IEEE 802.1X For Wireless LANs



Similar documents
IEEE 802.1X Overview. Port Based Network Access Control

How To Secure Your Network With 802.1X (Ipo) On A Pc Or Mac Or Macbook Or Ipo On A Microsoft Mac Or Ipow On A Network With A Password Protected By A Keyed Key (Ipow)

802.11b Wireless LAN Authentication, Encryption, and Security

Executive Summary. This white paper includes the following sections: A.What Does 802.1x Do? B. An Overview of the 802.1x Standard

White paper. Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points.

Wireless security. Any station within range of the RF receives data Two security mechanism

Chapter 2 Wireless Networking Basics

WIRELESS NETWORK SECURITY

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Using IEEE 802.1x to Enhance Network Security

Network security, TKK, Nov

What information will you find in this document?

Authentication in WLAN

802.1X Authentication, Link Layer Discovery Protocol (LLDP), and Avaya IP Telephones

Security in IEEE WLANs

WLAN Security. Giwhan Cho Distributed/Mobile Computing System Lab. Chonbuk National University

Certficate Extensions and Attributes Supporting Authentication in PPP and Wireless LAN. Daniel Schwarz

WIRELESS SECURITY IN (WI-FI ) NETWORKS

Wireless Local Area Networks (WLANs)

How To Secure Wireless Networks

CS 356 Lecture 29 Wireless Security. Spring 2013

Network Authentication X Secure the Edge of the Network - Technical White Paper

Configuring Wired 802.1x Authentication on Windows Server 2012

Wireless Networking Basics. NETGEAR, Inc Great America Parkway Santa Clara, CA USA

Enhanced Intranet Management in a DHCP-enabled Environment

Certified Wireless Security Professional (CWSP) Course Overview

Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi

Network Security: WLAN Security. Tuomas Aura T Network security Aalto University, Nov-Dec 2010

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Lecture 3. WPA and i

WLAN w Technology

DESIGNING AND DEPLOYING SECURE WIRELESS LANS. Karl McDermott Cisco Systems Ireland

The 802.1x specification

Bridge Functions Consortium

Cisco SAFE: Wireless LAN Security in Depth

Wireless Robust Security Networks: Keeping the Bad Guys Out with i (WPA2)

vwlan External RADIUS 802.1x Authentication

Huawei WLAN Authentication and Encryption

Wireless Security. New Standards for Encryption and Authentication. Ann Geyer

How To Authenticate With Port Based Authentication

A Dynamic Extensible Authentication Protocol for Device Authentication in Transport Layer Raghavendra.K 1, G. Raghu 2, Sumith N 2

Attacks Due to Flaw of Protocols Used In Network Access Control (NAC), Their Solutions and Issues: A Survey

Ebonyi State University Abakaliki 2 Department of Computer Science. Our Saviour Institute of Science and Technology 3 Department of Computer Science

Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example

WiFi Security: Deploying WPA/WPA2/802.1X and EAP in the Enterprise

Chapter 10 Security Protocols of the Data Link Layer

Security Awareness. Wireless Network Security

802.1X Client Software

WLAN Access Security Technical White Paper. Issue 02. Date HUAWEI TECHNOLOGIES CO., LTD.

1. discovery phase 2. authentication and association phase 3. EAP/802.1x/RADIUS authentication 4. 4-way handshake 5. group key handshake 6.

Configure WorkGroup Bridge on the WAP131 Access Point

All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices

Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches

Technical Note. CounterACT: 802.1X and Network Access Control

NXC5500/2500. Application Note w Management Frame Protection. ZyXEL NXC Application Notes. Version 4.20 Edition 2, 02/2015

CSC574: Computer and Network Security

Cipher Suites and WEP

Particularities of security design for wireless networks in small and medium business (SMB)

Journal of Mobile, Embedded and Distributed Systems, vol. I, no. 1, 2009 ISSN

Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication

Securing end devices

802.1X AUTHENTICATION IN ACKSYS BRIDGES AND ACCESS POINTS

IEEE Wireless LAN Security Overview

Wireless LAN Security Mechanisms

EAP Authentication Protocols for WLANs

CS549: Cryptography and Network Security

Wireless Technology Seminar

Wireless LAN Access Control and Authentication

Wi-Fi Protected Access: Strong, standards-based, interoperable security for today s Wi-Fi networks Wi-Fi Alliance April 29, 2003

Basic processes in IEEE networks

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

Wireless Security for Mobile Computers

Cisco Secure ACS. By Igor Koudashev, Systems Engineer, Cisco Systems Australia 2006 Cisco Systems, Inc. All rights reserved.

Wireless Local Area Network Security Obscurity Through Security

Wi-Fi Client Device Security and Compliance with PCI DSS

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

chap18.wireless Network Security

WLAN - Good Security Principles. WLAN - Good Security Principles. Example of War Driving in Hong Kong* WLAN - Good Security Principles

Your Wireless Network has No Clothes

802.1x in the Enterprise Network

Technical Brief. Wireless Intrusion Protection

The Importance of Wireless Security

Implementing Security for Wireless Networks

User Authentication in the Enterprise Network

How To Protect A Wireless Lan From A Rogue Access Point

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance

Transcription:

IEEE 802.1X For Wireless LANs John Roese, Ravi Nalmati, Cabletron Albert Young, 3Com Carl Temme, Bill McFarland, T-Span David Halasz, Aironet Paul Congdon, HP Andrew Smith, Extreme Networks Slide 1

Outline Deployment issues with 802.11 Adaptation of IEEE 802.1X to 802.11 Summary Slide 2

Deployment Issues With 802.11 User administration Integration with existing user administration tools required (RADIUS, LDAP-based directories) Create a Windows group for wireless Any user or machine who is a member of the group has wireless access Identification via User-Name easier to administer than MAC address identification Usage accounting and auditing desirable Key management Static keys difficult to manage on clients, access points Proprietary key management solutions require separate user databases Slide 3

Security Issues With 802.11 No per-packet authentication Vulnerability to disassociation attacks No user identification and authentication No central authentication, authorization, accounting RC4 stream cipher vulnerable to known plaintext attack Some implementations derive WEP keys from passwords No support for extended authentication Token cards, certificates, smartcards, one-time passwords, biometrics, etc. Key management issues Re-key of global keys No dynamic per-sta key management Slide 4

Advantages of IEEE 802.1X Open standards based Leverages existing standards: EAP (RFC 2284), RADIUS (RFC 2138, 2139) Enables interoperable user identification, centralized authentication, key management User-based identification Identification based on Network Access Identifier (RFC 2486) enables support for roaming access in public spaces (RFC 2607). Dynamic key management Centralized user administration Support for RADIUS (RFC 2138, 2139) enables centralized authentication, authorization and accounting RADIUS/EAP (draft-ietf-radius-ext-07.txt) enables encapsulation of EAP packets within RADIUS. Slide 5

Advantages of IEEE 802.1X, cont d Extensible authentication support EAP designed to allow additional authentication methods to be deployed with no changes to the access point or client NIC RFC 2284 includes support for password authentication (EAP-MD5), One-Time Passwords (OTP) Windows 2000 supports smartcard authentication (RFC 2716) and Security Dynamics Slide 6

802.11 General Topology PAE Semi-Public Network / Enterprise Edge PAE Enterprise Network Authenticator (e.g. Access Point) EAP Over RADIUS EAP Over Wireless (EAPOW) EAP Over RADIUS R A D I U S Authentication Server Supplicant Slide 7

IEEE 802.1X Conversation Switch Laptop computer EAPOL-Start Port connect EAPOL EAP-Request/Identity Ethernet Access blocked Radius Server RADIUS EAP-Response/Identity EAP-Request EAP-Response (credentials) EAP-Success Radius-Access-Request Radius-Access-Challenge Radius-Access-Request Radius-Access-Accept Access allowed Slide 8

Goals for 802.1X on 802.11 Wireless LANs Minimal changes required to 802.1X and 802.11 specifications 802.1X protocol same over 802.3 as 802.11 Client access control Support for both user and machine access control Centralized user administration RADIUS client support on Access Point Management of encryption keys Transmission of global/multicast keys from access point to client Dynamic derivation of unicast keys Roaming support Ad-hoc networking support Slide 9

802.11 association Access point configured to allow open and shared authentication Initial client authentication Open authentication used, since dynamically derived WEP key not yet available Client associates with access point Slide 10

802.1X authentication in 802.11 IEEE 802.1X authentication occurs after 802.11 association After association, client and access point have an Ethernet connection Prior to authentication, access point filters all non-eapol traffic from client If 802.1X authentication succeeds, access point removes the filter 802.1X messages sent to destination MAC address Client, Access Point MAC addresses known after 802.11 association No need to use 802.1X multicast MAC address in EAP-Start, EAP- Request/Identity messages Prior to 802.1X authentication, access point only accepts packets with source = Client and Ethertype = EAPOL Slide 11

802.11/802.1X State Machine Class 1 Frames State 1: 802.11 Unauthenticated, Unassociated Class 1 & 2 Frames Successful Authentication State 2: 802.11Authenticated, Unassociated DeAuthentication Notification DeAuthentication Notification Class 1, 2 &3 Frames Successful Association or Reassociation State 3: 802.11 Authenticated, Associated Disassociation Notification Successful 802.1X authentication EAPOL-Logoff Class 1, 2 &3 Frames State 4: 802.11 Authenticated, Associated, 802.1X Authenticated Slide 12

802.1X and Per-STA Session Keys How can EAPOL be used to derive per-station unicast session keys? Can use any EAP method supporting secure dynamic key derivation EAP-TLS (RFC 2716) EAP-GSS Security Dynamics Other Keys derived on client and the RADIUS server RADIUS server transmits key to access point RADIUS attribute encrypted on a hop-by-hop basis using shared secret shared by RADIUS client and server Unicast keys can be used to encrypt subsequent traffic, including EAPOW-key packet (for carrying multicast/global keys) Per-Station unicast session keys not required If only multicast/global keys are supported, then session key is only used to encrypt the multicast/global key Slide 13

802.1X and Multicast/Global Keys How can EAPOL transfer multicast/global keys? A new EAPOL packet type can be defined for use in transporting multicast/global keys: EAPOW-Key EAPOW-Key packet type used to transmit one or more keys from access point to client EAPOW-Key packets only sent after EAPOW authentication succeeds EAPOW-Key packets are encrypted using derived per- STA session key Slide 14

Laptop computer 802.11 Associate EAPOL-Start 802.1X On 802.11 Wireless Association Access Point Radius Server Ethernet Access blocked 802.11 RADIUS EAPOW EAP-Request/Identity EAP-Response/Identity Radius-Access-Request EAP-Request EAP-Response (credentials) EAP-Success EAPW-Key (WEP) Radius-Access-Challenge Radius-Access-Request Radius-Access-Accept Access allowed Slide 15

Re-authentication Access points are allowed to force clients to re-associate at any time Default is 60 minutes The client responses transparently to the user Access point sends WEP global key to client using 802.lX EAPOW-Key message used to send global key Slide 16

Roaming Process (no pre-authentication) 802.11 Re-association 802.1X will re-authenticate but network access will be denied during re-authentication Optional support for fast handoff Inter-access point protocol Handoff per client keys Use EAPOW-Key to update shared key Shared key pre-authentication Shared authentication using global WEP key If succeeds then allow immediate access to network i.e. 802.1X is put immediately into the authenticated state Slide 17

Unauthenticated VLAN Support Potential extension to IEEE 802.1X Designed to enable access to a registration server, enrollment server, etc. prior to authentication EAP-Notification message can inform user of location of server to take credit card, enroll user, etc. prior to obtaining network access. Slide 18

802.1X and Ad-Hoc Networking What is ad-hoc networking? Station communicating directly with other stations How does ad-hoc networking work with 802.lX? Both Stations initiate EAPOL conversation All stations authenticate with each other Otherwise mutual authentication required and algorithm to select authenticator RADIUS not used in ad-hoc mode Typically implies that user credentials are stored on Stations Slide 19

Key Management for Ad-Hoc Networking Requirements Password-based mutual authentication Secure key generation Evaluation of existing EAP methods EAP-TLS: supports mutual authentication, keying, but assumes both participants have a certificate EAP-GSS: supports mutual authentication, assumes server side is in contact with KDC 802.1X will work in adhoc mode if required Shared key is better for some user scenarios May need new EAP method for this purpose Slide 20

How 802.1X Addresses 802.11 Security Issues User Identification & Strong authentication Dynamic key derivation Mutual authentication Per-packet authentication Dictionary attack precautions Slide 21

Summary of 802.11/802.1X Vulnerabilities 802.11 w/per 802.1X, TLS & 802.1X, TLS, packet IV Key change Key Change, MIC Global keying vulnerable fixed fixed Impersonation vulnerable fixed fixed NIC theft vulnerable fixed fixed Brute force attack (40 bit key) 128-bit 128-bit 128-bit Rogue Servers vulnerable fixed fixed Packet spoofing vulnerable vulnerable fixed Disassociation spoofing vulnerable vulnerable fixed Passive monitoring MAC Identity Identity Dictionary attacks vulnerable fixed fixed Slide 22

Summary IEEE 802.1X offers solutions to 802.11 deployment issues User identification Centralized user management Key management Minimal changes required to 802.11 specification Additional MIB parameters for 802.1X/802.11 configuration Implementation requirements Support for dynamically derived WEP keys + mutual authentication Support for ad-hoc networking Access-Point functions as RADIUS client Requires support for RFC 2138, 2139, draft-ietf-radius-ext-07.txt Access-Point functions as IEEE 802.1X authenticator PAE Addresses most WEP security vulnerabilities Slide 23

Call to Action 802.1X Add changes required for 802.11 Messages sent to destination MAC address for 802.11 Add EAPOW-Key message 802.11 Adopt 802.1X as an enhanced authentication and key management method Enable appropriate methods supported by 802.1X to be used for 802.11 authentication and key management MAC changes to improve encryption, integrity protection The IAPP work needs to consider security impact re STA mobility between APs. Slide 24

For More Information IEEE 802.1X http://grouper.ieee.org/groups/802/1/pages/802.1x.html RADIUS http://www.ietf.org/rfc/rfc2138.txt http://www.ietf.org/rfc/rfc2139.txt http://www.ietf.org/rfc/rfc2548.txt http://www.ietf.org/internet-drafts/draft-ietf-radius-radius-v2-06.txt http://www.ietf.org/internet-drafts/draft-ietf-radius-accounting-v2-05.txt http://www.ietf.org/internet-drafts/draft-ietf-radius-ext-07.txt http://www.ietf.org/internet-drafts/draft-ietf-radius-tunnel-auth-09.txt http://www.ietf.org/internet-drafts/draft-ietf-radius-tunnel-acct-05.txt EAP http://www.ietf.org/rfc/rfc2284.txt http://www.ietf.org/rfc/rfc2716.txt Slide 25

Simplified Insecure Adhoc Support Simple, insecure adhoc networking sometimes desirable Children playing games Need plug and go solution without security complications Not appropriate in business situations How can this be handled with 802.1X? Clients assume network is un-authenticated An authenticated network will drop packets Clients drop received EAP-Start messages Clients think they are connected to a non-authenticated network Adhoc networking just works. Slide 26

Why Not Incorporate 802.1X into 802.11 authentication? Possible to add 802.1X support in 802.11 authentication phase Requires additional authentication type for EAP Requires additional of new key management functionality in 802.11 Likely to result in duplication of effort Supplicants supporting 802.1X need duplicate code for 802.11 EAP Supplicant operating system sees 802.11 as 802.3 Requires encapsulation/decapsulation in NIC driver to maintain transparency Large changes required to 802.11 state machine 802.1X state machine needs to be merged with 802.11 state machine No additional security over 802.1X over 802.11 approach Associate/disassociate not encrypted or integrity protected so no additional security provided by doing EAP w/key derivation prior to 802.11 Associate Un-authenticated VLANs cannot be supported Choice either authenticated or unauthenticated Slide 27