Introduction to WiFi Security. Frank Sweetser WPI Network Operations and Security fs@wpi.edu



Similar documents
WEP Overview 1/2. and encryption mechanisms Now deprecated. Shared key Open key (the client will authenticate always) Shared key authentication

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

A SURVEY OF WIRELESS NETWORK SECURITY PROTOCOLS

CS 336/536 Computer Network Security. Summer Term Wi-Fi Protected Access (WPA) compiled by Anthony Barnard

Wireless Network Security. Pat Wilbur Wireless Networks March 30, 2007

Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Security in IEEE WLANs

Chapter 6 CDMA/802.11i

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

EVOLUTION OF WIRELESS LAN SECURITY ARCHITECTURE TO IEEE i (WPA2)

Wireless security. Any station within range of the RF receives data Two security mechanism

The next generation of knowledge and expertise Wireless Security Basics

Vulnerabilities of Wireless Security protocols (WEP and WPA2)

WiFi Security Assessments

Authentication in WLAN

Wireless LAN Security I: WEP Overview and Tools

CS5490/6490: Network Security- Lecture Notes - November 9 th 2015

A COMPARITIVE ANALYSIS OF WIRELESS SECURITY PROTOCOLS (WEP and WPA2)

WIRELESS NETWORK SECURITY

Key Hopping A Security Enhancement Scheme for IEEE WEP Standards

Wireless Networks. Welcome to Wireless

COMPARISON OF WIRELESS SECURITY PROTOCOLS (WEP AND WPA2)

White paper. Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points.

Wireless Security for Mobile Computers

All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices

CS549: Cryptography and Network Security

Chapter 2 Wireless Networking Basics

WiFi Security: WEP, WPA, and WPA2

How To Secure Your Network With 802.1X (Ipo) On A Pc Or Mac Or Macbook Or Ipo On A Microsoft Mac Or Ipow On A Network With A Password Protected By A Keyed Key (Ipow)

Symm ym e m t e r t ic i c cr c yptogr ypt aphy a Ex: RC4, AES 2

chap18.wireless Network Security

Wi-Fi Client Device Security & HIPAA Compliance

Building secure wireless access point based on certificate authentication and firewall captive portal

The Importance of Wireless Security

Wireless Technology Seminar

Wireless Security. New Standards for Encryption and Authentication. Ann Geyer

Lecture 3. WPA and i

IEEE Wireless LAN Security Overview

XIV. Title. 2.1 Schematics of the WEP Encryption in WEP technique Decryption in WEP technique Process of TKIP 25

9 Simple steps to secure your Wi-Fi Network.

Network Security. Security of Wireless Local Area Networks. Chapter 15. Network Security (WS 2002): 15 Wireless LAN Security 1 Dr.-Ing G.

802.1x Networking. tommee pickles Moloch Industries. Moloch.org tommee.net

Lecture 2 Secure Wireless LAN

Advanced Security Issues in Wireless Networks

Self Help Guide IMPORTANT! Securing Your Wireless Network. This Guide refers to the following Products: Please read the following carefully; Synopsis:

The following chart provides the breakdown of exam as to the weight of each section of the exam.

Wireless Robust Security Networks: Keeping the Bad Guys Out with i (WPA2)

CS 356 Lecture 29 Wireless Security. Spring 2013

Wireless LAN Security Mechanisms

CSC574: Computer and Network Security

New Avatars of Honeypot Attacks on WiFi Networks

Agenda. Wireless LAN Security. TCP/IP Protocol Suite (Internet Model) Security for TCP/IP. Agenda. Car Security Story

Wireless LAN Security: Securing Your Access Point

802.11b and associated network security risks for the home user

Methodology: Security plan for wireless networks. By: Stephen Blair Mandeville A. Summary

WIRELESS SECURITY TOOLS

Implementing Security for Wireless Networks

WI-FI SECURITY: A LITERATURE REVIEW OF SECURITY IN WIRELESS NETWORK

Chapter 10: Designing and Implementing Security for Wireless LANs Overview

Chapter 2 Wireless Settings and Security

Security Awareness. Wireless Network Security

Huawei WLAN Authentication and Encryption

WLAN Access Security Technical White Paper. Issue 02. Date HUAWEI TECHNOLOGIES CO., LTD.

