How To Secure Your Network With 802.1X (Ipo) On A Pc Or Mac Or Macbook Or Ipo On A Microsoft Mac Or Ipow On A Network With A Password Protected By A Keyed Key (Ipow)



Similar documents
IEEE 802.1X For Wireless LANs

Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi

Wireless security. Any station within range of the RF receives data Two security mechanism

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

WEP Overview 1/2. and encryption mechanisms Now deprecated. Shared key Open key (the client will authenticate always) Shared key authentication

Wireless Security. New Standards for Encryption and Authentication. Ann Geyer

Implementing Security for Wireless Networks

Application Note: Onsight Device VPN Configuration V1.1

WIRELESS SECURITY IN (WI-FI ) NETWORKS

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

WLAN - Good Security Principles. WLAN - Good Security Principles. Example of War Driving in Hong Kong* WLAN - Good Security Principles

Optimizing Converged Cisco Networks (ONT)

The Importance of Wireless Security

IEEE 802.1X Overview. Port Based Network Access Control

The next generation of knowledge and expertise Wireless Security Basics

Security in IEEE WLANs

WIRELESS NETWORK SECURITY

Chapter 2 Wireless Networking Basics

Chapter 6 CDMA/802.11i

DESIGNING AND DEPLOYING SECURE WIRELESS LANS. Karl McDermott Cisco Systems Ireland

Wireless Networks. Welcome to Wireless

Symm ym e m t e r t ic i c cr c yptogr ypt aphy a Ex: RC4, AES 2

WiFi Security: Deploying WPA/WPA2/802.1X and EAP in the Enterprise

Wireless Robust Security Networks: Keeping the Bad Guys Out with i (WPA2)

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

CS 356 Lecture 29 Wireless Security. Spring 2013

Authentication in WLAN

WLAN Authentication and Data Privacy

Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example

Network security, TKK, Nov

Key Management (Distribution and Certification) (1)

Extensible Authentication Protocol (EAP) Security Issues

White paper. Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points.

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Introduction to WiFi Security. Frank Sweetser WPI Network Operations and Security

Key Hopping A Security Enhancement Scheme for IEEE WEP Standards

Wireless Technology Seminar

WLAN Security. Giwhan Cho Distributed/Mobile Computing System Lab. Chonbuk National University

WLAN Access Security Technical White Paper. Issue 02. Date HUAWEI TECHNOLOGIES CO., LTD.

ClickShare Network Integration

CS5490/6490: Network Security- Lecture Notes - November 9 th 2015

Wireless LAN Security Mechanisms

The following chart provides the breakdown of exam as to the weight of each section of the exam.

All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices

How To Secure Wireless Networks

Cisco SAFE: Wireless LAN Security in Depth

Certficate Extensions and Attributes Supporting Authentication in PPP and Wireless LAN. Daniel Schwarz

Wi-Fi Client Device Security & HIPAA Compliance

Distributed Systems Security

Advanced Security Issues in Wireless Networks

EVOLUTION OF WIRELESS LAN SECURITY ARCHITECTURE TO IEEE i (WPA2)

802.11b Wireless LAN Authentication, Encryption, and Security

Agenda. Wireless LAN Security. TCP/IP Protocol Suite (Internet Model) Security for TCP/IP. Agenda. Car Security Story

Wireless Security for Mobile Computers

Configuring Wired 802.1x Authentication on Windows Server 2012

Wireless Local Area Network Security Obscurity Through Security

Wireless Networking Basics. NETGEAR, Inc Great America Parkway Santa Clara, CA USA

Configuring WPA-Enterprise/WPA2 with Microsoft RADIUS Authentication

CSC574: Computer and Network Security

CISCO WIRELESS SECURITY SUITE

Wi-Fi Protected Access: Strong, standards-based, interoperable security for today s Wi-Fi networks Wi-Fi Alliance April 29, 2003

Analysis of Security Issues and Their Solutions in Wireless LAN 1 Shenam Chugh, 2 Dr.Kamal

How To Protect A Wireless Lan From A Rogue Access Point

Huawei WLAN Authentication and Encryption

Securing Wireless LANs with LDAP

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance

A Dynamic Extensible Authentication Protocol for Device Authentication in Transport Layer Raghavendra.K 1, G. Raghu 2, Sumith N 2

IEEE Wireless LAN Security Overview

Wireless LAN Access Control and Authentication

How To Set Up Wireless Network Security Part 1: WEP Part 2: WPA-PSK Part 3-1: RADIUS Server Installation Part 3-2: 802.1x-TLS Part 3-3: WPA

Network Security. Lecture 3

ipad in Business Security

CS549: Cryptography and Network Security

vwlan External RADIUS 802.1x Authentication

2007 Microsoft Office System Document Encryption

Particularities of security design for wireless networks in small and medium business (SMB)

Lecture 3. WPA and i

WiFi Security: WEP, WPA, and WPA2

Network Security: WLAN Security. Tuomas Aura T Network security Aalto University, Nov-Dec 2010

Configuring Security Solutions

WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.

