The 802.1x specification



Similar documents
Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example

Lecture 3. WPA and i

UNIVERZITA KOMENSKÉHO V BRATISLAVE FAKULTA MATEMATIKY, FYZIKY A INFORMATIKY PRÍPRAVA ŠTÚDIA MATEMATIKY A INFORMATIKY NA FMFI UK V ANGLICKOM JAZYKU

Wireless security. Any station within range of the RF receives data Two security mechanism

Chapter 10 Security Protocols of the Data Link Layer

Configuring Wired 802.1x Authentication on Windows Server 2012

Wireless Robust Security Networks: Keeping the Bad Guys Out with i (WPA2)

WIRELESS SECURITY IN (WI-FI ) NETWORKS

Configuring Wireless Security on ProSafe wireless routers (WEP/WPA/Access list)

802.1X Client Software

Cisco Secure ACS. By Igor Koudashev, Systems Engineer, Cisco Systems Australia 2006 Cisco Systems, Inc. All rights reserved.

The following chart provides the breakdown of exam as to the weight of each section of the exam.

Bridge Functions Consortium

ClickShare Network Integration

Application Note: Onsight Device VPN Configuration V1.1

Wi-Fi Protected Access: Strong, standards-based, interoperable security for today s Wi-Fi networks Wi-Fi Alliance April 29, 2003

Configure WorkGroup Bridge on the WAP131 Access Point

IEEE 802.1X For Wireless LANs

The Importance of Wireless Security

WLAN Authentication and Data Privacy

Symm ym e m t e r t ic i c cr c yptogr ypt aphy a Ex: RC4, AES 2

Network Access Security. Lesson 10

Network Access Control and Cloud Security

Authentication in WLAN

Data Link Protocols. TCP/IP Suite and OSI Reference Model

Certficate Extensions and Attributes Supporting Authentication in PPP and Wireless LAN. Daniel Schwarz

VPN. Date: 4/15/2004 By: Heena Patel

Executive Summary. This white paper includes the following sections: A.What Does 802.1x Do? B. An Overview of the 802.1x Standard

IEEE 802.1X Overview. Port Based Network Access Control

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Using IEEE 802.1x to Enhance Network Security

Huawei WLAN Authentication and Encryption

Chapter 2 Wireless Networking Basics

WiFi Security: Deploying WPA/WPA2/802.1X and EAP in the Enterprise

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Wireless Security for Mobile Computers

7.1. Remote Access Connection

Wireless Technology Seminar

Understanding Wireless Security on Your Polycom SpectraLink 8400 Series Wireless Phones

IEEE a/ac/n/b/g Enterprise Access Points ECW5320 ECWO5320. Management Guide. Software Release v

VLANs. Application Note

802.1x in the Enterprise Network

IP Security. IPSec, PPTP, OpenVPN. Pawel Cieplinski, AkademiaWIFI.pl. MUM Wroclaw

Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi

SLIP and PPP. Gursharan Singh Tatla

Wireless-G Business PCI Adapter with RangeBooster

vwlan External RADIUS 802.1x Authentication

Cisco Which VPN Solution is Right for You?

A Division of Cisco Systems, Inc. GHz g. Wireless-G. PCI Adapter with RangeBooster. User Guide WIRELESS WMP54GR. Model No.

Developing Network Security Strategies

Network Security. Chapter 10 Security Protocols of the Data Link Layer

Particularities of security design for wireless networks in small and medium business (SMB)

How To Test An Eap Test On A Network With A Testnet (Networking) On A Pc Or Mac Or Ipnet (For A Network) On An Ipnet Or Ipro (For An Ipro) On Pc Or Ipo

Web and MAC Authentication for the Series 2600/2600-PWR and 2800 Switches

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

WLAN - Good Security Principles. WLAN - Good Security Principles. Example of War Driving in Hong Kong* WLAN - Good Security Principles

Network Authentication X Secure the Edge of the Network - Technical White Paper

Optimizing Converged Cisco Networks (ONT)

White paper. Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points.

