Wireless Security Architecture for Campus Network
|
|
|
- Buddy Henderson
- 10 years ago
- Views:
Transcription
1 Guillaume-Jean Herbiet CS 6255 Grégory Nou Network Management Final report Wireless Security Architecture for Campus Network
2 MAP OF STUDY Map of study INTRODUCTION... 4 Why security?... 4 The main principles of wireless security... 4 Identification... 4 Authentication... 4 Confidentiality... 4 Data integrity... 6 Non-repudiation... 7 BASIC SECURITY POLICIES AND THEIR WEAKNESSES... 8 WEP encryption... 8 "Seems-like-security-but-isn't" tricks... 8 IMPROVING SECURITY IN WIRELESS NETWORKS Security in 802.1x Basic description Port-based authentication Authentication process X weaknesses Conclusion Security in i Security Architecture Radio security protocols Wi-Fi Protected Access (WPA) Authentication in wireless networks Kerberos RADIUS (Remote Authentication Dial-In User Server) EAP (Extensible Authentication Protocol) Layer 3 security Level 3 VPN Other solutions WIRELESS SECURITY ARCHITECTURE FOR CAMPUS NETWORK 2/37
3 DEPLOYING A SECURED ARCHITECTURE A secure design for campus application Installing FreeRADIUS Obtaining certificates Setting up FreeRadius Setting up the access point Setting up the client Interfacing with the LDAP directory Overview Installing and configuring CONCLUSION REFERENCES Guillaume-Jean Herbiet Grégory Nou 3/37
4 INTRODUCTION Introduction Why security? One of the major weaknesses of wireless networks is due to security as all communication signals are broadcasted through the air as radio waves and could be listened to. Therefore, a hacker can hijack a user s identity and read, copy or modify the transmitted data. Besides, those issues are emphasized by the fact that the first wireless protocols and solutions did not take security into account in their first step of conception. However, several additional solutions have been developed since but their cost is more often more prohibitive than native solutions. The main principles of wireless security Security is classically defined as the following five basic services: identification, authentication, confidentiality, data integrity and non-repudiation. A secure wireless network should provide technical solution for all those services. Identification Any user of any resource of a system must have a unique identity which determinates its credentials and what he is entitled to use. This identity has to be verified. Most often this is realized using a username. However, biometrics controls such as fingerprint or voice print or retinal print. Authentication Authentication aims to check the identity of communicating processes. Several simple solutions are usually provided, such as the use of the traditional pair login/password. More evolved methods are based on a cryptographic method and a shared secret. Authentication can also use a unique user ID, like a number written into a smart card, or a PIN code (personal identification number). Authentication can also be simple or mutual. It basically relies on matching user provided data with information recorded in a protected site. The major weakness of this method makes those sites vulnerable to attacks. Confidentiality Confidentiality gives the guarantee that the exchanged data is only understandable by the two end points that share the same secret. Therefore, ciphering algorithms should work in flow mode, i.e. byte per byte. Those algorithms transform a clear text message into a coded cryptogram using one or several keys. WIRELESS SECURITY ARCHITECTURE FOR CAMPUS NETWORK 4/37
5 The main principles of wireless security Symmetric ciphering The easiest ciphering relies on a single secret key shared between the transmitter and the receiver of the message. Fig 1 : Symetric ciphering Asymmetric ciphering Public key algorithms are asymmetric. The receiver is the only one to know the deciphering key. Security is therefore improved because event the transmitter doesn t know this key. The most widely use asymmetric algorithm is RSA (Rivest, Shamir, Adleman) that uses the practical impossibility to invert a power function. Fig 2 : Asymmetric ciphering Guillaume-Jean Herbiet Grégory Nou 5/37
6 INTRODUCTION Certificates One of the main difficulties for a station communicating with many other end points is to remember all the public keys required. So, a secured and reliable service based on certificates is used. A certificate is a set of symbols and a signature. The most used certificate standard os X.509 v2 or v3 and uses ASN.1 as syntax. Fig 3 : X.509 certificate Those certificates are used by certification authorities that offer a service of management of public keys. They emit those certificates to ensure the public keys can be used with trust. Data integrity Data integrity ensures the users that the transmitted data wasn t modified during the transaction. A first solution consists in ciphering the data carried inside a packet. So, if the data has been modified, the final user won t be able to decipher it. This method ensures both confidentiality and integrity. The other method consists in using a hash function to create a signature of the packet. The hash function calculates a digital print of the transmitted packet that the receiver can check to see whether the content of the packet has been modified. Fig 4 : Hash function The most commonly used hash techniques are MD5 (Message Digest #5) defined in RFC 1321 and SHA-1 (Secure Hash Algorithm). WIRELESS SECURITY ARCHITECTURE FOR CAMPUS NETWORK 6/37
7 The main principles of wireless security Non-repudiation Non-repudiation services attempt to prevent the denial of receiving information from a station who asked for it. This is similar as the receipt of sending while using a fax. Fig 5 : A signature example This is realized using a private or public key signature or by a trusted third party that certifies the connection took place. In this case, the packet is signed by ciphering the fingerprint of the message with the private key of its author. Guillaume-Jean Herbiet Grégory Nou 7/37
8 BASIC SECURITY POLICIES AND THEIR WEAKNESSES Basic Security policies and their weaknesses WEP encryption WEP is the cryptographic technique from b. It stands for Wired Equivalent Protocol. This name says all: it was not conceived to provide a perfect protection, but to provide a protection equivalent to the one you have on a wired network. WEP is a simple, generally efficient and dissuasive way to protect your network against unauthorized access: a war driver would probably choose an unprotected hotspot rather than a WEP-protected access point, because it would take to much time (generally more than 2 hours) to crack the WEP key. However, WEP remains a weak protocol and should neither be used in an academic environment nor in a corporate network. This technology is implemented in the Data-Link layer, providing a Media Access Control. Here, we describe the basic principles of the WEP (secret key, and so on) WEP was firstly described as using a RC4 PRNG algorithm, with a 40-bits RSA public key. When WEP is activated on an access-point, only the clients with the secret key are allowed to associate with this AP. Unauthorized clients will be able to look at traffic, but every frame will be crypted. WEP uses hardware encryption. That could seem a very good idea, but it is not. First, this means that there is encryption, only when data are between the client and the gateway. When in the wire, data are enciphered. Worst, any client with a valid key could read all your datas, since the same key is used for everybody. Hardware Constructors have created their own extensions of the protocol, with 104 bits keys and dynamic gestion of them. However, as it is not a standard, using different types of card would prevent you to use those extensions. And to finish killing WEP with flaws, we can add that different researchers proved that in fact using a longer key is useless, since the mean to crack a key is a linear function of the length of the key. "Seems-like-security-but-isn't" tricks People sometimes think that using a weird SSID, or a long SSID is a factor of security. It isn't. Avoiding the broadcast of your SSID is not adding more security: as soon as someone is connected, everybody can get the SSID string... Filter MAC address: same issue, if someone is connected, by sniffing traffic (MAC address are not ciphered, even when there is WEP), with tcpdump or ethereal, you can easily get its MAC address, and change your own. Use WEP: That's very easy! Just stay quietly and sniff traffic. Then, launch something like AirSnort, and two hours later, you have the WEP key... WIRELESS SECURITY ARCHITECTURE FOR CAMPUS NETWORK 8/37
9 "Seems-like-security-but-isn't" tricks Use evident keys, but modified (like i_ 0v3_my_c47): totally useless. The best way to secure a WEP key is to use hexadecimal, to have unprintable characters, to take the longer possible, and to change them often. It is not more secure, but may discourage an attacker. Avoid the use DHCP, just configure legitim clients manually. That's totally useless. I just have to sniff the traffic, to know who is connected, and take an unused IP address. Guillaume-Jean Herbiet Grégory Nou 9/37
10 IMPROVING SECURITY IN WIRELESS NETWORKS Improving security in wireless networks Security in 802.1x Basic description The architecture compliant to norm 802.1x is using 3 different entities : - the supplicant - the authenticator - the authentication server The supplicant is the client which wants to use the resources of the network. To be more precise, the client contains a supplicant, which is responsible for responding to Authenticator data that will establish its credentials. The authenticator is the system which controls the access gate. It may be a switch, in the case of a wired network, or an access point, in the case of Wi-Fi. The same remark applies to the authenticator: in fact, the access point contains an authenticator, but is not an authenticator. Client's data flows can be separated in two classes: - Authentication frames, using Extensible authentication Protocol (EAP 1 RFC 2284) - Other frames are blocked, before authentication. Then, the port on the gate is opened, and frames can move freely. The authentication server is generally a RADIUS server (see RFC 2865). During the authentication, the access point behaves like a simple passive relay, and do not interpret dialog between the supplicant and the RADIUS server. Port-based authentication 802.1x uses what is called port-based authentication. As explained by the 802.1X-2001 standard: Port-based network access control makes use of the physical access characteristics of IEEE 802 LAN infrastructures in order to provide a means of authenticating and authorizing devices attached to a LAN port that has point-to-point connection characteristics, and of preventing access to that port in cases which the authentication and authorization fails. A port in this context is a single point of attachment to the LAN infrastructure. 1EAP was originally used for dial-up connection The identity was the username, and either CHAP or PAP authentication was used to check user's password. Since the identity is sent in clear, "identity hiding" is used : before sending the real identity, a encrypted TLS tunnel is set up. WIRELESS SECURITY ARCHITECTURE FOR CAMPUS NETWORK 10/37
