Wireless security. Any station within range of the RF receives data Two security mechanism



Similar documents
Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi

White paper. Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points.

Symm ym e m t e r t ic i c cr c yptogr ypt aphy a Ex: RC4, AES 2

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

CS 356 Lecture 29 Wireless Security. Spring 2013

EVOLUTION OF WIRELESS LAN SECURITY ARCHITECTURE TO IEEE i (WPA2)

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

WEP Overview 1/2. and encryption mechanisms Now deprecated. Shared key Open key (the client will authenticate always) Shared key authentication

Chapter 6 CDMA/802.11i

WIRELESS SECURITY IN (WI-FI ) NETWORKS

How To Secure Your Network With 802.1X (Ipo) On A Pc Or Mac Or Macbook Or Ipo On A Microsoft Mac Or Ipow On A Network With A Password Protected By A Keyed Key (Ipow)

Security in IEEE WLANs

WiFi Security: WEP, WPA, and WPA2

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

WLAN Access Security Technical White Paper. Issue 02. Date HUAWEI TECHNOLOGIES CO., LTD.

Chapter 2 Wireless Networking Basics

Wireless Security. New Standards for Encryption and Authentication. Ann Geyer

The Importance of Wireless Security

The next generation of knowledge and expertise Wireless Security Basics

chap18.wireless Network Security

Huawei WLAN Authentication and Encryption

CS 336/536 Computer Network Security. Summer Term Wi-Fi Protected Access (WPA) compiled by Anthony Barnard

How To Secure Wireless Networks

WLAN - Good Security Principles. WLAN - Good Security Principles. Example of War Driving in Hong Kong* WLAN - Good Security Principles

Lecture 3. WPA and i

WIRELESS NETWORK SECURITY

Key Hopping A Security Enhancement Scheme for IEEE WEP Standards

WiFi Security: Deploying WPA/WPA2/802.1X and EAP in the Enterprise

Wireless Robust Security Networks: Keeping the Bad Guys Out with i (WPA2)

Advanced Security Issues in Wireless Networks

Wireless LAN Security Mechanisms

Journal of Mobile, Embedded and Distributed Systems, vol. I, no. 1, 2009 ISSN

IEEE Wireless LAN Security Overview

Wireless Local Area Network Security Obscurity Through Security

The following chart provides the breakdown of exam as to the weight of each section of the exam.

Wireless Networks. Welcome to Wireless

Wireless Networking Basics. NETGEAR, Inc Great America Parkway Santa Clara, CA USA

CSC574: Computer and Network Security

Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example

Authentication in WLAN

WLAN Security. Giwhan Cho Distributed/Mobile Computing System Lab. Chonbuk National University

Wi-Fi Protected Access: Strong, standards-based, interoperable security for today s Wi-Fi networks Wi-Fi Alliance April 29, 2003

UNIK4250 Security in Distributed Systems University of Oslo Spring Part 7 Wireless Network Security

Lecture 2 Secure Wireless LAN

Chapter 10: Designing and Implementing Security for Wireless LANs Overview

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Introduction to WiFi Security. Frank Sweetser WPI Network Operations and Security

Optimizing Converged Cisco Networks (ONT)

Agenda. Wireless LAN Security. TCP/IP Protocol Suite (Internet Model) Security for TCP/IP. Agenda. Car Security Story

Certified Wireless Security Professional (CWSP) Course Overview

CS5490/6490: Network Security- Lecture Notes - November 9 th 2015

Configuring Security Solutions

Analysis of Security Issues and Their Solutions in Wireless LAN 1 Shenam Chugh, 2 Dr.Kamal

All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices

Recommended Wireless Local Area Network Architecture

Particularities of security design for wireless networks in small and medium business (SMB)

Distributed Systems Security

DESIGNING AND DEPLOYING SECURE WIRELESS LANS. Karl McDermott Cisco Systems Ireland

Network Security Protocols

Cisco SAFE: Wireless LAN Security in Depth

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Implementing Security for Wireless Networks

Basic Security. Security Service. Authentication. Privacy. Authentication. Data privacy & Data integrity

CS549: Cryptography and Network Security

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance

UNIVERZITA KOMENSKÉHO V BRATISLAVE FAKULTA MATEMATIKY, FYZIKY A INFORMATIKY PRÍPRAVA ŠTÚDIA MATEMATIKY A INFORMATIKY NA FMFI UK V ANGLICKOM JAZYKU

Extensible Authentication Protocol (EAP) Security Issues

Ebonyi State University Abakaliki 2 Department of Computer Science. Our Saviour Institute of Science and Technology 3 Department of Computer Science

A Dynamic Extensible Authentication Protocol for Device Authentication in Transport Layer Raghavendra.K 1, G. Raghu 2, Sumith N 2

IEEE 802.1X For Wireless LANs

A DISCUSSION OF WIRELESS SECURITY TECHNOLOGIES

Vulnerabilities of Wireless Security protocols (WEP and WPA2)

Wireless Encryption Protection

Netzwerksicherheit: Anwendungen

Applying of Security Mechanisms to Low Layers of OSI/ISO Network Model

Cisco Secure ACS. By Igor Koudashev, Systems Engineer, Cisco Systems Australia 2006 Cisco Systems, Inc. All rights reserved.

