CSC574: Computer and Network Security



Similar documents
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi

Wireless security. Any station within range of the RF receives data Two security mechanism

Authentication in WLAN

Symm ym e m t e r t ic i c cr c yptogr ypt aphy a Ex: RC4, AES 2

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Chapter 6 CDMA/802.11i

WEP Overview 1/2. and encryption mechanisms Now deprecated. Shared key Open key (the client will authenticate always) Shared key authentication

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Wireless Security. New Standards for Encryption and Authentication. Ann Geyer

The next generation of knowledge and expertise Wireless Security Basics

Advanced Security Issues in Wireless Networks

Wireless Networks. Welcome to Wireless

Wi-Fi Client Device Security and Compliance with PCI DSS

CS549: Cryptography and Network Security

Wireless Security for Mobile Computers

Introduction to WiFi Security. Frank Sweetser WPI Network Operations and Security

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance

Configure WorkGroup Bridge on the WAP131 Access Point

White paper. Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points.

Agenda. Wireless LAN Security. TCP/IP Protocol Suite (Internet Model) Security for TCP/IP. Agenda. Car Security Story

Security in IEEE WLANs

CS 356 Lecture 29 Wireless Security. Spring 2013

How To Secure Your Network With 802.1X (Ipo) On A Pc Or Mac Or Macbook Or Ipo On A Microsoft Mac Or Ipow On A Network With A Password Protected By A Keyed Key (Ipow)

Wi-Fi Protected Access: Strong, standards-based, interoperable security for today s Wi-Fi networks Wi-Fi Alliance April 29, 2003

WLAN and IEEE Security

WLAN Access Security Technical White Paper. Issue 02. Date HUAWEI TECHNOLOGIES CO., LTD.

WIRELESS NETWORKING SECURITY

Key Hopping A Security Enhancement Scheme for IEEE WEP Standards

CS 336/536 Computer Network Security. Summer Term Wi-Fi Protected Access (WPA) compiled by Anthony Barnard

UNIK4250 Security in Distributed Systems University of Oslo Spring Part 7 Wireless Network Security

Security Awareness. Wireless Network Security

COMPARISON OF WIRELESS SECURITY PROTOCOLS (WEP AND WPA2)

Wireless Encryption Protection

The following chart provides the breakdown of exam as to the weight of each section of the exam.

Applying of Security Mechanisms to Low Layers of OSI/ISO Network Model

EVOLUTION OF WIRELESS LAN SECURITY ARCHITECTURE TO IEEE i (WPA2)

How To Secure Wireless Networks

Wireless Robust Security Networks: Keeping the Bad Guys Out with i (WPA2)

SSI. Commons Wireless Protocols WEP and WPA2. Bertil Maria Pires Marques. Dez Dez

Implementing Security for Wireless Networks

Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example

Wireless Local Area. Network Security

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

Vulnerabilities of Wireless Security protocols (WEP and WPA2)

All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices

Wi-Fi Client Device Security & HIPAA Compliance

WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.

Vulnerabilities in WEP Christopher Hoffman Cryptography

Chapter 2 Wireless Networking Basics

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

chap18.wireless Network Security

A SURVEY OF WIRELESS NETWORK SECURITY PROTOCOLS

Huawei WLAN Authentication and Encryption

WIRELESS LAN SECURITY FUNDAMENTALS

Client Server Registration Protocol

Wireless LAN Security Mechanisms

Cisco SAFE: Wireless LAN Security in Depth

Journal of Mobile, Embedded and Distributed Systems, vol. I, no. 1, 2009 ISSN

Extensible Authentication Protocol (EAP) Security Issues

DESIGNING AND DEPLOYING SECURE WIRELESS LANS. Karl McDermott Cisco Systems Ireland

Security in Wireless Local Area Network

A COMPARITIVE ANALYSIS OF WIRELESS SECURITY PROTOCOLS (WEP and WPA2)

VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline

m-trilogix White Paper on Security in Wireless Networks

Your Wireless Network has No Clothes

CS5490/6490: Network Security- Lecture Notes - November 9 th 2015

How To Protect A Wireless Lan From A Rogue Access Point

Cipher Suites and WEP

WIRELESS SECURITY IN (WI-FI ) NETWORKS

The Importance of Wireless Security

A Division of Cisco Systems, Inc. GHz g. Wireless-G. PCI Adapter with RangeBooster. User Guide WIRELESS WMP54GR. Model No.

A DISCUSSION OF WIRELESS SECURITY TECHNOLOGIES

How To Secure A Wireless Network With A Wireless Device (Mb8000)

WI-FI SECURITY: A LITERATURE REVIEW OF SECURITY IN WIRELESS NETWORK

WiFi Security: WEP, WPA, and WPA2

Network Security. Security of Wireless Local Area Networks. Chapter 15. Network Security (WS 2002): 15 Wireless LAN Security 1 Dr.-Ing G.