11 Security in 802.1x Fig 6 : 801.1X port authentication Let's describe what happen when a wireless node (WN) comes in a 802.1X wireless network : - The access point (AP) asks the WN for its identity. As said before, the AP will drop all traffic which is not EAP. We say that the port is closed - After the identity has been sent, the authentication process begins. The protocol used between WN and AP is an EAP encapsulation over LAN (EAPOL). Then, the AP reencapsulates the EAP messages to RADIUS format, and sends them to Authentication Server (AS). If the authentication is successful, the AS sends success message, and the AP opens the port for the supplicant. - After a successful authentication, the supplicant is granted access to other LAN resources. Here is the Port authentication mechanism: Guillaume-Jean Herbiet Grégory Nou 11/37
12 IMPROVING SECURITY IN WIRELESS NETWORKS Fig 7 : 801.X port authentication machanism When authorized, the port is controlling the session duration: it means that during a certain time (by default, 3600 seconds), the client remains authenticated without doing anything special. Note also that Client and Access point usually resend every unacquainted packets every 30 seconds. Authentication process As said before, EAP protocol is used encapsulated, first in EAPoL, then in RADIUS, and is always routable, since it is using the IP protocol. Fig 8 : Authentication process Now, we may describe the authentication process: - the client identifies itself, and associate to an access point, identified with its SSID. - to begin authentication, the client emits a EAPOL-START frame every 30 s - the access point sends a EAP-REQUEST.IDENTITY message to the client, who answer with a EAP-RESPONSE.IDENTITY, with its identity (EAP-ID) WIRELESS SECURITY ARCHITECTURE FOR CAMPUS NETWORK 12/37
13 Security in 802.1x - the access point guess the IP address of the authentication server, and sends him the EAP-RESPONSE.IDENTITY, encapsulated in a RADIUS request. (It could also ask every RADIUS server, until it get an answer) - the client and the RADIUS server exchange answer directly : the access point is used as a passive relay - the RADIUS server indicate the success or the failure of the authentication by sending a EAP-SUCCESS or a EAP-FAILURE. It allow the access point to decide whether or not it should open the port - if the authentication is successful, the client and the RADIUS server calculate a session key, called unicast key (see RFC 2548). The server sends it in the ACCESS- ACCEPT message - the Access point choose a ciphering key, called Global Key. This key is signed and ciphered with the session key sent by the RADIUS server, and then sent to the client through a EAPOL-KEY. Here is the visual version of the scenario: Fig 9 : Auhtentication mechanism 802.1X weaknesses Still, this protocol is not perfect: there is no mutual identification, so the system can be attacked with a MIM scenario (Man In the Middle), and and 802.1x were not conceived to work together, so a session hijack is possible. MIM attacks In the 802.1x architecture, access points are considered as trusted interfaces. They shouldn't. The asymmetric treatment of clients and access points is a major limitation of the protocol. Guillaume-Jean Herbiet Grégory Nou 13/37
14 IMPROVING SECURITY IN WIRELESS NETWORKS Another vector of MIM attack is the fact that the client can go to the authorized state, even if it is already in this state. It is possible for a hacker to forge its own EAP SUCCESS packet, and to make the client think the attacker is the access point. The MIM attack makes useless all authentication mechanism. Session hijacking attacks In 802.1x, authentication s done after association. Therefore, there are 2 state machines : the RSN one (Robust Security Network) and the one of 802.1x, which can be desynchronized : 1. the legitimate client authenticate 2. the hacker sends to the client a MAC DISASSOCIATE message, using as source address the access point MAC address 3. the legitimate client is disconnected, but from the access point's point of view, the client is still authorized 4. using the legitimate client MAC address, the hacker has access to the network. Conclusion EAP was first used in point to point connexions, which need a physical connexion, but it is not adapted to wireless network specificities. That's why some more work was done... Security in i As the WEP encryption showed it s weaknesses and 802.1x was only defining a frame for authentication but didn t implemented a specific method for sharing keys, IEEE and the Wi-Fi Alliance worked on a new architecture called i. Edited in April 2003, the WPA (Wi-Fi Protected Access) recommendation is reckoned as the second generation security tool for wireless network and is a subpart of the i standard. Finalized in June 2004, i comes with a third generation tool, called WPA2, incompatible with the previous releases as it uses AES algorithm for ciphering i relies on both and 802.1x for networking and authentication and comes with the following improvements: - Definition of multiple protocols for radio security - New method for distributing keys Security Architecture i comes with two new generations of security tools for Wi-Fi networks. The standard starts by defining a network with a high security level called RSN (Robust Security Network). RSN (Robust Security Network) A RSN relies on 802.1x for authentication and key management. Moreover, it provides an access control built on a strong authentication of the upper layers. The architecture provides a client authentication independent from the fact that he client is in its home network or in a foreign network. To satisfy this requirement, a centralized authentication server is most commonly used (as the client then doesn t care about which access point he is associated to). In some cases, a distributed or delegated server can be used provided that a global coherence is periodically maintained by synchronizing the different servers. WIRELESS SECURITY ARCHITECTURE FOR CAMPUS NETWORK 14/37
15 Security in i Fig 10 : Security levels in 802.1x Each i access point is an authenticator and establishes a secured exchange channel with the authentication server. As i doesn t describe witch method to use to achieve this operation, protocols like RADIUS, IPSec or TLS/SLL are possible solutions. Key exchange using EAP The i access point and the authentication server perform a mutual authentication using EAP and generate a master key, or PMK (Pairwise Master Key). Elements of this procedure are transmitted through a secured canal with different parameters for every i client. The PMK Key is then shared between the i and the access point. For better security, they use a 4-way handshake protocol based on EAPoL (EAP over LAN) to perform the following operations: - confirm the existence of the PMK - confirm the start of use of the PMK - compute the PTK (Private Transient Key) from the PMK - start using ciphering and integrity keys on frames - confirm the use of keys Guillaume-Jean Herbiet Grégory Nou 15/37
16 IMPROVING SECURITY IN WIRELESS NETWORKS Fig 11 : The four-ways handshake in i Radio security protocols As WEP was reckoned inefficient to secure networks, two additional mechanisms have been added to i: - TKIP (Temporal Key Integrity Protocol), successor of WEP - CCMP (Counter-mode/CBC-MAC Protocol) which uses the ciphering algorithm AES (Advanced Encryption Standard) in CCM mode and a MIC signature. TKIP Protocol TKIP is a ciphering protocol destined to ameliorate WEP. It generates WEP keys dynamically using periodical 802.1x re-authentications. TKIP implements a RC4 ciphering algorithm and adds a 64 bits signature call MIC (Message Integrity Code). The RC4 key (128 bits) is calculated from a counter of 48 bits (Transmit Sequence) transmitted in clear text with every frame and from a Temporal Key. WIRELESS SECURITY ARCHITECTURE FOR CAMPUS NETWORK 16/37
17 Authentication in wireless networks Fig 12 : TKIP frame CCMP Protocol CCMP is based on AES (Advanced Encryption Standard) and uses both CCM and CBC- MAC for confidentiality and authentication. CCMP ciphers the payload of an MPDU (MAC Protocol Data Unit) and encapsulates the resulting ciphered text and then increments the packet number (PN) in order to have a different packet number for each MPDU. Ciphered RSN Header 8 bytes Data >= 1 byte MIC 8 bytes Fig 13 : CCMP frame Wi-Fi Protected Access (WPA) WPA is a subset of the i standard which includes 802.1x and TKIP and was created to replace WEP and its weaknesses. WPA was a transitional standard and is already being replaced by WPA2. Fig 14 : WPA RSN frame The two versions are incompatible since WPA uses RC4 for ciphering and TKIP for radio security and WPA2 implements AES and CCMP. Besides, as no AES algorithm doesn t exist in hardware, the use of WPA2 requires a replacement of the old hardware. Fig 15 : WPA2 RNS frame in i Authentication in wireless networks After detailing several techniques about how authenticate people using 802.1x or i techniques. But to perform securely this authentication, the use of lower level protocols, able to transport safely data during this process. Guillaume-Jean Herbiet Grégory Nou 17/37