Network Security. Security of Wireless Local Area Networks. Chapter 15. Network Security (WS 2002): 15 Wireless LAN Security 1 Dr.-Ing G.

1. discovery phase 2. authentication and association phase 3. EAP/802.1x/RADIUS authentication 4. 4-way handshake 5. group key handshake 6.

Network Security. Security of Wireless Local Area Networks. Chapter 15. Network Security (WS 2003): 15 Wireless LAN Security 1. Dr.-Ing G.

Network Access Control and Cloud Security

Your Wireless Network has No Clothes

WIRELESS LAN SECURITY FUNDAMENTALS

WiFi Security Assessments

WLAN w Technology

Wireless LAN Security I: WEP Overview and Tools

WI-FI SECURITY: A LITERATURE REVIEW OF SECURITY IN WIRELESS NETWORK

Linux Access Point and IPSec Bridge

Transcription:

802.11 Security

Wireless security Any station within range of the RF receives data Two security mechanism A means to decide who or what can use a WLAN authentication A means to provide privacy for the wireless data encryption

Encryption concepts Electronic Code Book (ECB): the same plain text input always produce the same ciphertext (not good for text < 40 sym.) Fragmentation larger CPU processing penalty

Initialization vector ECB the same plaintext input always produce the same ciphertext 802.11 recommends to change Initialization Vector (IV) on a per-frame basis

Encryption in 802.11 Privacy WEP WEP is based on RC4 symmetric stream cipher Symmetric WEP keys (40 or 104 bits) statically configured both on APs and clients Why Wep? Low computational overhead In 1997 WLAN devices were application-specific devices (low computational power) Wep can be written in 30 lines of code

Wep To avoid ECB, Wep uses a 24-bit IV IV must change on a per-frame basis (to avoid collision = same key and same IV) ICV = integrity check value

Wep Up to 4 key statically configured, used only one at a time Wep encryption is used only on data frames (payload encryption) and during Shared Key authentication Wep encrypts data or payload and the integrity check value, all other fields are transmitted without encryption

Encryption and decryption ICV is a 32-bit value that functions as an integrity check for the frame It augments layer 1 and 2 frame check sequences, which are designed to check for transmission related errors

Authentication mechanism in 802.11: open authentication Null authentication algorithm. The AP grants any request for authentication Access control relies on preconfigured WEP key on the client and AP. If the client and AP do not have WEP enabled no security and privacy at all If the client is configured with a key that differs from the key on the AP, the client will be unable to encrypt/decrypt data frames correctly, and the frames will be discarded

Open authentication

Authentication mechanism in 802.11: shared key authentication The client and the AP MUST have Wep enabled and have matching WEP keys

MAC address authentication Not specified in 802.11, but supported by many vendors It verifies the client s MAC address against a list of allowed addresses

Vulnerability Open authentication: no way for the AP to determine whether a client is valid. MAC address authentication MAC addresses are sent unencrypted in all 802.11 frames Spoofing of valid MAC addresses MAC Spoofing is possible with network interface cards (NICs) that allow the universally administrated address (UAA) to be overwritten with a locally administrated addresses (LAA)

(A xor B) xor A = B XOR properties If the attacker obtains (A xor B) by knowing A it gets the secret B (A xor B) xor B = A A xor A = 0 (A xor K) xor (B xor K) = A xor B 0 xor 0 = 0 0 xor 1 = 1 1 xor 0 = 1 1 xor 1 = 0 If K is the same key used to encrypt A and B, and the attacker listens (A xor K) and (B xor K), it is able to compute (A xor B), which facilitates the solution.

