Wireless Robust Security Networks: Keeping the Bad Guys Out with 802.11i (WPA2)



Similar documents
How to connect to the diamonds wireless network with Vista.

How to Access Coast Wi-Fi

Eduroam wireless network Windows Vista

Network Services One Washington Square, San Jose, CA

User Guide for eduroam

Wireless Network Configuration Guide

WIRELESS SETUP FOR WINDOWS 7

Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example

How to connect to NAU s WPA2 Enterprise implementation in a Residence Hall:

Connecting to the Rovernet WPA2 Secured Wireless Network with Windows 7

Windows Vista: Connecting to the wireless network at Hood College

Configuring Eduroam in Windows Vista

How To Set Up Hopkins Wireless On Windows 7 On A Pc Or Mac Or Ipad (For A Laptop) On A Network Card (For Windows 7) On Your Computer Or Ipa (For Mac Or Mac) On An Ipa Or

Windows Vista and Windows 7 Wireless Configuration For NCC Faculty and Staff Owned Laptops

CS 356 Lecture 29 Wireless Security. Spring 2013

Edith Cowan University Information Technology Services Centre

RSC-Secure-Wireless provides...

Setting up SJUMobile (Wireless Internet Access for personal devices)

vwlan External RADIUS 802.1x Authentication

6. After connecting reopen the wireless connections window. Right click on RamNet and select properties. Page 2 of 7

Eduroam wireless network - Windows 7

INFORMATION SYSTEMS SERVICE NETWORKS AND TELECOMMUNICATIONS SECTOR

Use the below instructions to configure your wireless settings to connect to the secure wireless network using Microsoft Windows Vista/7.

WiFi troubleshooting. How s your WiFi signal? Android WiFi settings. ios WiFi settings

White paper. Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points.

Connec ng to Northwest s WIFI with Windows 7

Airnet-Student is a new and improved wireless network that is being made available to all Staffordshire University students.

How to Connect to UAB s Wireless Networks

Johns Hopkins

Mac OS X Secure Wireless Setup Guide

Connecting to the University Wireless Network

Securing Wireless LANs with LDAP

Canterbury College Eduroam Wi-Fi Guide

Extension Wireless Access (EWA) v2.0

Symm ym e m t e r t ic i c cr c yptogr ypt aphy a Ex: RC4, AES 2

Windows 8 & RT Wireless Configuration For NCC Student Owned Laptops

Automatic Setup... 1 Manual Setup... 2 Installing the Wireless Certificates... 18

Configuring WPA2 for Windows XP

Setting up Windows XP for WPA Wireless Access (ISU-OIT-WPA)

Configure WorkGroup Bridge on the WAP131 Access Point

Connecting to Secure Wireless (iitk-sec) on Fedora

Wireless LAN Client Configuration Guide for Windows Configuring 802.1X Authentication Client for Windows 7

Internet access system through the Wireless Network of the University of Bologna (last update )

Wireless security. Any station within range of the RF receives data Two security mechanism

Seamless and Secure Access (SSA) Manual Configuration Guide for Windows 7

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

CruzNet Secure Set-Up Instructions for Windows Vista

Huawei WLAN Authentication and Encryption

GPC JagTalk Secure Wireless Network. Connection Instructions

Wireless Security. New Standards for Encryption and Authentication. Ann Geyer

Setting up a WiFi Network (WLAN)

KU Information Technology provides wireless access for both the KU campus community and for guest users at many points across campus.

Certified Wireless Security Professional (CWSP) Course Overview

Configuring Windows 7 for eduroam at DkIT

Connecting to UNOSECURE using Windows 7

How To Set Up Isu-Oit-Wpa On Windows 7 For Wireless Access (Isu- Oit- Wpa) On A Pc Or Mac Or Ipa (Windows 7) On An Ipa Or Ipac (Windows

Massey University Wireless Network Client Configuration Windows 7

Belnet Networking Conference 2013

How To Secure Wireless Networks

Internet Access: Wireless WVU.Encrypted Network Connecting a Windows 7 Device

Case Study - Configuration between NXC2500 and LDAP Server

Using WPA Enterprise on Windows XP to Access Cleveland State University s Wireless Network (WoWnet)

ICT DEPARTMENT. Windows 7. Wireless Authentication Procedures for Windows 7 & 8 Users For Linux and windows XP users visit ICT office

The following chart provides the breakdown of exam as to the weight of each section of the exam.

Developing Network Security Strategies

Configuring WPA-Enterprise/WPA2 with Microsoft RADIUS Authentication

Instructions for connecting to winthropsecure. Windows 7/8 Quick Connect Windows 7/8 Manual Wireless Set Up Apple Quick Connect Apple Settings Check

chap18.wireless Network Security

Lecture 3. WPA and i

WORKING WITH WINDOWS FIREWALL IN WINDOWS 7

Configuring Windows 7 to Use Encrypted (WPA-E) Wireless Services a...

Instructions for connecting to the FDIBA Wireless Network. (Windows XP)

Eduroam wireless network Apple Mac OSX 10.5

The Importance of Wireless Security

How To Secure Your Network With 802.1X (Ipo) On A Pc Or Mac Or Macbook Or Ipo On A Microsoft Mac Or Ipow On A Network With A Password Protected By A Keyed Key (Ipow)

ALL Mbits Powerline WLAN N Access Point. User s Manual

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

CS549: Cryptography and Network Security

Understanding Wireless Security on Your Polycom SpectraLink 8400 Series Wireless Phones

Wireless computer access at K-State

Defiance College Networking Handbook

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

RWL Tech Note Wireless 802.1x Authentication with Windows NPS

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2

How To Set Up Wireless Network Security Part 1: WEP Part 2: WPA-PSK Part 3-1: RADIUS Server Installation Part 3-2: 802.1x-TLS Part 3-3: WPA

A Division of Cisco Systems, Inc. GHz g. Wireless-G. USB Network Adapter with RangeBooster. User Guide WIRELESS WUSB54GR. Model No.

Lab Configuring LEAP/EAP using Local RADIUS Authentication

Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

Manual Configuration Instructions

WIRELESS NETWORK SECURITY

Seamless and Secure Access (SSA) Manual Configuration Guide for Windows Vista

Chapter 2 Wireless Networking Basics

Configuring Eduroam on Microsoft Windows Vista and 7 (all editions, 32 and 64 bits)

MC3WAVES Wireless Connection Wizard

CS 336/536 Computer Network Security. Summer Term Wi-Fi Protected Access (WPA) compiled by Anthony Barnard

Instructions for connecting to the LSC-O Secure Wireless Network

Transcription:

Wireless Robust Security Networks: Keeping the Bad Guys Out with 802.11i (WPA2) SUNY Technology Conference June 21, 2011 Bill Kramp FLCC Network Administrator Copyright 2011 William D. Kramp All Rights Reserved

What is a robust security network (RSN)? What is involved in deploying WPA2? What are the support issues with WPA2? Wireless Security Questions

Enforce authorized access to network Protect against downgrade attacks Data protection Confidentiality Data integrity Data origin authentication Replay protection Hardjono & Dondeti (2005) RSN (802.11i) Security Goals

Basic Wireless Terms Description of EAP and EAP-Methods 802.1x 802.11 Phases Deploying WPA2 Support issues Best practices for deployment Agenda

WEP - Wired Encryption Protocol WPA - WiFi Protected Access WPA2 - WiFi Protected Access 2 TKIP - Temporal Key Integrity Protocol AES - Advanced Encryption Standard CCMP - Counter Mode with Cipher Block Chaining MAC Protocol EAP EAPOL EAP-Methods Terms

Remote Authentication Dial In User Service Developed for MODEM pools back in the day. RADIUS

Extensible Authentication Protocol (EAP) A Point to Point Protocol (PPP) RFC 2284 added authentication to PPP EAP

Must be supported by Radius server 40+ methods available TLS MS-CHAPv2 PEAP LEAP FAST SIM 802.11i requires mutual authentication EAP-Methods

Developed by IEEE EAP over LAN (EAPOL) Allowed EAP and Radius to be used Point-to-Point communication only Encapsulates EAP packets for 802.1 802.1x protocol

