802.1x Networking. tommee pickles Moloch Industries. Moloch.org tommee.net



Similar documents
Aerohive Private PSK. solution brief

Introduction to WiFi Security. Frank Sweetser WPI Network Operations and Security

Computer Networks. Secure Systems

How To Set Up Wireless Network Security Part 1: WEP Part 2: WPA-PSK Part 3-1: RADIUS Server Installation Part 3-2: 802.1x-TLS Part 3-3: WPA

A practical guide to Eduroam

The Importance of Wireless Security

Abstract. Avaya Solution & Interoperability Test Lab

Eduroam wireless network Apple Mac OSX 10.4

Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi

Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.

The following chart provides the breakdown of exam as to the weight of each section of the exam.

WLAN Information Security Best Practice Document

Design and Implementation Guide. Apple iphone Compatibility

Eduroam wireless network Apple Mac OSX 10.5

WLAN Authentication and Data Privacy

Wireless Network Security. Pat Wilbur Wireless Networks March 30, 2007

VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong

Authentication in WLAN

Robust security is a requirement for many companies deploying a wireless network. However, creating a secure wireless network has often been

BYOD: BRING YOUR OWN DEVICE.

How To Protect A Wireless Lan From A Rogue Access Point

Setting up a WiFi Network (WLAN)

Implementing Security for Wireless Networks

How To Secure A Wireless Network With A Wireless Device (Mb8000)

Certified Wireless Security Professional (CWSP) Course Overview

Configuring Wireless Security on ProSafe wireless routers (WEP/WPA/Access list)

9 Simple steps to secure your Wi-Fi Network.

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Link Layer and Network Layer Security for Wireless Networks

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Wireless Robust Security Networks: Keeping the Bad Guys Out with i (WPA2)

Building secure wireless access point based on certificate authentication and firewall captive portal

All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices

How To Secure Your Network With 802.1X (Ipo) On A Pc Or Mac Or Macbook Or Ipo On A Microsoft Mac Or Ipow On A Network With A Password Protected By A Keyed Key (Ipow)

Chapter 10: Designing and Implementing Security for Wireless LANs Overview

How To Get A Power Station To Work With A Power Generator Without A Substation

WiFi Security: Deploying WPA/WPA2/802.1X and EAP in the Enterprise

Wireless Security with Cyberoam

Belnet Networking Conference 2013

Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example

Eduroam wireless network - Windows 7

Introduction. Course Description

Building Secure Wireless LAN. white paper

Eduroam wireless network Windows Vista

Wireless Security for Mobile Computers

How To Secure Wireless Networks

WEP Overview 1/2. and encryption mechanisms Now deprecated. Shared key Open key (the client will authenticate always) Shared key authentication

3. Are employees set as Administrator level on their workstations? a. Yes, if it is necessary for their work. b. Yes. c. No.

Exam Questions SY0-401

WIRELESS NETWORK SECURITY

vwlan External RADIUS 802.1x Authentication

WLAN Security: Simplifying Without Compromising Striking a balance between security and cost/convenience

Open Source Enterprise VPN Solution with OpenVPN and OpenBSD

802.1X AUTHENTICATION IN ACKSYS BRIDGES AND ACCESS POINTS

Self Help Guide IMPORTANT! Securing Your Wireless Network. This Guide refers to the following Products: Please read the following carefully; Synopsis:

Wireless Network Security

WHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks

1.1 Demonstrate how to recognize, perform, and prevent the following types of attacks, and discuss their impact on the organization:

ALL Mbits Powerline WLAN N Access Point. User s Manual

Wi-Fi in Healthcare:

Wireless Security. New Standards for Encryption and Authentication. Ann Geyer

Security Awareness. Wireless Network Security

Wi-Fi Client Device Security & HIPAA Compliance

Understanding Wireless Security on Your Polycom SpectraLink 8400 Series Wireless Phones

Wi-Fi Protected Access for Protection and Automation

The next generation of knowledge and expertise Wireless Security Basics

Wireless security. Any station within range of the RF receives data Two security mechanism

Wireless Security and Healthcare Going Beyond IEEE i to Truly Ensure HIPAA Compliance

Wi-Fi Client Device Security and Compliance with PCI DSS

UNIVERZITA KOMENSKÉHO V BRATISLAVE FAKULTA MATEMATIKY, FYZIKY A INFORMATIKY PRÍPRAVA ŠTÚDIA MATEMATIKY A INFORMATIKY NA FMFI UK V ANGLICKOM JAZYKU

Wireless Encryption Protection

Joint Research Activity 5 Task Force Mobility

PENN. Social Sciences Computing a division of SAS Computing. SAS Computing SSC. File Security. John Marcotte Director of SSC.

WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.

White paper. Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points.