Shared key vulnerabilities Not the key: useful to decrypt frames for a given IV and WEP key pair and for a specific length

WEP encryption vulnerabilities Fluhrer, Mantin and Shamir you could derive a WEP key by passively collecting particular frames from a WLAN Some IVs, weak IVs, can reveal key bytes after statistical analysis You can derive WEP keys of either 40 or 104-bit key length after as few as 4 million frames. Passive attack: the attacker simply eavesdrops on a BSS and collects transmitted frames. Unlike Shared key authentication vulnerability, this attack can derive the actual WEP key, not just the key stream

Bit flipping attack The attacker captures a frame from the WLAN The attacker flips random bits in the data payload of the frame The attacker modifies the ICV The attacker transmits the modified frame The receiver receives the frame and accepts the modified frame The receiver forward the frame at the upper layer Because bits are flipped layer 3 checksum fails The IP generates a PREDICTABLE error The attacker sniffs the encrypted error message The attacker derives the keystream Similar to shared key attack

Static Wep Key 802.11 specification does not specify keymanagement mechanisms Static pre-shared keys 802.11 authenticate the device loss or theft problem Manually rekeying all wireless devices scalability problem

Secure 802.11 The WLAN industry recognizes vulnerabilities in 802.11 Requirements: authentication and encryption scalable and manageable. 802.11i not already a standard A subset of 802.11i called Wi-Fi Protected Access (WPA)

WEP: weak and mixed privacy authentication roadmap

roadmap WEP: weak and mixed privacy authentication IEEE 802.11i: a new security architecture Concept: Robust Security Network Association In addition to wep: crypto-mechanism with integrity functions Protects headers and payload Anti-replay mechanism Extended IV New crypto mechanisms (+frame encapsulation) New advanced authentication schemes (STA - AP) New advanced session key management schemes

roadmap WEP: weak and mixed privacy authentication IEEE 802.11i: a new security architecture Concept: Robust Security Network Association In addition to wep: crypto-mechanism with integrity functions Protects headers and payload Anti-replay mechanism Extended IV New crypto mechanisms (+frame encapsulation) New advanced authentication schemes (STA - AP) New advanced session key management schemes Wi-fi Alliance proposes WPA Compliant with existing HW Adopts a subset of IEEE 802.11i solutions (specifically, IEEE 802.1x authentication) and TKIP to enforce key protection WPA2: adopts 5 EAP schemes

roadmap IEEE 802.11i: a new standard security architecture Association: 802.11: Beacon, Probe response indicate AP, ssid 802.11i : + security capabilities (authentication and crypto) a STA can select mechanisms in association request packets Authentication: 802.11i mandates use of Std 802.1x (for authentication) that can be applied over different MACs (Ethernet, Wifi ) but it does not specify which EAP methods to use for credentials. It only specifies that such a method must ensure mutual authentication and session key generation and management. 802.1x: port-based network access control: supplicant, authenicator, auth-server. based on EAPOL protocol framework: which auth. mechanism to use? Supports different credentials: shared secret (EAP-MD5), X.509 digital certificates (EAP-TLS), hybrid (EAP-TTLS, PEAP), telephone-like (EAP-SIM ) or RADIUS protocol (see next slide) EAPOL: extensible authentication protocol over Lan RADIUS: remote authentication dial-in user service

roadmap. IEEE 802.11i: a new standard security architecture Association: Authentication: 802.11i mandates use of Std 802.1x (for authentication) 802.1x: port-based network access control: supplicant, authenicator, auth-server. RADIUS protocol: controls AAA (Authentication, Authorization, Accounting) Check on local DB or remote SQL, Kerberos, LDAP, active directory service e.g. Radius Server (AS) EAP, PAP, CHAP (secure auth. mechanism + secure pairwise master key) Network Access Server (NAS) DHCP + LAN access Auth. challenge (via tunnel) Radius Req(Userid, passwd, MAC, etc.) EAPOL: extensible authentication protocol over Lan RADIUS: remote authentication dial-in user service

roadmap IEEE 802.11i: a new standard security architecture Association: Authentication: Encryption: IEEE 802.11i defines 2 protocols for frame protection (based on AES): TKIP: temporary key integrity protocol (base for WPA) 64bit message integrity (MIC) 128bit IV (initialization vector) per packet re-keying CCMP (CBC-MAC): (base for WPA2) Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (based on AES)

Wireless security The authentication framework: securely communicating messages between the client, AP, and authentication server The authentication algorithm: validates user credentials The data privacy algorithm: provides data privacy across the wireless medium for data frames The data integrity algorithm: provides data integrity across the wireless medium to ensure to the receiver that the data frame was not tempered with

The authentication framework 802.11 is missing some key components to provide effective authentication: Centralized, user-based authentication Dynamic encryption keys Encryption key management Mutual authentication

Centralized user-based authentication Device-based authentication does not prevent unauthorized accesses Logistical issues: lost or stolen devices, employee termination manually rekeying Centralized user-based management via authentication, authorization, accommodation (AAA) servers (RADIUS) User-based authentication user-specific encryption keys You only need to disable a user account to prevent accesses

Mutual authentication two-way : network authenticating the client and vice versa 802.11: the AP authenticates the client A rogue AP can pose as a valid AP and subvert the data on the client s machine

802.1X Extensible Authentication Protocol (EAP). 802.1X encapsulates EAP messages for use at Layer 2 802.11i incorporates the 802.1X authentication framework (user-based auth.)