Blocks all inbound and outbound traffic until after authentication is passed Exceptions to rule: Outbound to wireless device: Wake-on-LAN magic packets Inbound from wireless device: EAPOL packet type 4 SNMP notification (Encapsulated ASF Alert) Uses IEEE 802.1D to accomplish this Network aspects of 802.1x

RSN Phases

Robust Security Network (802.11i) Phases: 1. Discovery 2. Authentication 3. Key Generation and Distribution 4. Protected Data Transfer 5. Connection Termination Authentication and Association

AP Beacons AP Probe Responses Beacon and Probe Responses provide: Cipher suites: WEP TKIP CCMP (AES) Authentication mechanisms: 802.1x Phase 1 - Discovery

STA (laptop) and AS (Authentication Server) prove identities using EAP. AP blocks network traffic (802.1x) AP forwards traffic between STA and AS Master Session Key (MSK) established MSK key used to generate subsequent keys Phase 2: Authentication

Cryptographic keys generated Keys placed on STA and AP Frames exchanged only between AP and STA Phase 3: Key Generation and Distribution

Frames with encapsulated traffic between STA and AP Only frame traffic encrypted Traffic forwarded between AP and wired network Wired traffic not encrypted Phase 4: Protected Data Transfer

Secure connection torn down 802.1x port blocking enabled Phase 5: Connection Termination

RSN Phases of Operation

Easiest: itouch, ipad, iphone Moderate effort: Microsoft, especially Vista A lot of people don t update OS Most difficult: Apple Laptops Impossible: Windows 95 laptops Difficulty Deploying WPA2 Enterprise by Platform/OS

Deploying WPA2 With Machine Authentication

Wireless device must have been joined to the Windows domain over physical network first. Keys for Radius certificates installed on wireless devices. Configuring WPA2 Step 1

SSID has been added. Select Connect automatically when network is in range. Click the Security tab Configuring WPA2 Step 2

Set security type to WPA2-Enterprise Set encryption type to AES Select network authentication based on your authentication server Click Settings button Remember my credentials is dependent on policies. Configuring WPA2 Step 3

Select Validate server certificate Connect to these servers should be checked, and the radius servers listed. Select only the Trusted Root Cert Authorities needed. Select Do not prompt user to authorize new servers. Select inner Auth Method Click Configure button Configuring WPA2 Step 4

Select to use the Windows domain credentials. Click OK Then click OK for the Protected EAP Properties window. Configuring WPA2 Step 5

Click the Advanced settings button Configuring WPA2 Step 6

Select Specify authentication mode Select proper mode Click OK buttons Configuring WPA2 Step 7

Device should first join to the domain with Machine credentials, then use the Windows domain credentials to authenticate. WPA2 Machine Authentication

Possible causes: No DHCP address: Out of leases DHCP forwarding failure User exceeded failed logins attempts Radius Failure: Server spacing out Bad radius shared key AD problem Machine Auth password expired Curse of Domain Not Found With WPA2 Machine Authentication

Update Operating System Latest wireless drivers: Windows, Linux, OS X Use Windows to manage wireless adapter Place wireless network at top of stack Use good passwords Notify users about change in advance Make people available to help convert Best Practices Deploying WPA2 Enterprise

Vulnerability found on the last line of page 196 for the IEEE 802.11 (2007) Standard AES not compromised Wireless device has to be authenticated Uses shared Group Temporal Key (GTK) GTK intended for use by AP only ARP spoofing for MITM could occur WPA2 Hole 196 Vulnerability

Removing IT Staff cred s from user laptops 1. Click Start, and then click Run. 2. In the Open box, type regedit, and then click OK. 3. Locate and then click the following registry key: HKEY_CURRENT_USER\Software\Mi crosoft\eapol\usereapinfo 4. On the Edit menu, click Delete. Clearing Cached Credentials

Beaver, K., Davis, P.T., (2005). Hacking Wireless Networks for Dummies. Wiley Publishing, Inc.: Hoboken, NJ. Hardjono, T., Dondeti, L.R. (2005). Security in Wireless LANs and MANs. Artech House, Inc: Norwood, MA. Resources