18 IMPROVING SECURITY IN WIRELESS NETWORKS Kerberos Grounded on a client/distributed server architecture, Kerberos relies on one or several servers to provide an authentication service where client and servers trust the Kerberos mediation to authenticate mutually. Kerberos is an authentication protocol with symmetric ciphering which utilization prevents a pirate who listens to a client to take his identity. This system allows a user proving his identity to a server without sending any data to the network, preventing a third party to discover the authentication code. To realize this, Kerberos introduces a new server called ticket server or TGS (Ticket Granting Server) which provides tickets to users that have been authenticated by the Authentication Server (AS). Fig 16 : Kerberos authentication RADIUS (Remote Authentication Dial-In User Server) RADIUS was developed due to Internet Service Providers willing to deploy a centralized architecture for remotely managing client data with three functional layers: - User with a login/password, which will be a 802.1x supplicant in our case - Network Access Server (NAS) making the interface with the authentication server (802.1x authenticator in our case) - RADIUS server, used for 802.1x authentication. This is the interface with the database managing the user accounts. User (supplicant) Acces point (authenticator) RADIUS Auhtentication server EAP Packet filtering Database client accounts EAP/LAN EAP/RADIUS NAS 802.1x RADIUS LDAP/ODBCMAP Fig 17 : Radius and customer database RADIUS is specified in the following RFCs: - RFC 2865 RADIUS Bases - RFC 2866 RADIUS Accounting (billing, etc.) WIRELESS SECURITY ARCHITECTURE FOR CAMPUS NETWORK 18/37
19 Authentication in wireless networks - RFC 2869 RADIUS Extensions RADIUS messages are carried over UDP on ports 1812 (radius) and 1813 (radacct). The NAS sends authentication requests to the RADIUS server which is linked to a client database (LDAP, ODBC, etc.). The association NAS-RADIUS server is protected with a shared secret called RADIUS secret. Fig 18 : RADIUS packet Using this secret, the NAS produces ACCEPT-REQUEST messages with a 16 bytes random number called Authenticator. The RADIUS server answers with one of the following possible replies: - ACCESS-CHALLENGE - ACCESS-REJECT - ACCESS-SUCCESS Those messages are signed by a MD5 fingerprint called RESPONSE-AUHTENTICATOR calculated using the content of the message; the Authenticator number and the shared secret. To prevent Man In the Middle (MIM) attacks, RADIUS request delivered by the NAS are signed by a MESSAGE-AUTHENTICATOR attribute, which is a HMAC22 (RFC 2104) of the message encoded with the secret RADIUS as a key. To enhance security, some architectures rely on IPSec. EAP (Extensible Authentication Protocol) EAP (Extensible Authentication protocol) has become the most commonly used tunnel for realizing the authentication itself. A vast choice of mechanisms is possible. Among them, EAP-TLS is reckoned as the secure standard of the moment, and has been chosen by both mobile networks operators and software developers like Microsoft. PEAP (Protected EAP) is another upcoming standard, pushed forward by the Redmond Firm. EAP-TLS (Transport Layer Security) EAP-TLS is one of the best know and best considered authentication technique. It is reckoned as safe and secure thanks to the mutual authentication that is performed. TLS is in fact an extension of SSLv3, which is widely used for application-level authentication between client and web server. Defined in RFC 2716, EAP-TLS relies on a PKI type infrastructure. The RADIUS server and the client of the network both own a certificate delivered by a common Certificate Authority. The authentication server can check if the client certificate is invalid. On the other side, the client can check the validity of the server certificate. The use of a private key by the 802.1x client raises the critical problem of the security required by its storage and. In usual systems, this security is ensured by using password Guillaume-Jean Herbiet Grégory Nou 19/37
20 IMPROVING SECURITY IN WIRELESS NETWORKS allowing deciphering and using the private key. However, the authentication based on certificates requires a strong Public Key Infrastructure (PKI). PEAP (Protected Extensible Authentication Protocol) In the case where a PKI isn t already deployed, there are other methods of authentication, providing a similar level of security without using certificates. EAP-TTLS (EAP with Tunneled Transport Layer Security) and PEAP keep with the cryptographic functions of EAP- TLS but use different mechanisms to authenticate the client. These protocols start by establishing TLS secured tunnel, after what the client authenticates the server. Fig 19 : PEAP and EAP-TTLS tunnels At a second stage, authentication packets are exchanged. TTLS exchanges Attribute-Value Pairs (AVP) with a server that validates it for any authentication type. PEAP uses the TL canal to protect a second EAP exchange, the identity of the client is therefore protected during the exchange. Fig 20 : PEAP principle Layer 3 security Layer 3 security is not «yet another wireless security protocol». It's a set of tools which were developed, or taken from wired world, to satisfy the needs of the security before 802.1x and i were released. Most of these features work on the IP packets, and that's why we are talking of Layer 3. However, we won't only focus on Network Layer. Some mechanisms are derived from previously existing in Layer 3, but actually work on Layer 2 (data link) or on Layers 4 / 5 (Transport, application). Two main points will be discussed: PKI (Public Key Infrastructure), VPN (Virtual Private Networks) and encrypted tunneling via IPSec or SSL. Public Key Infrastructures A PKI (public key infrastructure) enables users of a basically unsecured public network such as a Wi-Fi network to securely and privately exchange data and money through the use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority. WIRELESS SECURITY ARCHITECTURE FOR CAMPUS NETWORK 20/37
21 Layer 3 security The public key infrastructure provides for a digital certificate that can identify an individual or an organization and directory services that can store and, when necessary, revoke the certificates. Although the components of a PKI are generally understood, a number of different vendor approaches and services are emerging. Meanwhile, an Internet standard for PKI is being worked on. The public key infrastructure assumes the use of public key cryptography, which is the most common method on the Internet for authenticating a message sender or encrypting a message. Traditional cryptography has usually involved the creation and sharing of a secret key for the encryption and decryption of messages. This secret or private key system has the significant flaw that if the key is discovered or intercepted by someone else, messages can easily be decrypted. For this reason, public key cryptography and the public key infrastructure is the preferred approach on the Internet. (The private key system is sometimes known as symmetric cryptography and the public key system as asymmetric cryptography.) A PKI consists of: - A certificate authority (CA) that issues and verifies digital certificate. A certificate includes the public key or information about the public key, - A registration authority (RA) that acts as the verifier for the certificate authority before a digital certificate is issued to a requestor, - One or more directories where the certificates (with their public keys) are held, - A certificate management system. Still, a unique CA for the world is not possible. That's why a distributed PKI was created, where CA are authorized to certify other CA. This way, a hierarchy of certificates now exists. The sequence of certificates is called a path of certification, and following the path, you may be sure of the identity of the owner of the certificate. However, it is not possible for everybody to entirely trust only one root PKI. It was decided to use Cross-Certification. Fig 21 : Certification path To use this infrastructure globally, some standardization should be achieved. RSA labs are making a huge effort with PKCS (Public Key Cryptography Standards), which are widely used. In the same time, IETF is producing more general norms, like RFC PKIX (Public Key Infrastructure X.509), but this work is far from being complete for the moment. Guillaume-Jean Herbiet Grégory Nou 21/37
22 IMPROVING SECURITY IN WIRELESS NETWORKS Level 3 VPN A virtual private network (VPN) is a network that uses a public telecommunication infrastructure, such as the Internet, to provide remote offices or individual users with secure access to their organization's network. A virtual private network can be contrasted with an expensive system of owned or leased lines that can only be used by one organization. The goal of a VPN is to provide the organization with the same capabilities, but at a much lower cost. A VPN works by using the shared public infrastructure while maintaining privacy through security procedures and tunneling protocols like IPSec. In effect, the protocols, by encrypting data at the sending end and decrypting it at the receiving end, send the data through a "tunnel" that cannot be "entered" by data that is not properly encrypted. An additional level of security involves encrypting not only the data, but also the originating and receiving network addresses. Today, most of VPN are using IPSec or SSL. In a nutshell, IPSec gives some interesting protections: - confidentiality - integrity - non-repudiation - authentication - protection against traffic analysis The ESP header (Encapsulated Security Payload) signifies that data in the IPSec tunnel are ciphered. The AH (Authentication Header) signifies that data will be protected against malicious modifications. A protocol named IKE (Internet Key Exchange) is used to exchange secret keys before the tunnel is established. (Also note that IPSec is included in IPv6) SSL-TLS stands for: Secure Sockets Layer - Transport Layer Security. It was developed by Netscape, to provide security with HTTP or FTP. In our five layer model, we would have to add the SSL layer between application and TCP (a kind of layer 4.5) In the case of a Wi-Fi connection, that means that the client will use WEP to connect to the Access Point, and then will establish a tunnel between the gateway and itself. Other solutions Two other solutions may be proposed to protect a network against unauthorized connection (although they do not provide secure Wi-Fi connection) Virtual LANs A VLAN can be defined using lots of parameters: port number, used protocol, MAC address, IP address, application. The first use of VLAN in Wi-Fi is that it is a way to force entering flows to go through a Security Server. If we put all access points on the same VLAN, we are quite sure Wi-Fi clients won't be able to connect to protected resources unless they're identified. WIRELESS SECURITY ARCHITECTURE FOR CAMPUS NETWORK 22/37