Wireless LAN Security: Securing Your Access Point

Lecture 2 Secure Wireless LAN

Wireless Technology Seminar

Chapter 3 Safeguarding Your Network

9 Simple steps to secure your Wi-Fi Network.

WiFi Security Assessments

THE IMPORTANCE OF CRYPTOGRAPHY STANDARD IN WIRELESS LOCAL AREA NETWORKING

New Avatars of Honeypot Attacks on WiFi Networks

IEEE Wireless LAN Security Overview

Wireless Security. Jason Bonde ABSTRACT. 2. BACKGROUND In this section we will define the key concepts used later in the paper.

IEEE 802.1X For Wireless LANs

WIRELESS NETWORK SECURITY

Distributed Systems Security

Ebonyi State University Abakaliki 2 Department of Computer Science. Our Saviour Institute of Science and Technology 3 Department of Computer Science

ClickShare Network Integration

Transcription:

CSC574: Computer and Network Security Lecture 21 Prof. William Enck Spring 2016 (Derived from slides by Micah Sherr)

Wireless Security

Wireless makes network security much more difficult Wired: If Alice and Bob are connected via a wire, Eve can only eavesdrop if she has physical access to that wire* (exceptions?) Wireless: Everybody shout (broadcast) as loud as you can Friendly to eavesdropping 3

Evil Toaster (with wireless card) Access Point Infrastructure mode 4 Internet

Evil Toaster (with wireless card) Internet Ad hoc mode 5

Finding wireless networks is easy wardriving warbiking warwalking warrailing warkitteh (http://thehackernews.com/2014/08/how-to-weaponize-your-cat-to-hack-your_9.html) 6

Several online repositories Check out https://wigle.net/ 7

Wireless Networking: 50,000 ft view Protocols defined in IEEE 802.11 standards Access points (APs) may periodically broadcast beacon frames to advertise its presence (and some configuration parameters) Authentication: client sends authentication frame to AP if successful, client sends association request frame to AP, requesting allocation of resources if successful, AP responds with association response frame Data sent via data frames Session Termination: AP sends disassociation frame and deauthentication frame 8

Unsecured wireless: Problem #1: Everybody is the receiver. 9

Unsecured wireless: Problem #2: Any one can join. 10

MAC Filtering 11

12

13

SSID hiding APs broadcast Service Set Identifiers (SSIDs) to announce their presence In theory, these should identify a particular wireless LAN In practice, SSID can be anything that s 2-32 octets long To join network, client must present SSID Crappy security mechanism for preventing interlopers: Don t advertise SSID Problem: To join network, client must present SSID This is not encrypted, even if network supports WEP or WPA 14

Wireless Security Let s sprinkle on some of that crypto magic sauce 15

Wired Equivalent Privacy (WEP) Part of original 802.11 standard Uses stream cipher: Stream cipher crypto C = M S, where S is pseudo-random sequence produced using a key K and an IV M = C S (M S) S = M WEP uses RC4: supports seed up to 256 bits seed = 24-bit IV + WEP key In WEPv1, key was 40 bits 64bit seed Later versions supported seeds of 128 and 256 bits 16

Wired Equivalent Privacy (WEP) Data transmission: Produce keystream S using RC4 with seed function f(k,iv) C = M S send (IV, C) frames knowledge of IV and K sufficient to decrypt C 17

WEP Authentication Modes Open System: client doesn t need to provide any credentials immediate association with access point but can only send and receive info if using correct key Shared Key: client must prove knowledge of WEP key before associating AP sends client plaintext challenge; response is challenge encrypted with the correct key Q: Which is more secure? 18

WEP Shared Key Vulnerability Random Challenge: jk4533hfdsa9 Response: {IV, jk4533hfdsa9 RC4(K,IV)} here, RC4(K,IV) denotes RC4 encryption using a key derived from key K and IV Eavesdropper can observe plaintext challenge and encrypted response, and can produce: challenge response = RC4(K,IV) RC4(K,IV) sufficient to authenticate: next challenge: abcdef Eve responds (without knowing K!): {IV, abcdef RC4(K,IV)} 19

WEP Problems: IV Collisions IVs are too small... likely collision(s) after a few hours when IVs are the same, two ciphertexts can be xor ed together to produce the xor of the plaintexts statistical analysis will then yield plaintexts redundancy in IP packets makes this easy! knowledge of protocols further limits the possibilities or, attacker sends message thru Internet to a wireless client in a manner that will result a known response (e.g., ping message) if multiple messages share same IV, once one is recovered, others can be trivially/immediately recovered --WHY? 20

WEP Problems: Exploiting RC4 Weaknesses RC4 has a weakness: first few bytes of keystream are sometimes not particularly random looking [Fluhrer, Mantin and Shamir Attack; 2001] Mathematical result: Given enough keystreams, it s possible to construct the key [ciphertext-only attack] Attacker s goal: Get a lot of keystreams! Basic approach: replay a bunch of ARP packets AP will respond to replayed ARP Sufficient number of AP s encrypted packets will yield key An aside: standard RC4 fix: discard first n bytes of keystream (usually n 3072) 21

Story Time: TJX Data Breach TJX (TJMaxx + Marshalls + Bob s) main database compromised in 2007 ~94M credit and debit cards stolen one of nation s largest (2nd only to Heartland Payment Systems -- 130M!) Scanning devices, cash registers, and PCs in Minnesota Marshalls wirelessly communicated to server, which communicated to backend database Wireless data encrypted using WEP WEP key stolen from MN parking lot. Uh-oh. Lesson: Don t use WEP! 22

Wi-Fi Protected Access (WPA) Engineered to be the secure replacement for WEP Authentication stages: Shared secret used to derive encryption keys Client authenticates to AP Encryption keys are used to produce keystreams for encrypting traffic 23

Wi-Fi Protected Access (WPA) Two Modes: PSK (Pre-shared Key): also called WPA Personal shared secret manually entered into all devices designed for home use 802.1x Mode: also called WPA Enterprise authentication handled by backend service (e.g., RADIUS server) via Extensible Authentication Protocol (EAP) may make use of certificates or other authentication techniques e.g., SaxaNet 24

Wi-Fi Protected Access (WPA) Encrypting Traffic (2 confidentiality protocols): Temporal Key Integrity Protocol (TKIP): uses RC4, but designed to improve upon WEP s shortcomings increases size of IV to 48 bits rather than just concatenate IV, uses more complex key mixing routine 25

Wi-Fi Protected Access (WPA) Encrypting Traffic (2 confidentiality protocols): AES: supported in newer WPA2 protocol runs AES in stream-cipher like way (e.g., using something similar to counter mode) 26

Attacks against WPA WPA is a lot stronger than WEP Most attacks rely on weak passwords user-supplied keys are either entered as 256-bit string (64 hex digits) or as password password is hashed to produce key using 4096 iterations of HMAC-SHA1 with SSID of AP as salt there exists dictionaries of pre-hashed keys for most popular SSIDs ( linksys, redsox, etc.) 27

EAP Authentication WPA Enterprise using 802.1x for authentication EAP- TLS EAP- TTLS EAP- PSK EAP- IKEv2 Other Authentication methods Extensible Authentication Protocol (EAP) IEEE 802.1X EAP over LAN (EAPOL) EAP layer PPP 802.3 Ethernet 802.11 WLAN Other Data link layer (from Stallings, Crypto and Net Security)

EAP Authentication EAP Peer EAP Authenticator Authentication server (RADIUS) Method Method EAP Peer/ Authenticator EAP Layer EAP messages EAP Authenticator EAP Layer EAP messages EAP Peer/ Authenticator EAP Layer Lower Layer 802.1X, PPP Lower Layer RADIUS Lower Layer (from Stallings, Crypto and Net Security) Figure 16.3 EAP Protocol Exchanges

Eduroam Many campuses (including ours) have started deploying Eduroam for WiFi Better than MAC address-based authentication (based on 802.1x protocol) Allows you to access WiFi at other universities Enrollment instructions: https://oit.ncsu.edu/wireless (https://web.syssec.ruhr-uni-bochum.de/eduroam/)

Eduroam Config Woes Brenza et al. A Practical Investigation of Identity Theft Vulnerabilities in Eduroam. WiSec 2015. https://web.syssec.ruhr-uni-bochum.de/eduroam/ Found that many Eduroam clients contain configuration errors Root CA not set, so any certificate pushed by the AP will be valid. (Configure your root CA!) Deficient certificate validation / Missing server name check / common name check Often problem with the platform Enables Evil Twin attack (associating with rogue AP), which can results in Eavesdropping or modifying traffic Exposure of passwords (arguably more severe)

Password Exposure The most common authentication method in Eduroam uses TLS to create a secure tunnel for password authentication PEAP or EAP-TTLS for the tunnel Password authentication via EAP-PAP: cleartext password EAP-MSCHAPv2: challenge response, but can still brute-force passwords (known to be a weak protocol) What happens if TLS tunnel is terminated with the adversary? Fortunately, NCSU uses EAP-TLS Why does this help?

Practical Attacks

Plenty of tools available (usually exploit RC4 weakness) 34

MitM with airbase-ng 35

Jamming Wireless signals are subject to jamming Analog Jamming: decrease signal-tonoise ratio by flooding with radio waves basic techniques easy to detect -- just listen for jamming signals more advanced techniques leverage features of the communication system (e.g., FM) to undetectably jam standard defense: spread spectrum Digital Jamming: exploit multiplexing scheme to consume all channel bandwidth 36