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

Linux Access Point and IPSec Bridge

Journal of Mobile, Embedded and Distributed Systems, vol. I, no. 1, 2009 ISSN

Applying of Security Mechanisms to Low Layers of OSI/ISO Network Model

Wireless Security. Jason Bonde ABSTRACT. 2. BACKGROUND In this section we will define the key concepts used later in the paper.

Wired Equivalent Privacy (WEP) versus Wi-Fi Protected Access (WPA)

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline

Chapter 2 Configuring Your Wireless Network and Security Settings

WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.

Distributed Systems Security

Top 10 Security Checklist for SOHO Wireless LANs

Link Layer and Network Layer Security for Wireless Networks

WiFi Security: Deploying WPA/WPA2/802.1X and EAP in the Enterprise

Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example

Wireless Local Area Network Security Obscurity Through Security

WLAN Information Security Best Practice Document

Wi-Fi Client Device Security and Compliance with PCI DSS

Wireless Security with Cyberoam

hacking protocol insecurities

UNIK4250 Security in Distributed Systems University of Oslo Spring Part 7 Wireless Network Security

DESIGNING AND DEPLOYING SECURE WIRELESS LANS. Karl McDermott Cisco Systems Ireland

VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance

Certified Wireless Security Professional (CWSP) Course Overview

Wireless Local Area. Network Security

Network Security. Security of Wireless Local Area Networks. Chapter 15. Network Security (WS 2003): 15 Wireless LAN Security 1. Dr.-Ing G.

Security in Wireless Local Area Network

WIRELESS NETWORKING SECURITY

Robust security is a requirement for many companies deploying a wireless network. However, creating a secure wireless network has often been

Wireless Networking Basics. NETGEAR, Inc Great America Parkway Santa Clara, CA USA

Transcription:

Introduction to WiFi Security Frank Sweetser WPI Network Operations and Security fs@wpi.edu

Why should I care? Or, more formally what are the risks? Unauthorized connections Stealing bandwidth Attacks on your systems from inside firewall Attacks on 3 rd party systems that appear to be from you! Information leakage Eavesdroppers capturing sensitive information Often can be done from greater range than normal

Typical Options There are three basic strategies: Leave WiFi wide open, roll with whatever comes Leave WiFi open, secure it further upstream and/or on a higher level Secure the WiFi layer itself

Open Strategy Leave your SSID wide open and completely unsecured very generous of you! Be prepared for the repercussions: Attackers and virus infested machines Accusations of bad things other connected users did If popular, you may not have any bandwidth left over!

Open WiFi, Secure Upstream Treat WiFi as insecure link think Internet Any WiFi facing hosts must be thoroughly secured bastion hosts Any leaks will allow users to bypass filters ping DNS Web nocat.net OpenVPN.org

Securing WiFi Create Access Control Lists Make it invisible Encryption

MAC Address Filtering Commonly available and suggested choice Very weak trivially spoofable, even in Windows! Only useful for preventing accidental associations from ignorant bystanders

Hidden SSID Many APs allow you to remove the SSID from the beacons Makes network invisible, right? Significantly longer roaming times very bad if you re running VoIP over WiFi SSID still present in other frames Enter kismet...

Kismet Wireless Monitor Linux based passive wireless sniffer Monitors all packets, not just beacons Can find hidden networks Supports GPS Pulls tons of other useful/dangerous information

Kismet with GPS Daemon

Native WiFi Security and Encryption Past Mistakes Original Wired Equivalent Privacy (WEP) Modern Encryption WiFi Protected Access (WPA) Robust Secure Network (RSN/802.11i/WPA2) Authentication Shared Key 802.1x and RADIUS

WEP Originally developed by IEEE in 1997 Meant only to provide about same privacy as using a cable i.e., not much Uses RC4 encryption simple, fast, easily implemented in cheap hardware Numerous vulnerabilities in all stages

WEP Encryption Keys WEP Security provided by 40 or 104 bit static pre-shared key 24 bit per-packet Initialization Vector (IV) transmitted with each packet IV is appended to static key for encryption/decryption, giving the 64 or 128 bits marketing likes to talk about

WEP Encryption Engine (Simplified) Swap Cleartext and Encrypted packets for decryption

XOR A XOR B is true if only one of A or B is true 0 XOR 0 = 0 1 XOR 0 = 1 1 XOR 1 = 0 0 XOR 1 = 1 For A XOR B = C, given any two of A, B, or C, the third can be found! A XOR B = C B XOR C = A A XOR C = B

WEP Authentication AP Sends random challenge to client Client uses key to create PRGA, XORs with random challenge XORd challenge sent to AP to prove possession of key Attacker can XOR challenge and response to recreate PRGA Attacker can now pass authentication without knowing shared key!