23 Layer 3 security It is also possible to use VLAN to balance traffic, and to monitor entries on the Wi-Fi network. Firewalling Basically, a firewall inspects traffic and decides whether it should accept or drop packets, using rules the administrator gave. You may for example decide that everybody can access to the web server, but from the Wi-Fi, you cannot access the internal FTP server. Guillaume-Jean Herbiet Grégory Nou 23/37
24 DEPLOYING A SECURED ARCHITECTURE Deploying a secured architecture After analyzing several solutions for providing a secure access to a wireless network, we will draw a possible design for a concrete application in the Georgia Tech Lorraine campus. The described solution should be able to meet the requirements detailed in the introduction of this document, i.e. perform a secure Authentication, provide Authorization to the trusted users and realize Accounting of the use made of the network. This section will briefly describe and justify the choice of implementation we have chosen and then describe in details the installation and configuration process of the different tools we selected. A secure design for campus application As WEP is reckoned not to be secure enough, our wish is to deploy at least WPA (or WPA if most devices are found compatible) over a 802.1x based architecture. This deployment aims to provide a AAA (Authentication, Authorization, Accounting) secure solution, and should be compatible with a much platforms (OSes and material) as possible. Therefore, our architecture will consist of: - A RADIUS server compatible with several EAP variations - Access points wit 802.1x and WPA activated - TLS tunneled method relying on PEAP. This architecture was deployed on a testing platform consisting of a virtual machine running CEntOS (Community Enterprise Operation System), a Red Hat based Linux distribution. Installing FreeRADIUS This section shows how to use open source projects to create a secured infrastructure. There are two reasons for this step. There are two specific projects that we're going to discuss: OpenSSL and FreeRADIUS: - OpenSSL provides cryptographic primitives as well as some command line tools for creating and manipulating public key certificates. We use OpenSSL to help build a limited PKI. - We use FreeRADIUS to provide the authentication server using the RADIUS protocol as the central point of our infrastructure. Obtaining certificates As we are going to be using WPA with server-based keys in a medium to large organization, you'll need a public key infrastructure. Rather than focus on the details of establishing an entire certificate authority, we're going to build self-signed certificates using OpenSSL. This approach is sufficient for testing, or for a small-to-medium-sized network. In a further step, the need of deploying a PKI will be replaced by the use of the LDAP directory to manage identities and certificates. WIRELESS SECURITY ARCHITECTURE FOR CAMPUS NETWORK 24/37
25 Installing FreeRADIUS Downloading and compiling OpenSSL The latest version of OpenSSL can be downloaded from At the time of this writing, the most recent version was openssl-0.9.8a. This is the version we'll use in our examples, but you should be able to use later versions when they are released. Before using a newer version, check with the FreeRADIUS site to see whether an older version of OpenSSL is required; the two projects are not well synchronized at the moment. Once you download the file, you need to change your working directory to the location where you place source code, in other words, /usr/local/src, and check the digital signature on the following file and untar it. cd /usr/local/src tar xvfz openssl-0.9.8a.tar.gz The OpenSSL development team has made the compilation of OpenSSL easy and straightforward, as shown in the following syntax under any Linux distribution. However, we need to be careful not to overwrite the current installation of OpenSSL when using any Red Hat based distribution because that will break some of the precompiled programs in your operating system distribution. Therefore, the following commands install OpenSSL in the /usr/local directory so we didn't overwrite the previous installed version. cd openssl-0.9.8a./config shared --prefix=/usr/local/openssl make make install Configuring OpenSSL for our needs Once OpenSSL is installed, we need to make some minor changes to the configuration files to make it easier to make certificates. The file that requires editing is /usr/local/openssl/ssl/openssl.cnf. The changes only involve modifying the default values for some of the options in certificate requests. They also allow increasing the length of time a certificate is valid. We provide here and relevant extract of our openssl.cnf file with the modifications we ve made: # req_extensions = v3_req # The extensions to add to a certificate request [ req_distinguished_name ] countryname = Country Name (2 letter code) countryname_default = FR countryname_min = 2 countryname_max = 2 stateorprovincename stateorprovincename_default localityname localityname_default = State or Province Name (full name) = Lorraine = Locality Name (eg, city) = Metz Guillaume-Jean Herbiet Grégory Nou 25/37
26 DEPLOYING A SECURED ARCHITECTURE 0.organizationName 0.organizationName_default = Organization Name (eg, company) = Georgia-Tech Lorraine # we can do this but it is not needed normally :-) #1.organizationName = Second Organization Name (eg, company) #1.organizationName_default = World Wide Web Pty Ltd organizationalunitname = Organizational Unit Name (eg, section) organizationalunitname_default = College of Computing commonname = Common Name (eg, YOUR name) commonname_max = 64 commonname_default = Test address = Address address_max = 64 address_default = [email protected] # SET-ex3 = SET extension number 3 [ req_attributes ] challengepassword = A challenge password challengepassword_min = 4 challengepassword_max = 20 challengepassword_default = whatever unstructuredname = An optional company name Generating the required certificates There are several steps involved in creating certificates that you can use with 802.1X. First, we need to create a certificate authority certificate. This is self-signed; in other words, the certificate authority attests to the validity of itself. While this might surprise you, it is the commonly accepted method for creating a root certificate. Once the certificate authority, or root, is created, you need to create a server certificate for our RADIUS server. To generate those certificates, we have used two scripts both located in /usr/local/src/scripts and called CA.root, CA.server. They respectively autogenerate the self-signed root and server dedicated certificates using the previously defined openssl.cnf file. The output of those scripts is files with extension.der,.p12 and.pem. As.p12 files are only a temporary format, we copy.der and.pem files for root and server certificates in a separate directory for further use. [root@gtl-dhcp-232 etc]# ls /usr/local/1x/etc/ DH gtl-dhcp-232.der gtl-dhcp-232.pem random root.der root.pem We can now install and set up the FreeRADIUS server. Setting up FreeRadius The most recent version of FreeRADIUS can be downloaded from the Web site The most recent version at the time of writing is This is the version we used in our tests. WIRELESS SECURITY ARCHITECTURE FOR CAMPUS NETWORK 26/37
27 Installing FreeRADIUS Installation The download of the FreeRADIUS sources can be operated using the following set of commands: cd /usr/local/src wget ftp://ftp.freeradius.org/pub/radius/freeradius tar.gz tar zxfv freeradius tar.gz cd freeradius Compiling FreeRADIUS is also really easy and similar to the installation of OpenSSL except that we have to specify several paths to configure the makefile properly in order to enable SSL support required for PEAP. This is done using the following lines of commands: /configure --with-openssl-includes=/usr/local/openssl/include --with-openssl-libraries=/usr/local/openssl/lib --prefix=/usr/local/radius make && make install The binaries are installed in /usr/local/radius/bin and /usr/local/radius/sbin. The configuration files are found under /usr/local/radius/etc/raddb. Configuration Now, we are ready to make the changes to the various FreeRADIUS configuration files. There are three files that must be modified. The files are clients.conf, radiusd.conf, and users. clients.conf The clients.conf file is responsible for determining who/what can connect to the RADIUS server to authenticate users. In our case, we want the access points to be able to connect. There are two ways to enter the access point information. First, list each access point individually. Second, list a subnet. A key point for security here is that if we decide to use the subnet approach, all of the access points will use the same password not the best idea from the standpoint of security; however, if you have hundreds of access points, a separate password for each becomes a management nightmare. Specifying an access point at a time can be done by using the following template. client <ipaddress> { secret = <password> shortname = <descriptive_name_for_accounting_purposes> } The second approach is to use a single entry for an entire local area network of access points. This can be realized using the following template. client <subnet>/<mask> { secret = <password> shortname = LAN } Guillaume-Jean Herbiet Grégory Nou 27/37
28 DEPLOYING A SECURED ARCHITECTURE As we only had a single access point during our test, we used the first approach by adding the following entry: client { secret shortname nastype } = HackMe = TestingAP = cisco radiusd.conf This is the big and mighty main configuration file for FreeRADIUS. It's so big that it has been split into several smaller files that are just "included" into the main radius.conf file. Before editing this file, we need to create two new files, /usr/local/radius/etc/raddb/dh and /usr/local/radius/etc/raddb/random, as part of the changes. The contents of both of these files need to be random so you use the Linux random device to create files with the following commands: dd if=/dev/random of=/usr/local/radius/etc/raddb/random count=1 bs=128 dd if=/dev/random of=/usr/local/radius/etc/raddb/dh count=1 bs=128 This creates two files with 128 random bytes each. As this file is really big, we will only provide the important sections that should be enabled to provide PEAP encrypted tunnels with an MS-CHAPv2 authentication mechanism. # under MODULES, make sure mschap is uncommented! mschap { # authtype value, if present, will be used # to overwrite (or add) Auth-Type during # authorization. Normally, should be MS-CHAP authtype = MS-CHAP } # if use_mppe is not set to no, mschap will # add MS-CHAP-MPPE-Keys for MS-CHAPv1 and # MS-MPPE-Recv-Key/MS-MPPE-Send-Key for MS-CHAPv2 # use_mppe = yes # if mppe is enabled, require_encryption makes # encryption moderate # require_encryption = yes # require_strong always requires 128 bit key # encryption # require_strong = yes authtype = MS-CHAP # The module can perform authentication itself, OR # use a Windows Domain Controller. See the radius.conf file # for how to do this. WIRELESS SECURITY ARCHITECTURE FOR CAMPUS NETWORK 28/37
29 Installing FreeRADIUS [...] authorize { preprocess mschap suffix eap files } authenticate { # # MSCHAP authentication. Auth-Type MS-CHAP { mschap } } # # Allow EAP authentication. eap eap.conf This is one of the file included in radiusd.conf. It is used to specify all the EAP-related configuration. This is where we will specify we want to use PEAP and give the path to the certificates we have generated. eap { default_eap_type = peap [...] tls { private_key_password = whatever private_key_file = /usr/local/1x/etc/gtl-dhcp-232.pem certificate_file = /usr/local/1x/etc/gtl-dhcp-232.pem } } [...] peap { } [...] # Trusted Root CA list CA_file = /usr/local/1x/etc/root.pem dh_file = /usr/local/1x/etc/root.pem random_file = /usr/local/1x/etc/random [...] default_eap_type = mschapv2 users The user information is stored in a plain text file users. As for the moment we don t use LDAP to manage credentials, we will directly add some users to this file. We only have to enter their logins and passwords as follows: "test" "bob" "guillaume" User-Password == "test" User-Password == "hello" User-Password == "password" Guillaume-Jean Herbiet Grégory Nou 29/37
30 DEPLOYING A SECURED ARCHITECTURE Starting the RADIUS server We are now ready to start the server. Because FreeRADIUS may be using a different version of OpenSSL than the one installed on your system, we need to build a custom shell to start the FreeRADIUS daemon in a way that it can find the OpenSSL libraries. We used the run-radiusd script created by Adam Sulmicki, as follows. #!/bin/bash -x export LD_LIBRARY_PATH=/usr/local/openssl/lib export LD_PRELOAD=/usr/local/openssl/lib/libcrypto.so /usr/local/radius/sbin/radiusd $@ Now, FreeRADIUS can be started in debug mode from a shell, as follows: run-radiusd X A The debug mode will allow us to see all RADIUS operation directly in the console. However, a log file (located in /usr/local/radius/var/log/radius/radius.log) stores all this information. Setting up the access point The following sections give some practical examples of configuring the Cisco products via their Web interface. Configuring a Cisco AP to use IEEE 802.1X is straightforward and involves only a few changes to the AP configuration. This section uses the Web management interface, but you can do this configuration via the console as well. Fig 22 : First Cisco AP configuration screen This screen is the first of the two screens in which you do all of your work. The first step is to enter the IP address for your FreeRADIUS server. Then, enter the RADIUS common port numbers, 1812 for authentication and 1813 for accounting. Don t forget to enter the shared secret that you used when you set up the file clients.conf as part of the FreeRADIUS configuration earlier. WIRELESS SECURITY ARCHITECTURE FOR CAMPUS NETWORK 30/37
31 Installing FreeRADIUS Fig 23 : Second Cisco AP configuration screen The second part of the configuration of the access points allows you to specify that you want to use a WPA key in your network. Leaving EAP and MAC setting to default is sufficient. The access point is now ready, the last step is to configure the client to access the network. Setting up the client First, you need to get the root.der certificate generated on the RADIUS server and install it on your computer. Under Windows, simply double-click on the file and select Install certificate. Fig 24 : Certificate information Guillaume-Jean Herbiet Grégory Nou 31/37
32 DEPLOYING A SECURED ARCHITECTURE On the certificate installation wizard, simply chose next as the default choices are fine. A success message should appear. You now officially trust the RADIUS server! Then you need to configure your wireless settings to properly connect to our secure network. On the Wireless Network tab, select the network and click Configure to open the network properties. Then: - Select the Authentication tab - Select Protected EAP on the drop-down list - Click Properties - Enable "Validate server certificate" - In Trusted Root Certification Authorities list, enable the Georgia-Tech Lorraine certificate. - In Select Authentication Method, select "Secured password (EAP-MSCHAPv2)" - Click Configure - If desired, enable "Automatically use my Windows logon name and password". Fig 25 : Client configuration process WIRELESS SECURITY ARCHITECTURE FOR CAMPUS NETWORK 32/37
33 Interfacing with the LDAP directory Interfacing with the LDAP directory Overview What is a Directory Service? A directory is a database structure that is generally optimized for reading, searching, and browsing entries. Directories tend to contain descriptives and attribute-based information, and they usually support filtering capabilities for the purpose of delivering faster and more accurate search results. Directories should be tuned to give a quick response to high-volume lookups. They might have the ability to replicate information between similar servers to increase availability and reliability of the provided service. When database information is replicated between the servers, temporary inconsistencies between the replicas could occur and should be synchronized in a short amount of time to preserve the reliability of information. What is LDAP? LDAP stands for Lightweight Directory Access Protocol. The LDAP information model contains a number of individual records known as entries, which represent a collection of attributes that has a globally unique distinguished name (DN). Each of the entry's attributes has a type and one or more values. The types are typically strings, like uid for user identification, cn for common name, sn for surname, or mail for address. The syntax of values depends on the attribute type. For example, a cn attribute might contain the value Gregory Nou, and a mail attribute might contain the value [email protected]. In LDAP, directory entries are arranged in a hierarchical tree-like structure. The next figure shows a directory structure example. Traditionally, this structure reflected geographic or organizational boundaries. Entries representing countries appear at the top of the tree, and below them are entries representing national organizations. Below them might be entries representing organizational units, people, printers, documents, or just about anything else you can think of. Alternatively, the directory structure can be based on domain names, which is becoming increasingly popular. As you can see in the next figure, the directory structure we planned is based on domain name (i.e., dc=georgiatech-metz, dc=fr) instead of o=georgiatechmetz, c=fr, which would represent a geographic location. How Does LDAP Work? The LDAP directory service is based on a client/server model, where one or more LDAP servers contain the data making up the directory information tree. The client connects to the LDAP server and requests specific information, typically by issuing a search function. The server addresses its database and responds with an appropriate answer or otherwise points to the directory server where the client can get this information. No matter which LDAP server a client connects to, it sees the same view of the directory. Thus, a name presented to one LDAP server references the same entry as another LDAP server, making it an important feature of a global directory service. Installing and configuring Installing Installing OpenLDAP is quite easy on redhat... Just type (as root) : Guillaume-Jean Herbiet Grégory Nou 33/37
34 DEPLOYING A SECURED ARCHITECTURE yum install openldap-servers && yum install openldap-clients Then comes the tricky part :) It's now time to edit slapd.conf, which is the configuration file of ldap server. As we will use LDAP with radius, it could be a good idea to add a new schema : RADIUS- LDAPv3.schema. A schema specifies, among other rules, the types of objects that a directory may have and the mandatory and optional attributes of each object type. The LDAP v3 defines a schema RFC 2252 and 2256) based on the X.500 standard for common objects found in a network, such as countries, localities, organization, users/persons, groups and devices. We will generate a new password using the command slappasswd -h {SSHA} and we should change the access control list, by adding: access to attribute=userpassword by dn="cn=admin,dc=georgiatech-metz,dc=fr" write by anonymous auth by self write by * none access to * by dn="cn=admin,dc=georgiatech-metz,dc=fr" write by users read by * none Now, as root, we can start the LDAP server: # /etc/init.d/slapd start or more easily : slapd Now, we can add our first piece of data in the directory : dn: dc=georgiatech-metz,dc=fr objectclass: organization o: GTL dn: cn=admin,dc=georgiatech-metz,dc=fr objectclass: organizationalrole objectclass: simplesecurityobject cn: admin description: LDAP administrator userpassword: {SSHA}N95/ff6AEJSDOhmCgjT+vRym7nHAf9bw Putting it in a.ldif file, we then can type : ldapadd -W -x -D cn=root,dc=georgiatech-metz,dc=fr -f initial.ldif Now, let's set up OpenLDAP for 802.1x It would be great to create a separate LDAP subtree for 802.1x devices. This is a good idea to do so, because in our case, we could already have aldap directory to identify users on unix machines, without willing to provide to every of them a Wi-Fi access: dn: cn=dot1x,dc=cs,dc=,dc=edu objectclass: container WIRELESS SECURITY ARCHITECTURE FOR CAMPUS NETWORK 34/37
35 Interfacing with the LDAP directory cn: dot1x structuralobjectclass: container Now, we are ready to add 802.1x users : dn: uid=somehost,cn=dot1x,dc=cs,dc=school,dc=edu objectclass: top objectclass: radiusprofile objectclass: inetorgperson cn: somehost sn: somehost uid: somehost description: 802.1x user radiusfilterid: "Enterasys:version=1:policy=Student User" userpassword: somepassword This password in userpassword can be encrypted or not. It is not really important, as only the user and the admins may have access to it. Also note the field radiusfilterid, which is an additional piece of information, which can be supplied to the switch. In this example, it it a Enterasys switch, which will assigne a policy "Student User" to the machine that authenticate as somehost Now, we are ready to modify FreeRADIUS configuration file, radiusd.conf : ldap ldap_1x { server = "locahost" identity = "uid=onex,cn=users,dc=georgiatech-metz,dc=fr" password = "password" basedn = "dc=georgiatech-metz,dc=fr" base_filter = "(objectclass=radiusprofile)" # as it is on localhost, we do not use TLS # profile_attribute = "radiusprofiledn" access_attr = "radiusfilterid" dictionary_mapping = ${raddbdir}/ldap.attrmap authtype = ldap ldap_connections_number = 5 timeout = 4 timelimit = 3 net_timeout = 1 } Then, we need to add ldap_1x in the authorize section of radiusd.conf. Using PEAP with OpenLDAP If we need to use PEAP, we will need to add NT/LM hashes to every user record in the LDAP directory. The easiest thing to do may to set up Samba with LDAP. To make it short, that means adding the samba schema to our LDAP configuration. Another caveat is that we cannot use LDAP bind to authenticate users with PEAP, because it will always do MSCHAPv2 authentication in the inner tunnel and RAIDUS needs access to NT/LM hashes. Therefor, we need another user who will have the right access, and then change the access to userpassword, sambantpassword, and sambalmpassword. Guillaume-Jean Herbiet Grégory Nou 35/37
36 CONCLUSION Conclusion Today, no major constructor provides an already-made secured wireless network solution, and there is a reason to that: deploying such an infrastructure is complex, and is very timeconsuming, because each deployment will ask a different (and fine) tuning of applications to be used. As a matter of fact, our work was essentially about choices, trying to decide what is possible, and what is not, deciding where it is no more security, but paranoia, and how much user-friendly it should be. One of our greatest regret is lacking of time to deploy VPN and VLANs, as well as wireless IDS systems. We believe, from what we could read, that these tools are at least very important (and more often, mandatory) in a corporate network, or in a network with sensitive data, like in GTL, where there is labs. WIRELESS SECURITY ARCHITECTURE FOR CAMPUS NETWORK 36/37
37 References [1] Andrew A. Vladimirov, Konstantin V. Gavrilenko, Andrei A. Mikhailovsky. Wi-Foo : the Secrets of Wireless Hacking. Addison Wesley. June 2004 [2] Jon Edney, William A. Arbaugh. Real Security: Wi-Fi Protected Access and i. Addison Wesley. July 2003 [3] G. Pujolle. Sécurité Wi-Fi. Eyrolles. Oct [4] A. Géron. Wi-Fi, déploiement et Sécurité. Dunod. Nov [5] Extented EAP for WPA and WPA2, [6] Lars Strand X Port-Based Authentication HOWTO, [7] C. Rigney, S. Willens, A. Rubens, W. Simpson. RFC 2865: Remote Authentication Dial In User Service (RADIUS), [8] B. Aboba, D. Simon. RFC 2716: PPP EAP TLS Authentication Protocol, [9] L. Blunk, J. Vollbrecht. RFC 2284: PPP Extensible Authentication Protocol (EAP), [10] G. Zorn. RFC 2548 : Microsoft Vendor-specific RADIUS Attributes, [11] C. Blancher. La sécurité dans les réseaux : quoi de neuf depuis un an? In MISC #12, April [12] Rob Flickenger. Wi-Fi 200%: "wireless hacks". O'Reilly [13] P. Roshan, J. Leary. " Wireless LAN Fundamentals". Cisco Press Guillaume-Jean Herbiet Grégory Nou 37/37
Symm ym e m t e r t ic i c cr c yptogr ypt aphy a Ex: RC4, AES 2
Wi-Fi Security FEUP>MIEIC>Mobile Communications Jaime Dias Symmetric cryptography Ex: RC4, AES 2 Digest (hash) Cryptography Input: variable length message Output: a fixed-length bit
Configuring PEAP / LDAP based authentication using FreeRADIUS on Debian Sarge and Cisco AP1200, with WPA2 AES encryption
Configuring PEAP / LDAP based authentication using FreeRADIUS on Debian Sarge and Cisco AP1200, with WPA2 AES encryption Ivan Klimek Computer Networks Laboratory Technical University Kosice, Slovakia http://www.cnl.tuke.sk
Wireless security. Any station within range of the RF receives data Two security mechanism
802.11 Security Wireless security Any station within range of the RF receives data Two security mechanism A means to decide who or what can use a WLAN authentication A means to provide privacy for the
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
Authentication in WLAN
Authentication in WLAN Flaws in WEP (Wired Equivalent Privacy) Wi-Fi Protected Access (WPA) Based on draft 3 of the IEEE 802.11i. Provides stronger data encryption and user authentication (largely missing
CS 356 Lecture 29 Wireless Security. Spring 2013
CS 356 Lecture 29 Wireless Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
Application Note: Onsight Device VPN Configuration V1.1
Application Note: Onsight Device VPN Configuration V1.1 Table of Contents OVERVIEW 2 1 SUPPORTED VPN TYPES 2 1.1 OD VPN CLIENT 2 1.2 SUPPORTED PROTOCOLS AND CONFIGURATION 2 2 OD VPN CONFIGURATION 2 2.1
Lecture 3. WPA and 802.11i
Lecture 3 WPA and 802.11i Lecture 3 WPA and 802.11i 1. Basic principles of 802.11i and WPA 2. IEEE 802.1X 3. Extensible Authentication Protocol 4. RADIUS 5. Efficient Handover Authentication 1 Lecture
The following chart provides the breakdown of exam as to the weight of each section of the exam.
Introduction The CWSP-205 exam, covering the 2015 objectives, will certify that the successful candidate understands the security weaknesses inherent in WLANs, the solutions available to address those
Configuring Wired 802.1x Authentication on Windows Server 2012
Configuring Wired 802.1x Authentication on Windows Server 2012 Johan Loos [email protected] Version 1.0 Why 802.1x Authentication? The purpose of this document is to guide you through the procedure
Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2
BlackBerry Enterprise Service 10 BlackBerry Device Service Solution Version: 10.2 Security Technical Overview Published: 2014-09-10 SWD-20140908123239883 Contents 1 About BlackBerry Device Service solution
Computer Networks. Secure Systems
Computer Networks Secure Systems Summary Common Secure Protocols SSH HTTPS (SSL/TSL) IPSec Wireless Security WPA2 PSK vs EAP Firewalls Discussion Secure Shell (SSH) A protocol to allow secure login to
WIRELESS NETWORK SECURITY
WIRELESS NETWORK SECURITY Much attention has been focused recently on the security aspects of existing Wi-Fi (IEEE 802.11) wireless LAN systems. The rapid growth and deployment of these systems into a
Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example
Table of Contents Wi Fi Protected Access 2 (WPA 2) Configuration Example...1 Document ID: 67134...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...2 Conventions...2 Background Information...2
How To Test An Eap Test On A Network With A Testnet (Networking) On A Pc Or Mac Or Ipnet (For A Network) On An Ipnet Or Ipro (For An Ipro) On Pc Or Ipo
Chapter 6 - EAP Authentication This chapter describes using Extensible Authentication Protocol with FreeRADIUS. The following topics are discussed in this chapter: EAP Overview Types/Methods Testing with
ClickShare Network Integration
ClickShare Network Integration Application note 1 Introduction ClickShare Network Integration aims at deploying ClickShare in larger organizations without interfering with the existing wireless network
vwlan External RADIUS 802.1x Authentication
6ABSCG0002-29B July 2013 Configuration Guide vwlan External RADIUS 802.1x Authentication This configuration guide provides an in-depth look at external Remote Authentication Dial-In User Service (RADIUS)
Wireless Robust Security Networks: Keeping the Bad Guys Out with 802.11i (WPA2)
Wireless Robust Security Networks: Keeping the Bad Guys Out with 802.11i (WPA2) SUNY Technology Conference June 21, 2011 Bill Kramp FLCC Network Administrator Copyright 2011 William D. Kramp All Rights
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
Secure Socket Layer. Introduction Overview of SSL What SSL is Useful For
Secure Socket Layer Secure Socket Layer Introduction Overview of SSL What SSL is Useful For Introduction Secure Socket Layer (SSL) Industry-standard method for protecting web communications. - Data encryption
Configuring Security Solutions
CHAPTER 3 This chapter describes security solutions for wireless LANs. It contains these sections: Cisco Wireless LAN Solution Security, page 3-2 Using WCS to Convert a Cisco Wireless LAN Solution from
7.1. Remote Access Connection
7.1. Remote Access Connection When a client uses a dial up connection, it connects to the remote access server across the telephone system. Windows client and server operating systems use the Point to
WIRELESS SECURITY IN 802.11 (WI-FI ) NETWORKS
January 2003 January WHITE 2003 PAPER WIRELESS SECURITY IN 802.11 (WI-FI ) NETWORKS With the increasing deployment of 802.11 (or Wi-Fi) wireless networks in business environments, IT organizations are
Chapter 6 CDMA/802.11i
Chapter 6 CDMA/802.11i IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Some material copyright 1996-2012 J.F Kurose and K.W. Ross,
Topics in Network Security
Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure
Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide
Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead
How To Secure Your Network With 802.1X (Ipo) On A Pc Or Mac Or Macbook Or Ipo On A Microsoft Mac Or Ipow On A Network With A Password Protected By A Keyed Key (Ipow)
Wireless LAN Security with 802.1x, EAP-TLS, and PEAP Steve Riley Senior Consultant MCS Trustworthy Computing Services So what s the problem? WEP is a euphemism Wired Equivalent Privacy Actually, it s a
freeradius A High Performance, Open Source, Pluggable, Scalable (but somewhat complex) RADIUS Server Aurélien Geron, Wifirst, January 7th 2011
freeradius A High Performance, Open Source, Pluggable, Scalable (but somewhat complex) RADIUS Server Aurélien Geron, Wifirst, January 7th 2011 freeradius is... Multiple protocoles : RADIUS, EAP... An Open-Source
White paper. Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points. http://www.veryxtech.com
White paper Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points http://www.veryxtech.com White Paper Abstract Background The vulnerabilities spotted in the Wired Equivalent Privacy (WEP) algorithm
Yealink Technical White Paper. Contents. About VPN... 3. Types of VPN Access... 3. VPN Technology... 3 Example Use of a VPN Tunnel...
1 Contents About... 3 Types of Access... 3 Technology... 3 Example Use of a Tunnel... 4 Yealink IP Phones Compatible with... 5 Installing the Open Server... 5 Installing the Open Server on the Linux Platform...
Sync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
802.11 Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi [email protected]
802.11 Security (WEP, WPA\WPA2) 19/05/2009 Giulio Rossetti Unipi [email protected] 802.11 Security Standard: WEP Wired Equivalent Privacy The packets are encrypted, before sent, with a Secret Key
UNIVERZITA KOMENSKÉHO V BRATISLAVE FAKULTA MATEMATIKY, FYZIKY A INFORMATIKY PRÍPRAVA ŠTÚDIA MATEMATIKY A INFORMATIKY NA FMFI UK V ANGLICKOM JAZYKU
UNIVERZITA KOMENSKÉHO V BRATISLAVE FAKULTA MATEMATIKY, FYZIKY A INFORMATIKY PRÍPRAVA ŠTÚDIA MATEMATIKY A INFORMATIKY NA FMFI UK V ANGLICKOM JAZYKU ITMS: 26140230008 DOPYTOVO ORIENTOVANÝ PROJEKT Moderné
Generating and Installing SSL Certificates on the Cisco ISA500
Application Note Generating and Installing SSL Certificates on the Cisco ISA500 This application note describes how to generate and install SSL certificates on the Cisco ISA500 security appliance. It includes
The Importance of Wireless Security
The Importance of Wireless Security Because of the increasing popularity of wireless networks, there is an increasing need for security. This is because unlike wired networks, wireless networks can be
This chapter describes how to set up and manage VPN service in Mac OS X Server.
6 Working with VPN Service 6 This chapter describes how to set up and manage VPN service in Mac OS X Server. By configuring a Virtual Private Network (VPN) on your server you can give users a more secure
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security Objectives Overview of IEEE 802.11 wireless security Define vulnerabilities of Open System Authentication,
Network Access Security. Lesson 10
Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.
Advanced Administration
BlackBerry Enterprise Service 10 BlackBerry Device Service Version: 10.2 Advanced Administration Guide Published: 2014-09-10 SWD-20140909133530796 Contents 1 Introduction...11 About this guide...12 What
Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2
Contents Introduction--1 Content and Purpose of This Guide...........................1 User Management.........................................2 Types of user accounts2 Security--3 Security Features.........................................3
WiFi Security Assessments
WiFi Security Assessments Robert Dooling Dooling Information Security Defenders (DISD) December, 2009 This work is licensed under a Creative Commons Attribution 3.0 Unported License. Table of Contents
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication Objectives Define authentication Describe the different types of authentication credentials List and explain the
CS 336/536 Computer Network Security. Summer Term 2010. Wi-Fi Protected Access (WPA) compiled by Anthony Barnard
CS 336/536 Computer Network Security Summer Term 2010 Wi-Fi Protected Access (WPA) compiled by Anthony Barnard 2 Wi-Fi Protected Access (WPA) These notes, intended to follow the previous handout IEEE802.11
Extensible Authentication Protocol Transport Layer Security Deployment Guide for Wireless LAN Networks
White Paper Extensible Authentication Protocol Transport Layer Security Deployment Guide for Wireless LAN Networks 1 Scope This document discusses the Extensible Authentication Protocol Transport Layer
Security in IEEE 802.11 WLANs
Security in IEEE 802.11 WLANs 1 IEEE 802.11 Architecture Extended Service Set (ESS) Distribution System LAN Segment AP 3 AP 1 AP 2 MS MS Basic Service Set (BSS) Courtesy: Prashant Krishnamurthy, Univ Pittsburgh
chap18.wireless Network Security
SeoulTech UCS Lab 2015-1 st chap18.wireless Network Security JeongKyu Lee Email: [email protected] Table of Contents 18.1 Wireless Security 18.2 Mobile Device Security 18.3 IEEE 802.11 Wireless
Huawei WLAN Authentication and Encryption
Huawei WLAN Authentication and Encryption The Huawei integrated Wireless Local Area Network (WLAN) solution can provide all-round services for municipalities at various levels and enterprises and institutions
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication
Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication This application note describes how to authenticate users on a Cisco ISA500 Series security appliance. It includes these
The example in this Note uses Linux for both the access controller (RADIUS server) and the supplicant (client).
How To Use 802.1x Security with AT-WA7400 APs, AT-8624PoE Switches, and Linux s freeradius and Xsupplicant Introduction This How To Note details how to take advantage of 802.1x security to ensure that
The next generation of knowledge and expertise Wireless Security Basics
The next generation of knowledge and expertise Wireless Security Basics HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404 (fax), www.hta-inc.com
Implementing and Managing Security for Network Communications
3 Implementing and Managing Security for Network Communications............................................... Terms you ll need to understand: Internet Protocol Security (IPSec) Authentication Authentication
WLAN - Good Security Principles. WLAN - Good Security Principles. Example of War Driving in Hong Kong* WLAN - Good Security Principles
WLAN Security.. from this... Security Architectures and Protocols in Wireless LANs (Section 3) 1 2 WLAN Security.. to this... How Security Breaches Occur 3 War (wide area roaming) Driving/War Chalking
WIRELESS LAN SECURITY FUNDAMENTALS
WIRELESS LAN SECURITY FUNDAMENTALS Jone Ostebo November 2015 #ATM15ANZ @ArubaANZ Learning Goals Authentication with 802.1X But first: We need to understand some PKI And before that, we need a cryptography
Chapter 2 Wireless Networking Basics
Chapter 2 Wireless Networking Basics Wireless Networking Overview Some NETGEAR products conform to the Institute of Electrical and Electronics Engineers (IEEE) 802.11g standard for wireless LANs (WLANs).
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
802.1X AUTHENTICATION IN ACKSYS BRIDGES AND ACCESS POINTS
APPLICATION NOTE Ref APNUS004 rev. A-0, March 08, 2007 802.1X AUTHENTICATION IN ACKSYS BRIDGES AND ACCESS POINTS Why? In addition to MAC address filtering, ACKSYS products support a more reliable authentication
Sophos UTM. Remote Access via PPTP. Configuring UTM and Client
Sophos UTM Remote Access via PPTP Configuring UTM and Client Product version: 9.000 Document date: Friday, January 11, 2013 The specifications and information in this document are subject to change without
Cisco Secure ACS. By Igor Koudashev, Systems Engineer, Cisco Systems Australia [email protected]. 2006 Cisco Systems, Inc. All rights reserved.
Cisco Secure ACS Overview By Igor Koudashev, Systems Engineer, Cisco Systems Australia [email protected] 2006 Cisco Systems, Inc. All rights reserved. 1 Cisco Secure Access Control System Policy Control and
Wireless Networks. Welcome to Wireless
Wireless Networks 11/1/2010 Wireless Networks 1 Welcome to Wireless Radio waves No need to be physically plugged into the network Remote access Coverage Personal Area Network (PAN) Local Area Network (LAN)
INF3510 Information Security University of Oslo Spring 2011. Lecture 9 Communication Security. Audun Jøsang
INF3510 Information Security University of Oslo Spring 2011 Lecture 9 Communication Security Audun Jøsang Outline Network security concepts Communication security Perimeter security Protocol architecture
Chapter 4 Virtual Private Networking
Chapter 4 Virtual Private Networking This chapter describes how to use the virtual private networking (VPN) features of the FVL328 Firewall. VPN tunnels provide secure, encrypted communications between
Unifying Information Security. Implementing TLS on the CLEARSWIFT SECURE Email Gateway
Unifying Information Security Implementing TLS on the CLEARSWIFT SECURE Email Gateway Contents 1 Introduction... 3 2 Understanding TLS... 4 3 Clearswift s Application of TLS... 5 3.1 Opportunistic TLS...
How To Understand And Understand The Security Of A Key Infrastructure
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used
CS5490/6490: Network Security- Lecture Notes - November 9 th 2015
CS5490/6490: Network Security- Lecture Notes - November 9 th 2015 Wireless LAN security (Reference - Security & Cooperation in Wireless Networks by Buttyan & Hubaux, Cambridge Univ. Press, 2007, Chapter
Application Note: Integrate Juniper IPSec VPN with Gemalto SA Server. [email protected] October 2007. www.gemalto.com
Application Note: Integrate Juniper IPSec VPN with Gemalto SA Server [email protected] October 2007 www.gemalto.com Table of contents Overview... 3 Architecture... 5 Configure Juniper IPSec on an
A Dynamic Extensible Authentication Protocol for Device Authentication in Transport Layer Raghavendra.K 1, G. Raghu 2, Sumith N 2
A Dynamic Extensible Authentication Protocol for Device Authentication in Transport Layer Raghavendra.K 1, G. Raghu 2, Sumith N 2 1 Dept of CSE, P.A.College of Engineering 2 Dept of CSE, Srnivas institute
www.novell.com/documentation Administration Guide Integrating Novell edirectory with FreeRADIUS 1.1 January 02, 2011
www.novell.com/documentation Administration Guide Integrating Novell edirectory with FreeRADIUS 1.1 January 02, 2011 Legal Notices Novell, Inc. makes no representations or warranties with respect to the
Configure WorkGroup Bridge on the WAP131 Access Point
Article ID: 5036 Configure WorkGroup Bridge on the WAP131 Access Point Objective The Workgroup Bridge feature enables the Wireless Access Point (WAP) to bridge traffic between a remote client and the wireless
WLAN Access Security Technical White Paper. Issue 02. Date 2012-09-24 HUAWEI TECHNOLOGIES CO., LTD.
WLAN Access Security Technical White Paper Issue 02 Date 2012-09-24 HUAWEI TECHNOLOGIES CO., LTD. . 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by
Configuring WPA-Enterprise/WPA2 with Microsoft RADIUS Authentication
Configuring WPA-Enterprise/WPA2 with Microsoft RADIUS Authentication This document describes how to configure WPA-Enterprise and WPA2 security protocols with RADIUS authentication for Check Point Embedded
Network Security. Lecture 3
Network Security Lecture 3 Design and Analysis of Communication Networks (DACS) University of Twente The Netherlands Security protocols application transport network datalink physical Contents IPSec overview
APNIC elearning: Network Security Fundamentals. 20 March 2013 10:30 pm Brisbane Time (GMT+10)
APNIC elearning: Network Security Fundamentals 20 March 2013 10:30 pm Brisbane Time (GMT+10) Introduction Presenter/s Nurul Islam Roman Senior Training Specialist [email protected] Specialties: Routing &
Cornerstones of Security
Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Exam Questions SY0-401
Exam Questions SY0-401 CompTIA Security+ Certification http://www.2passeasy.com/dumps/sy0-401/ 1. A company has implemented PPTP as a VPN solution. Which of the following ports would need to be opened
Wireless Technology Seminar
Wireless Technology Seminar Introduction Adam Worthington Network Consultant [email protected] Wireless LAN Why? Flexible network access for your users? Guest internet access? VoWIP? RFID? Available
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Release Notes. NCP Secure Entry Mac Client. Major Release 2.01 Build 47 May 2011. 1. New Features and Enhancements. Tip of the Day
NCP Secure Entry Mac Client Major Release 2.01 Build 47 May 2011 1. New Features and Enhancements Tip of the Day A Tip of the Day field for configuration tips and application examples is incorporated in
Introduction to WiFi Security. Frank Sweetser WPI Network Operations and Security [email protected]
Introduction to WiFi Security Frank Sweetser WPI Network Operations and Security [email protected] Why should I care? Or, more formally what are the risks? Unauthorized connections Stealing bandwidth Attacks
SBClient SSL. Ehab AbuShmais
SBClient SSL Ehab AbuShmais Agenda SSL Background U2 SSL Support SBClient SSL 2 What Is SSL SSL (Secure Sockets Layer) Provides a secured channel between two communication endpoints Addresses all three
Wireless Alphabet. Soup CHAP WPA(2) 802.1x RADIUS TKIP AES. 802.11i CBC-MAC EAP TSN WPA(1) EAPOL PEAP WEP PAP RSN CCMP
AES 802.1x Wireless Alphabet WPA(2) 802.11i RADIUS TKIP CHAP EAP EAPOL Soup TSN Mixing Up A Secure Wireless Network WEP AP CBC-MAC WPA(1) WN PEAP CCMP PAP RSN SP AS Copyright 2005,2006 Adam Tauno Williams
Sample. Configuring the RADIUS Server Integrated with ProCurve Identity Driven Manager. Contents
Contents 4 Configuring the RADIUS Server Integrated with ProCurve Identity Driven Manager Contents Overview...................................................... 4-3 RADIUS Overview...........................................
Wireless Security for Mobile Computers
A Datalogic Mobile and Summit Data Communications White Paper Original Version: June 2008 Update: March 2009 Protecting Confidential and Sensitive Information It is every retailer s nightmare: An attacker
Security Guide. BlackBerry Enterprise Service 12. for BlackBerry. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for BlackBerry Version 12.0 Published: 2014-11-12 SWD-20141106140037727 Contents Introduction... 7 About this guide...8 What is BES12?...9 Key features of
Chapter 5 - Basic Authentication Methods
Chapter 5 - Basic Authentication Methods The following topics are discussed in this chapter: Password Authentication Protocol (PAP) Password formats Alternate authentication methods Forcing Authentication
Securing Wireless LANs with LDAP
A P P L I C A T I O N N O T E Securing Wireless LANs with LDAP Many organizations have standardized on LDAP (Lightweight Directory Access Protocol) servers as a repository for their users and related security
ALL1682511. 500Mbits Powerline WLAN N Access Point. User s Manual
ALL1682511 500Mbits Powerline WLAN N Access Point User s Manual Contents 1. Introduction...1 2. System Requirements...1 3. Configuration...1 4. WPS...9 5. Wireless AP Settings...9 6. FAQ... 15 7. Glossary...
Administrator's Guide
Administrator's Guide Contents Administrator's Guide... 7 Using Web Config Network Configuration Software... 8 About Web Config... 8 Accessing Web Config... 8 Restricting Features Available for Users...
Agenda. Wireless LAN Security. TCP/IP Protocol Suite (Internet Model) Security for TCP/IP. Agenda. Car Security Story
Wireless s June September 00 Agenda Wireless Security ผศ. ดร. อน นต ผลเพ ม Asst. Prof. Anan Phonphoem, Ph.D. [email protected] http://www.cpe.ku.ac.th/~anan Computer Engineering Department Kasetsart University,
Web Security Considerations
CEN 448 Security and Internet Protocols Chapter 17 Web Security Dr. Mostafa Hassan Dahshan Computer Engineering Department College of Computer and Information Sciences King Saud University [email protected]
Network Security Fundamentals
APNIC elearning: Network Security Fundamentals 27 November 2013 04:30 pm Brisbane Time (GMT+10) Introduction Presenter Sheryl Hermoso Training Officer [email protected] Specialties: Network Security IPv6
Executive Summary and Purpose
ver,1.0 Hardening and Securing Opengear Devices Copyright Opengear Inc. 2013. All Rights Reserved. Information in this document is subject to change without notice and does not represent a commitment on
VPN SECURITY. February 2008. The Government of the Hong Kong Special Administrative Region
VPN SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the
Wireless Security. New Standards for 802.11 Encryption and Authentication. Ann Geyer 209-754-9130 [email protected] www.tunitas.
Wireless Security New Standards for 802.11 Encryption and Authentication Ann Geyer 209-754-9130 [email protected] www.tunitas.com National Conference on m-health and EOE Minneapolis, MN Sept 9, 2003 Key
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) PPP-based remote access using dial-in PPP encryption control protocol (ECP) PPP extensible authentication protocol (EAP) 13.2 Layer 2/3/4