ALTAI WIRELESS BROADBAND NETWORK DESIGN WHITE PAPER

Chapter 2 Wireless Networking Basics

Particularities of security design for wireless networks in small and medium business (SMB)

1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network

SATO Network Interface Card Configuration Instructions

APPENDIX 3 LOT 3: WIRELESS NETWORK

Virtuelle WLAN Controller Alcatel Lucent Wireless LAN Instant AP

Borderware Firewall Server Version 7.1. VPN Authentication Configuration Guide. Copyright 2005 CRYPTOCard Corporation All Rights Reserved

Network Access Security It's Broke, Now What? June 15, 2010

Developing Network Security Strategies

Network Access Control ProCurve and Microsoft NAP Integration

Network Access Security. Lesson 10

STEP III: Enable the Wireless Network Card. STEP IV: Print out the Printer Settings pages to determine the IP Address

CS 356 Lecture 29 Wireless Security. Spring 2013

CTS2134 Introduction to Networking. Module Network Security

Setting up Windows XP for WPA Wireless Access (ISU-OIT-WPA)

Application Note User Groups

WLAN Security Networking with Confidence

Transcription:

802.1x Networking tommee pickles Moloch Industries Moloch.org tommee.net

Who am I Fun: Defcon Cannonball Run Work: 15 Years in the grind (MTV, Google, Nature Magazine) Whore: TV and Speaking Engagements

Topics What is 802.1x? Why do we use it? How does it work? What is required? How do you set this up? What problems exist? Can problems be fixed? Questions

What is 802.1x? Port Based Network Access Control 802.1X offers an effective framework for authenticating and controlling user traffic to a protected network Not a wireless spec, applies to wired too Can be used for automatic VLAN assigning Used to secure access

Why do we use it? wireless example WEP is insecure (as well as WPA-PSK) PSK) 802.1x/TKIP not open to replay attacks WEP is used at the two lowest layers of the OSI model - the data link and physical layers; it therefore does not offer end- to-end security WEP is easily broken, meaning the weak encryption standard with WEP is subject to eavesdropping on connections Corporate wireless must be secure as wired assets. *man in the van*

Example tools for hacking wireless Airsnort - http://airsnort.shmoo.com/ Aircrack - http://www.wirelessdefence.org/contents/aircrackmain.htm WepCrack - http://wepcrack.sourceforge.net/ WepWedgie - http://sourceforge.net/projects/wepwedgie/ There is even a video showing how easy it is to break WEP on a Apple laptop. The video is located at http://tinyurl.com/8w74k

Why do we use it? wired example Force unauthorized users into guest VLANs Automatically set network assets for wired employees in conference rooms, etc.

Why do we use it? wired example cont... An Example A company (e.g. Moogle) Large enterprise Has ~5000 employees Sales, HR, IT departments Multiple VLANs for departments You can use 802.1x to keep VLANs for workstations when moved.

What is required for an 802.1x network? Access Point or switch that supports 802.1x RADIUS (Authentication Server) freeradius, Funk, RadiusNT, radiusx Client Software (supplicant) Odyssey, XP, AEGIS, Xsupplicant, OSX Switched Environment

How does it work? a wireless example A connection is achieved is by 2 sets of security protocols. 802.1x first uses WPA encryption. This can either be PSK (Pre-shared Key) or TKIP (Temporal Key Integrity Protocol). After association, the AP sends authentication to the authentication server. The supplicant authenticates the user and workstation to network. This can be achieved by smart card, certificates or username-password combinations

Wireless Example How does it work?

How does it work?

Authentication Flow

How do you set this up? Acquire switch that supports 802.1x Build a RADIUS server Configure secrets for switch and RADIUS server Configure authentication and tunneling on RADIUS server Configure supplicant on workstation

What problems exist? Laptop theft Supplicant configs are in clear text in some client software RADIUS can be attacked

Laptop theft? If you laptop gets stolen the 802.1x Username/Password/Certs will be stolen too. Could prove to be a huge hole if it happened on a weekend.

Supplicant configs are in clear text. Xsupplicant is the Linux client and linux config is in clear text OSX supplicant client is in clear text This contains the username/password.

RADIUS can be attacked It's easy to DOS a RADIUS server If RADIUS dies, many authenticated services will too. RADIUS utilizes UDP

Can problems be fixed? Laptop Theft? Maybe Supplicant configs in clear text? Yes RADIUS protected from attacks? Yes More ways of Authorizing users? Yes

Laptop Theft? Let me tell you a story... <story about a laptop theft, removed for legal reasons>

Supplicant configs in clear text? Ideas to fix it File Vault on OSX Maybe GPG configs and require password

RADIUS protected from attacks? Firewall ACL Private VLAN

More ways of Authorizing users? Captive Portal Captive Portal connecting to LDAP or Active Directory

Questions

Contact tommee pickles tommee@gmail.com tommee.net moloch.org