Deploying iphone and ipad Security Overview

chap18.wireless Network Security

Link Layer and Network Layer Security for Wireless Networks

Executive Summary. This white paper includes the following sections: A.What Does 802.1x Do? B. An Overview of the 802.1x Standard

Cisco Secure ACS. By Igor Koudashev, Systems Engineer, Cisco Systems Australia 2006 Cisco Systems, Inc. All rights reserved.

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2

What information will you find in this document?

Transcription:

Wireless LAN Security with 802.1x, EAP-TLS, and PEAP Steve Riley Senior Consultant MCS Trustworthy Computing Services

So what s the problem? WEP is a euphemism Wired Equivalent Privacy Actually, it s a lie It isn t equivalent to wired privacy at all! How can you secure the air? So: WEP sucks http://www.isaac.cs.berkeley.edu/isaac/wep-faq.html

Wired equivalent privacy

WEP setup and RC4 Secret key shared between access point and all clients Encrypts traffic before transmission Performs integrity check after transmission WEP uses RC4, a stream cipher [key] XOR [plaintext] à [ciphertext] Maybe double-xor for better security? Hah! [ciphertext] XOR [key] à [plaintext]

Common attacks Bit-flipping (encryption integrity) Flipping bit n in cipertext flips same bit in plaintext Statistical attacks Multiple ciphertexts using same key permit determination of plaintext XOR Enables statistical attacks to recover plaintext More ciphertexts eases this Once one plaintext is known, recovering others is trivial

WEP s defenses Integrity check (IC) field CRC-32 checksum, part of encrypted payload Not keyed Subject to bit-flipping à can modify IC to make altered message appear valid Initialization vector (IV) added to key Alters key somewhat for each packet 24-bit field; contained in plaintext portion Alas, this small keyspace guarantees reuse

More IV problems Say an AP constantly sends 1500-byte packets at 11mbps Keyspace exhausted in 5 hours Could be quicker if packets are smaller Key reuse causes even more collisions Some cards reset IV to 0 after initialization Some cards increment by 1 after each packet 802.11 standard does not mandate new per-packet IV!

Classes of attacks Key and IV reuse Small IV space; no IV replay protection Known plaintext attack Can recover stream of length N for a given IV Then forge packets of length N in absence of keyed IC Partial known plaintext attack Can recover M bytes of keystream, M < N Repeated probing à extend keystream to N Weaknesses in RC4 key scheduling algorithm Large class of weak keys can break secret key

Classes of attacks Authentication forging WEP encrypts challenge using client-chosen IV Recovery of keystream for a given IV allows reuse of the IV for forging WEP authentication Doesn t provide key, so can t join LAN Realtime decryption IV reuse and probing à construct dictionary of IVs and keystreams Enables decryption in real time Storage: 1500 bytes of keystream for each IV; 24 b GB

Tools WEPCrack breaks 802.11 keys http://wepcrack.sourceforge.net/ AirSnort breaks 802.11 keys Needs only 5-10 million packets http://airsnort.shmoo.com/ NetStumbler access point reconnaissance http://www.netstumbler.com

WEP suckage Same key reused over and over again Per-packet IV isn t enough Need to increase keyspace an attacker must analyze Generate new keys (not just IVs) periodically Use unique per-client keys These are our first requirements

Other problems Rogue access points Mutual authentication AP authenticates to client Disassociation attacks Assoc/disassoc messages are unencrypted and unauthenticated Fix with keyed message integrity check Unauthorized use or monitoring Incorporate user and computer authentication

802.1x

Solution today: 802.1x Port-based access control mechanism defined by IEEE Works on anything, wired and wireless Access point must support 802.1x No special WIC requirements Allows choice of authentication methods using EAP Chosen by peers at authentication time Access point doesn t care about EAP methods Manages keys automagically No need to preprogram WICs

Is 802.1x enough? No It does solve: Key discovery by changing keys often and using different keys for each client Rogue APs and man-in-the-middle attacks by performing mutual device authentication Unauthorized access by authenticating users and computers It does not solve: Packet and disassociation spoofing because 802.1x doesn t use a keyed MIC

Clarifying terminology 802.11 is the specification for over-the-air wireless networks 802.1x is a PHY-independent specification for port-based access control Combining them makes sense There is no such thing as 802.11x But there is work on something called 802.11i

802.1x over 802.11 Supplicant 802.11 association EAPOL-start EAP-request/identity Authenticator Access blocked Authentication Server EAPresponse/identity EAP-request EAP-response (credentials) EAP-success RADIUS-access-request RADIUS-access-challenge RADIUS-access-request RADIUS-access-accept EAPOW-key (WEP) