Authentication in WLAN



Similar documents
Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi

A Threat Analysis of The Extensible Authentication Protocol

Chapter 6 CDMA/802.11i

Certified Wireless Security Professional (CWSP) Course Overview

The following chart provides the breakdown of exam as to the weight of each section of the exam.

Wi-Fi Protected Access: Strong, standards-based, interoperable security for today s Wi-Fi networks Wi-Fi Alliance April 29, 2003

WiFi Security: Deploying WPA/WPA2/802.1X and EAP in the Enterprise

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Wireless security. Any station within range of the RF receives data Two security mechanism

Wireless Technology Seminar

Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example

Introduction to WiFi Security. Frank Sweetser WPI Network Operations and Security

CSC574: Computer and Network Security

WIRELESS LAN SECURITY FUNDAMENTALS

CS5490/6490: Network Security- Lecture Notes - November 9 th 2015

Wi-Fi in Healthcare:

WIRELESS NETWORK SECURITY

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

CS549: Cryptography and Network Security

White paper. Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points.

Symm ym e m t e r t ic i c cr c yptogr ypt aphy a Ex: RC4, AES 2

The Importance of Wireless Security

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Security in IEEE WLANs

Agenda. Wireless LAN Security. TCP/IP Protocol Suite (Internet Model) Security for TCP/IP. Agenda. Car Security Story

Lecture 3. WPA and i

DESIGNING AND DEPLOYING SECURE WIRELESS LANS. Karl McDermott Cisco Systems Ireland

How To Secure Your Network With 802.1X (Ipo) On A Pc Or Mac Or Macbook Or Ipo On A Microsoft Mac Or Ipow On A Network With A Password Protected By A Keyed Key (Ipow)

The next generation of knowledge and expertise Wireless Security Basics

Chapter 2 Wireless Networking Basics

EVOLUTION OF WIRELESS LAN SECURITY ARCHITECTURE TO IEEE i (WPA2)

Network Authentication X Secure the Edge of the Network - Technical White Paper

Huawei WLAN Authentication and Encryption

A New Secure Strategy for Small-Scale IEEE Wireless Local Area Networ

WIRELESS SECURITY IN (WI-FI ) NETWORKS

WLAN - Good Security Principles. WLAN - Good Security Principles. Example of War Driving in Hong Kong* WLAN - Good Security Principles

Wireless Encryption Protection

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Wireless Security for Mobile Computers

WEP Overview 1/2. and encryption mechanisms Now deprecated. Shared key Open key (the client will authenticate always) Shared key authentication

Wireless Security. New Standards for Encryption and Authentication. Ann Geyer

COMPARISON OF WIRELESS SECURITY PROTOCOLS (WEP AND WPA2)

Wireless Networks. Welcome to Wireless

WiFi Security Assessments


Wi-Fi Client Device Security and Compliance with PCI DSS

Wireless Pre-Shared Key Cracking (WPA, WPA2)

Wireless Network Security. Pat Wilbur Wireless Networks March 30, 2007

Ebonyi State University Abakaliki 2 Department of Computer Science. Our Saviour Institute of Science and Technology 3 Department of Computer Science

Three attacks in SSL protocol and their solutions

WLAN Access Security Technical White Paper. Issue 02. Date HUAWEI TECHNOLOGIES CO., LTD.

IEEE 802.1X For Wireless LANs

Hole196 Vulnerability in WPA2

Vulnerabilities of Wireless Security protocols (WEP and WPA2)

Wi-Fi Client Device Security & HIPAA Compliance

Understanding Wireless Security on Your Polycom SpectraLink 8400 Series Wireless Phones

Wireless LAN Security Mechanisms

Extensible Authentication Protocol (EAP) Security Issues

Netzwerksicherheit: Anwendungen

802.1X AUTHENTICATION IN ACKSYS BRIDGES AND ACCESS POINTS

CS 336/536 Computer Network Security. Summer Term Wi-Fi Protected Access (WPA) compiled by Anthony Barnard

Configure WorkGroup Bridge on the WAP131 Access Point

Optimizing Converged Cisco Networks (ONT)

A Dynamic Extensible Authentication Protocol for Device Authentication in Transport Layer Raghavendra.K 1, G. Raghu 2, Sumith N 2

Key Management (Distribution and Certification) (1)

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

vwlan External RADIUS 802.1x Authentication

Extensible Authentication Protocol Transport Layer Security Deployment Guide for Wireless LAN Networks

All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices

Building secure wireless access point based on certificate authentication and firewall captive portal

CSE/EE 461 Lecture 23

Cipher Suites and WEP

IT Networks & Security CERT Luncheon Series: Cryptography

Key Hopping A Security Enhancement Scheme for IEEE WEP Standards

IEEE Wireless LAN Security Overview

802.1x Networking. tommee pickles Moloch Industries. Moloch.org tommee.net

Security in Wireless Local Area Network

Analysis of Security Issues and Their Solutions in Wireless LAN 1 Shenam Chugh, 2 Dr.Kamal

chap18.wireless Network Security

9 Simple steps to secure your Wi-Fi Network.

1. discovery phase 2. authentication and association phase 3. EAP/802.1x/RADIUS authentication 4. 4-way handshake 5. group key handshake 6.

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Question How do I access the router s web-based setup page? Answer

Implementing Security for Wireless Networks

Network Access Security. Lesson 10

Savitribai Phule Pune University

UNIK4250 Security in Distributed Systems University of Oslo Spring Part 7 Wireless Network Security

Application Note: Onsight Device VPN Configuration V1.1

SSI. Commons Wireless Protocols WEP and WPA2. Bertil Maria Pires Marques. Dez Dez

Chapter 10: Designing and Implementing Security for Wireless LANs Overview

A SURVEY OF WIRELESS NETWORK SECURITY PROTOCOLS

Transcription:

Authentication in WLAN Flaws in WEP (Wired Equivalent Privacy) Wi-Fi Protected Access (WPA) Based on draft 3 of the IEEE 802.11i. Provides stronger data encryption and user authentication (largely missing in WEP). WPA authentication protocols WEP Represents first attempt at security Uses static 40 or 104 bit keys for authentication and encryption. Based on RC4 symmetric cipher. Efficient. Flaws in WEP (1) No key management protocol tied to WEP Access points and clients must be programmed with the same WEP key. Since synchronizing the change of keys is tedious and difficult, keys are seldom changed. If attacker cracks key, all traffic can be decrypted (2) The size of the key - 40 bits. If hacker gathers enough data, using tools such as Aircrack and Airsnort, WEP key can be broken in under 30 minutes. 1

(3) Authentication messages can be easily forged 802.11 defines two forms of authentication: Open System (no authentication) or Shared Key authentication. The Problem? A monitoring attacker can observe both the challenge and the encrypted response. From those, he can determine the key used to encrypt the response, and encrypt any challenge he receives in the future. By monitoring a successful authentication, the attacker can later forge an authentication. (4) WEP use the same key for encryption and authentication. 2

WPA (Wi-Fi Protected Access): Provides sophisticated data encryption than WEP and also provides user authentication. Do not share the same key for authentication and data encryption. Provides for mutual authentication. The three entities are the client, the Authentication Server (AS), and the AP. Supports EAP (extensible authentication protocol) 3

EAP (extensible authentication protocol): An authentication framework, not a specific authentication mechanism. Four message types: o Request o Respond o Success o Failure. Encapsulate other authentication protocols, such as TLS, Kerberos, in its Request and Respond messages. The AS uses the Success or Failure message to notify the AP whether the client authentication was successful. 4

The Request-Identity (User name) and Response-Identity messages precede other Request and Response messages. Only after that sequence does the EAP start encapsulating other authentication protocols. The AP is not aware of the authentication process in detail. It cares only about the authentication server's decision whether to grant the client the access to the network. An important role of the authentication process is to establish a shared key that the client and the AP can use for message protection. The message protection process starts only when the authentication process finishes with the EAP message Success, which includes generating a Pairwise Master Key (PMK) on the client and server, and the authentication server sends the PMK to the AP over a secure channel. WPA uses the PMK to generate keys for encryption. The AS and the client compute the Pairwise Master Key differs from one authentication method to another. 5

EAP support the following methods: Lightweight EAP (LEAP): A username/password combination is sent to a Authentication Server for authentication. Kerberos EAP-TLS: Both the server and the client need a valid (x509) certificate, and therefore a PKI. Desired Properties of Wireless Network Authentication 1. Mutual authentication 2. Identity privacy 3. Replay attack resistance 4. Fast reconnect Mutual Authentication Identity Privacy - The identity here is referring to client s username. - The Request-Identity and Response-Identity messages are sent in plaintext, attack can easily discover supplicant s identity by eavesdrop the conversation at the beginning of the process. Thus, EAP methods must take care of hiding client s identity. 6

Replay Attack Resistance - If an attacker eavesdrops and records the authentication process of a valid client and replays it to gain the access to the network, a replay attack will occur. Fast Reconnect - When the client changes location and associates with another AP, the client may lose connection to the network until he reauthenticates via the new AP. New applications for wireless networks, such as Voice over IP (VoIP), require seamless connections to the network. Authentication Protocols for WLAN Symmetric key approach: LEAP Public key approach: EAP-TLS Symmetric Key Approaches Efficient and require little computational power. Especially important in wireless networks because many wireless devices, such as PDAs and mobile VoIP phones, have little computational power. Drawbacks: most symmetric key authentication protocols derive the shared secret from the user's password and some passwords are not strong, it is easy for the attacker to extract the secret key from them. It is hard to securely distribute the shared secret to both parties. 7

Lightweight Extensible Authentication Protocol (LEAP) Includes mutual authentication and Pairwise Master Key derivation. Client (C) Authentication Server (S) Request Identity Response Identity (username of client c) and request s s= Random Challenge Calculate Challenge Hash Using User- Supplied Password H(E Password (s)) Response (Authenticate Client) c=random Challenge Success and Request c (Authenticate AS) Calculate Challenge Hash Using User- Supplied Password Flaws: LEAP does not protect the client's identity. Moreover, because an eavesdropper can easily sniff the challenge-response pair sent between the client and the AS during the authentication, LEAP is vulnerable. 8

Public Key Approaches: Transport Layer Security (EAP-TLS) Client Authentication Server (AS) Request Identity Response Identity c= random number Response c Request c s, Cert AS s = random number Cert AS = AS certificate p = random number Cert Client = Client Certificate Response E(AS pubkey, p), Cert Client Signature Client = Client Digital Signature Client Signature Authenticate AS Authenticate Client Both calculate Pairwise Master Key = F (c, s, p) Request (TLS finish) contains hash of handshake messages Response (TLS finish) Success 9

Summary of Symmetric and Public Key Approaches LEAP is well understood and widely deployed. EAP-TLS is a public key approach that provides strong security. EAP-TLS satisfies all properties, except identity privacy and fast reconnect. EAP-TLS does not provide a way to authenticate clients who do not have a certificate that are signed by the CAs that the AS trusts. 10