows a lot of modes of authentication:– No need for a single secret pre‐shared key 

– Use of a username and a password, smartcards, certificates, hardware security tokens etc

• Every station uses individual keys to communicate with an AP– Eavesdropping by another station in the same network is not possible 

anymoreanymore.

44Network Security – 03

Page 45: Wired vs WIRELESS SECURITY - Arash Habibi Lashkari Personal Website

Questions

45Network Security – 03