EAP Authentication Protocols for WLANs

A Division of Cisco Systems, Inc. GHz g. Wireless-G. PCI Adapter. User Guide WIRELESS WMP54G. Model No.

How To Set Up An Ipa 1X For Aaa On A Ipa 2.1X On A Network With Aaa (Ipa) On A Computer Or Ipa (Ipo) On An Ipo 2.0.1

Wi-Fi Client Device Security and Compliance with PCI DSS

Implementing Security for Wireless Networks

ADMINISTRATION GUIDE Cisco Small Business

802.1X AUTHENTICATION IN ACKSYS BRIDGES AND ACCESS POINTS

Extensible Authentication Protocol (EAP) Security Issues

ASA and Native L2TP IPSec Android Client Configuration Example

VPN. VPN For BIPAC 741/743GE

A Division of Cisco Systems, Inc. GHz g. Wireless-G. USB Network Adapter with RangeBooster. User Guide WIRELESS WUSB54GR. Model No.

Unified Services Routers

WIRELESS LAN SECURITY FUNDAMENTALS

Virtual Private Network and Remote Access Setup

CS 393/682 Network Security. Nasir Memon Polytechnic University Module 7 Virtual Private Networks

Chapter 4: Security of the architecture, and lower layer security (network security) 1

CS 356 Lecture 29 Wireless Security. Spring 2013

Wireless Local Area Networks (WLANs)

Network Access Control and Cloud Security

Wi-Fi Client Device Security & HIPAA Compliance

Cisco RV 120W Wireless-N VPN Firewall

ALL Mbits Powerline WLAN N Access Point. User s Manual

Unified Services Routers

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

WIRELESS NETWORK SECURITY

How To Secure Your Network With 802.1X (Ipo) On A Pc Or Mac Or Macbook Or Ipo On A Microsoft Mac Or Ipow On A Network With A Password Protected By A Keyed Key (Ipow)

Configuring WPA-Enterprise/WPA2 with Microsoft RADIUS Authentication

The next generation of knowledge and expertise Wireless Security Basics

WLAN Access Security Technical White Paper. Issue 02. Date HUAWEI TECHNOLOGIES CO., LTD.

Objectives. Remote Connection Options. Teleworking. Connecting Teleworkers to the Corporate WAN. Providing Teleworker Services

RADIUS: A REMOTE AUTHENTICATION DIAL-IN USER SERVICE

Wi-Fi in Healthcare:

UNIK4250 Security in Distributed Systems University of Oslo Spring Part 7 Wireless Network Security

Application Note User Groups

Deploying and Configuring Polycom Phones in 802.1X Environments

Enterprise WLAN Architecture

Configuring Settings on the Cisco Unified Wireless IP Phone 7925G

802.1X Authentication

Transcription:

The 802.1x specification Fulvio Risso Politecnico di Torino Based on an existing presentation of Piero Nicoletti 1

IEEE 802.1x Port-Based Network Access Control Use physical access characteristics of IEEE 802 LAN infrastructures in order to provide a means of authenticating and authorizing devices attached to a LAN port Prevent access to that port in case the authentication and authorization process fails Connection must be point-to-point (similar in some sense to Dial- Up) Can be implemented on Ethernet Switches and Wireless Access Points 3

802.1x entities (1) Supplicant Entity that has access to a network port Includes an identity and some credentials in order to prove that it is who it claims to be Authenticator Network device that provide access to the network (e.g., Ethernet Switch, WiFi Access Point) Does not know whether an entity can is allowed to be part of the network Referred to as the network access server (NAS) or Remote Address Dial-In User Service (RADIUS) client 4

802.1x entities (2) Authentication Server Server that checks and validates user credentials (e.g., RADIUS) Port Access Entity (PAE) Protocol entity associated to authenticator, supplicant or both 5

802.1x: protocol framework 6

Extensible Authentication Protocol (EAP) Defines a generic mechanism for exchanging authentication messages, which is transported by different technologies Username / password, challenge / response token, public key certificates, etc. Separates the message exchange from the authentication process (authentication-independent messages) New authentication mechanisms can be deployed without a corresponding change in the EAP layer 7

EAP messages: general frame format 4 messages, two frame formats 8

EAP messages: Request/Response frame 10

EAP messages: success/failure 11

EAP Message Exchange Framework Identity exchange related to EAP (may be in clear text). Optional. Better if each protocol has its own identityrecognition mechanism 12

EAP and 802.1x 802.1x = EAP over 802 802.1x is a standard that transports EAP messages over LAN Similar to the capabilities of PPP at the beginning of the connection EAP in 802.1x is called EAP encapsulation over LANs (EAPOL) The Authenticator may be a very simple device Should simply copy EAP messages that come from the LAN to the Authentication Server Does not have to understand the semantic of EAP messages; only Supplicant and Authentication Server must 13

Radius R.A.D.I.U.S.:Remote Authentication Dial-In User Service protocol is used to exchange authentication message from Authenticator and Server The client is responsible for passing user information to designated RADIUS servers, and then acting on the response which is returned RADIUS servers are responsible for receiving user connection requests, authenticating the user, and then returning all configuration information necessary for the client to deliver service to the user RADIUS protocol has been used in the past by Internet Service Providers to authenticate users connected via Dial-Up line to the Access Server 14

802.1x function and protocols used to authenticate supplicant Protocol used for communication between Autenticator and Authenticator Server: EAP (Extensible Authentication Protocol) over RADIUS protocol RADIUS is a Layer 7 protocol (application layer) Protocol used for communication between Supplicant and Authenticator EAPOL that means EAP Over LAN Is a Layer 2 Protocol because the supplicant may not have an IP address until is authenticated and has been received the IP address by DHCP Server 15

Authentication elements 16

802.1x Authentication Model 802.1x Functions PC (Supplicant) EAPOL (layer 2) Access Point or Switch (Authenticator) EAP over RADIUS (layer 7) RADIUS Authentication Server Communications for Authentication 17

Use of Controlled & Uncontrolled Port Uncontrolled Port is the entity used for service packets exchange her necessary to establishing the authorization or the access prohibition 18

Authorized & Unauthorized port 19

Access based on Authentication & Address MAC 20

EAP protocol PPP Extensible Authentication Protocol (EAP) defined in RFC 2284 Protocol code EAP = c227 Support multiple authentication mechanisms without needing to pre-negotiate a specific mechanism during the LCP phase PPP was originally only supporting authentications based up PAP (Authentication Protocol password), protocol code c023 CHAP (Authentication Protocol handshake Challenge), c223 protocol code 21

EAP frame 1 Request 2 Response 3 Success 4 Failure 22

EAPOL frame EAPOL frames are transmitted to the multicast address 01-80-C2-00-00-03 The EAPOL fame on Ethernet v 2.0: the code protocol inserted in the Type field is 88-8E PREAM. SFD DSAP SSAP TYPE 88-8E DATA FCS Ottetti 7 1 6 6 2 da 46 a 1500 4 23

EAPOL over Ethernet V 2.0 frame PREAM. SFD DSAP SSAP TYPE 88-8E DATA FCS Bytes 7 1 6 6 2 da 46 a 1500 4 Protocol Vers. 01 H Packet Type 1 byte Packet body length 2 byte Packet body 00H EAP-Packet 01H EAPOL-Start 02H EAPOL-Logoff 03H EAPOL-Key 04H EAPOL-Encapsulated-ASF-Alert. 24

EAPOL over 802.x frames LLC Header Protocol DSAP SSAP CONTROL Identifier INFORMATION 0AA 0AA 03 000000 88-8E OUI Protocol Type Protocol Vers. 01 H Packet Type 1 byte Packet body length 2 byte Packet body 25 00H EAP-Packet 01H EAPOL-Start 02H EAPOL-Logoff 03H EAPOL-Key 04H EAPOL-Encapsulated-ASF-Alert.