802.1X and EAP do not mandate the use of any specific authentication algorithm. Only requirement: both client and authentication server support the same authentication algorithm. Examples: EAP-Transport Layer Security(EAP-TLS,PEAP): similar to SSL, Mutual authentication by digital certificates used to create a SSL tunnel EAP- Message Digest 5 (EAP-MD5): similar to Challenge Handshake Authentication Protocol (CHAP). Password based one-way authentication mechanism EAP-Cisco (LEAP): Password based mutually authenticating algorithm

802.1X authentication 802.1X authentication requires 3 entities: The supplicant: resides on the WLAN client The authenticator: resides on the AP The authentication server: resides on the RADIUS server One logical port (AID), two paths (Controlled and Uncontrolled)

The Authentication algorithm 802.11i and WPA provide a mechanism for authentication algorithms to communicate between client, AP, and authentication server via 802.1X authentication framework 802.11i and WPA do not mandate the use of a specific authentication algorithm Next Slide (EAP Cisco). EAP Cisco is proprietary no details

Client and AAA server generate a dynamic encryption key based on common information (user identity) The AAA server sends the key to the AP

Wep is vulnerable Data Privacy How can you fix 802.11 encryption without requiring a complete replacement of AP hardware or client NIC? The answer is the Temporary Key Integrity Protocol (TKIP) TKIP uses many key functions of Wep, but: The Wep key is quickly changed on a per-frame basis Message Integrity Check (MIC) prevents frame tampering and frame replay.

Per-frame keying Fluhrer, Martin and Shamir paper describes vulnerability of RC4 as it is implemented in Wep. Attack rely on collecting several data frames with encrypted data using weak IVs Solution: change the Wep key before attacker can collect enough frames to derive key bytes per-frame keying

Per-frame keying Premise: IV, transmitter MAC and WEP key are processed together via two phase mixing function. The output of this function matches standard 104-bit Wep key and 24-bit IV. IEEE is proposing the 24-bit IV be increased to 48-bit IV.

Incremented by 1 at each transmission Only 16 (not 24). The remaining 8 bits are fixed values The per-frame key is only valid when the 16-bit IV values have not been used no collision. To avoid IV collision, the phase 1 key is recalculated by incrementing the most significant 32 bits of the IV by 1 and recalculating the perframe key

Collisions Will this mechanism ever cause an IV collision? 802.11b roughly 1000frames/sec 16-bit frame IV exhausts after 65 seconds (2^16 frames/1000) There are 2^32 possible phase I IVs 65*2^32 8852 years Remember TKPI is designed to patch the holes in 802.11 (weak algorithms in lieu of hardware replacement)

Message Integrity Check (MIC) is a feature used to augment the ineffective ICV MIC solves the frame tampering/bit flipping attacks The MIC has a unique key that differs from the key used to encrypt data frames This unique key is mixed with the destination MAC address, the source MAC address and the data payload Data Integrity The Michael MIC algorithm

TKPI Encryption process

TKPI decryption process

MIC countermeasures The receiver deletes the existing keys for the association The receiver logs the issue as a securityrelevant matter The associated client from which the faulty frame was received cannot associate and authenticate for a period of 60 seconds to slow down the attacker If the client received the faulty frame, the client drops any non-802.1x frames The client also request a new key

Enhanced Key Management No discussion covered how the encryption key and the MIC key are managed 802.1X and EAP can provide the RADIUS server and client with dynamic, user-based keys. The key used for authentication is not the same used for frame encryption or message integrity. It is a MASTER Key used to derive the other keys.

Implementing WPA To upgrade your wireless security to WPA, you must have three critical components: an access point (AP) or wireless router that supports WPA a wireless network card that has WPA drivers available a client (called a supplicant) that supports WPA and your operating system

Implementing WPA From a hardware standpoint, this means only that your wireless access points and your wireless NICs must recognize the WPA standard. Unfortunately, most hardware manufacturers won't support WPA through a firmware upgrade, so you may find yourself forced to buy new wireless hardware if you want to use WPA. Adding WPA support to your OS is the easiest part of the process is. Microsoft provides a free WPA upgrade, but it only works with Windows XP. If you are running an OS other than Win XP, you'll need third-party client software, called a supplicant.

Secure random number EAP messages protected by MIC Pseudo Random Function

Broadcast PMK and PTK keys are unicast in nature The AP is the only entity in a BSS that can send broadcast or multicast traffic Broadcast and multicast frames use the group key hierarchy The AP sends the GMK encrypted with the client unicast encryption key The GMK are purged each time a client disassociate or MIC failure

AES encryption The IEEEhas adopted the Advanced Encryption Standard (AES) to the dataprivacy section of the proposed 802.11i standard (alg. from Rijndael) AES requires a feedback mode to avoid ECB