IV Reuse Multiple instances of the same IV on different packets will eventually allow shared key to be recovered 24 bit IV only allows for 16,777,216 values Allows for 16k IVs for all nodes using shared key for the entire lifetime of the key In other words, IV reuse is Very bad for security Inevitable, especially on a large network

Direct Attacks on Shared Key FMS attacks provided reliable method of recovering shared key from traffic analysis Certain weak IV values leak bits of key IV of pattern a:ff:b leaks byte a-3 of key Many other weak patterns found since Skipping weak values to avoid direct attacks only helps statistical attacks Still takes thousands of captured packets

No Replay Protection Attacker gathers few hundred encrypted packets Attacker retransmits each one, until one that generates response is found (ping, ARP, SYN packet, etc) Once response generator is found, attacker floods it until enough packets to crack key are generated aireplay (part of aircrack) can pick likely ARP requests from capture file and replay automatically

Packet Injection Remember PRGA trick from shared key authentication? No secure session authentication Same PRGA and IV can be used to generate and inject packets up to 132 bytes long Enough to play with stateful firewalls WEPWedgie automates packet injection

WEP Attack Tools aircrack airsnort Both tools can reliably recover static WEP keys aircrack often effective with as few as 75k packets! Once enough traffic is captured, analysis is typically under 1 minute

So Now What? IEEE had already begun work on 802.11i with AES to address all known security problems After FMS opened floodgates on breaking WEP key, IEEE realized 802.11i and AES hardware was too far off to help Took critical parts, adapted to WEP hardware, and released as WPA

WiFi Protected Access Designed explicitly to address WEP vulnerabilities Any WEP compatible hardware should also support WPA Drivers need updating Supports pre-shared key or 802.1x Naive WEP RC4 usage algorithm replaced with TKIP

WPA Highlights Shared secret is never used directly IV reuse no longer possible Secure MIC checksum prevents replay/injection 4 Way Handshake allows two way authentication

TKIP Key Generation Impossible to use any final keys for other purpose or recreate original secrets

No IV Reuse TKIP sequence number increased to 48 bits Used to generate 24 bit value for WEP hardware compatibility Weak IV values that leak key are avoided Sequences numbers must Start at 0 Increase for each packet sent Be dropped if IV is lower than last one sent

Secure MIC Checksum Message Integrity Check Calculates 64 bit value based on packet data and PTK generated secret Provides ~29 bits of randomness In theory, guessable in about 2 minutes at 802.11b data rates More than two MIC violations in 60 seconds shuts down radio for 60 seconds

Four Way Handshake Nonces plus PMK, MACs create keys Both ends safely validate each other

Robust Security Network RSN, aka 802.11i, aka WPA2 Served as the model for WPA Requires AES support in hardware Operationally nearly identical to WPA

802.1x Uses RADIUS backend to securely authenticate connecting machines Numerous different authentication types MS-CHAP, TLS, PEAP, etc Can also be used to seed and rotate encryption engines instead of static shared secret Most dynamic WEP implementations are broken and don t rotate keys! The Enterprise part of WPA-Enterprise

802.1x Diagram

What About Denial of Service? Wireless is an inherently shared medium Several protocol level DoS attacks Medium reservation Deauth/disassociate flood Intentionally not addressed in WPA Best encryption in the world can t trump raw 2.5/5.8Ghz noise

Summary WEP just gives false sense of security Open WiFi secured upstream possible, but difficult WPA-PSK commonly available, gives very good security Questions? Comments? Suggestions?

Resources Kismet http://www.kismetwireless.net/ airodump, aircrack http://www.wirelessdefence.org/contents/aircrack_airodump.htm Back Track bootable wireless/security auditing http://www.remote-exploit.org Fluhrer, Mantin, Shamir WEP Weakness http://www.drizzle.com/~aboba/ieee/rc4_ksaproc.pdf Linux wpa supplicant http://hostap.epitest.fi/wpa_supplicant Real 802.11 Security Edney, Arbaugh ISBN 0-321-13620-9