EAP & EAPOL over wireless networks 26

EAP Authentication method Microsoft Cisco Authentication Layer TLS EAP SIM TTLS PEAP EAP-FAST LEAP EAP Layers EAP EAPOL MAC Layer 802.3 802.11 27

LEAP (Lightweight Extensible Authentication Protocol) EAP-Cisco Wireless Authentication protocol based on username e password sent via MS-CHAP without the digital certificates Easy and fast to configure because don t need the certificates management Limits: Need interface drivers that support LEAP Supported only in wireless NIC 28

EAP-TLS Mutual Authentication (client and server) Based on Digital Certificates for Server and Client The server have the CA (Certification Authority) and the Server Certificate The Client have the CA (Certification Authority) and the Client Certificate Is necessary to generate the CA Certificate, The Server Certificate and the Clients Certificates (one ore more) The data sent during authentication process are exchanged in a secure encrypted tunnel 29

EAP-TTLS Similar EAP-TLS Only CA and Server Certificate are necessary The client authentication is based on: CA Certificate and specific client Authentication based on: Username/Password CHAP, MSCHAPv2, MD5 30

Protected Extensible Authentication Protocol (PEAP) Based on EAP-TTLS Authentication Method: Phase 1: establish a secure tunnel through EAP-TTLS authentication Phase 2: realize the supplicant authentication based on EAP protocol plus other specific information of PEAP Only CA and Server Certificate are necessary The client is authenticated via: CA Certificate and Username/Password MSCHAPv2 31

WPA (WiFi Protected Access) WPA is a standard-based security solution from the WiFi Alliance that addresses the vulnerabilities in native WLANs WPA provides enhanced data protection and access control for WLAN systems. WPA addresses all known Wired Equivalent Privacy (WEP) vulnerabilities in the original IEEE 802.11 security implementation and brings an immediate security solution to WLAN networks in both enterprise and small office, home office (SOHO) environments. Use Pre Shared Key (WPA-PSK) for Authentication e Data Encryption WPA-PSK may be in Hexadecimal format or ASCI format (also known as Pass Phrase) 32

WPA2 / 802.11i WPA 2 is the next generation of Wi-Fi security. WPA 2 is the Wi-Fi Alliance interoperable implementation of the ratified IEEE 802.11i standard WPA 2 implements the National Institute of Standards and Technology (NIST)-recommended Advanced Encryption Standard (AES) encryption algorithm with the use of Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) AES Counter Mode is a block cipher that encrypts 128-bit blocks of data at a time with a 128-bit encryption key. 33

WPA2 / 802.11i: Server Radius or PSK Normally WPA2 use RADIUS Server for Authentication and Encryption Key Generation Can even work with Pre Shared Key (PSK) witch can long up to 256 bits (64 Hexadecimal digit) Same PSK used on AP and Clients pass-phrase can be use instead of hexadecimal number sequence the standard suggest to use a pass-phrase with minimum 20 characters for security 34

Authentication Systems Compare 35

Dynamic VLAN Assignment & 802.1 x Extensions 36

Dynamic VLAN Assignment An extention of the 802.1x standard specifications: The new version of 802.1x 2004 define a new type VLAN assignment authentication based RFC 2868 of 2000 and above all RFC 3580 of 2003 define some new RADIUS protocol attributes (AV = Attribute Value) Through this new function the assignation of VLAN can be done: Per Port Per Protocol Authentication based 37

Advantages of Dynamic VLAN Assignment based on authentication Simplifies the network operators' work They do not need change the configuration of VLAN on the ports following the users witch are moving The user's VLAN depends on his credentials The users' ports are set up for the dynamic assignment based on the authentication The user wherever moves in the network keep the credentials for his VLAN Easy to manages wireless networks VLAN Guest for the guests in switched and 38

Advantages of Dynamic VLAN Assignment based on authentication Increases the security on the business SwitcheLAN Not authenticated user is put on quarantine VLAN Every user connected to the network is identified (certificates, username, password) by his credentials Switch applies policies and enables port. Set port VLAN to 100 - DMZ User has access to DMZ or Quarantine network. Login Request Login Request Login Request Authentication timeout. Retries expired. Client is not 802.1x capable. Put them in the quarantine zone! 39

RADIUS protocol and new attributes New RADIUS attributes: Tunnel-Type=VLAN (13) Tunnel-Medium-Type=802 (6) Tunnel-Private-Group-ID=VLANID (xxxx) 40

RADIUS Protocol:Tunnel type 1 Point-to-Point Tunneling Protocol (PPTP) [1] 2 Layer Two Forwarding (L2F) [2] 3 Layer Two Tunneling Protocol (L2TP) [3] 4 Ascend Tunnel Management Protocol (ATMP) [4] 5 Virtual Tunneling Protocol (VTP) 6 IP Authentication Header in the Tunnel-mode (AH) [5] 7 IP-in-IP Encapsulation (IP-IP) [6] 8 Minimal IP-in-IP Encapsulation (MIN-IP-IP) [7] 9 IP Encapsulating Security Payload in the Tunnel-mode (ESP) [8] 10 Generic Route Encapsulation (GRE) [9] 11 Bay Dial Virtual Services (DVS) 12 IP-in-IP Tunneling [10] 13 Virtual LANs (VLAN) 41

RADIUS Protocol:Tunnel-Medium type 1 IPv4 (IP version 4) 2 IPv6 (IP version 6) 3 NSAP 4 HDLC (8-bit multidrop) 5 BBN 1822 6 802 (includes all 802 media plus Ethernet "canonical format") 7 E.163 (POTS) 8 E.164 (SMDS, Frame Relay, ATM) 9 F.69 (Telex) 10 X.121 (X.25, Frame Relay) 11 IPX 12 Appletalk 13 Decnet IV 14 Banyan Vines 15 E.164 with NSAP format subaddress 42

Dynamic VLAN assignment configuration On the Switch: Specify VLAN Assignment authentication based Specify a parking VLAN for non-authorized users On RADIUS Server config file add the following parameters Tunnel-Type=13 Tunnel-Medium-Type=6 Tunnel-Private-Group-ID=xxxx 43

Configuration example on HP switch aaa authentication port-access eap-radius radius-server host 10.200.150.5 key test12345 aaa port-access authenticator 4 (port 4 of the switch) aaa port-access authenticator 4 unauth-vid 100 Parking VLAN is: VLAN 100 44

FreeRadiusconfiguration example File /etc/raddb/user Users: off, connect, stealth Part of User Local Data Base off Auth-Type := Local, User-Password == "invisibile" Tunnel-Type = 13, Tunnel-Medium-Type = 6, Tunnel-Private-Group-Id = 2 connect Auth-Type := EAP Tunnel-Type = 13, Tunnel-Medium-Type = 6, Tunnel-Private-Group-Id = 1 stealth Auth-Type := EAP Tunnel-Type = 13, Tunnel-Medium-Type = 6, Tunnel-Private-Group-Id = 2 45

VLAN and Users VLAN and Users in the previous example: off = VLAN 2 (authentication based on MD5 or PEAP Username/Password) connect = VLAN 1 authentication based on EAP-TLS Stealth = VLAN 2 authentication based on EAP-TLS Users not authenticated are in Parking VLAN 100 46

Dynamic VLAN assignment limits If a hub or a VLAN-Unaware switch is connected to a switch port with dynamic VLAN enabled and if user authenticates himself, the switch port is opened and also other users can connect in network through that authenticated port HUB 47

Port Security to prevent intrusion On new switch, as for instance the recent ones of Cisco and HP, it is possible to configure the switch to accept a single MAC address for port. Is possible to define the MAC address enabled to the access. The can accept only the first MAC address seen on the port (typically that of PC which authenticates himself) Example on HP Switch Configure port A1 to automatically accept the first device (MAC address) it detects as the only authorized device for that port. (The default device limit is 1.) This command also configures the port to send an alarm to a network management station and disable itself if an intruder is detected on the port. ProCurve(config)# port-security a1 learn-mode static action senddisable 48

How to increase the security To increase the security on port the switch can periodically repeat the user's authentication Example on HP switch aaa port-access authenticator 4 reauth-period 30 Switch repeat the authentication on port 4 every 30 second 49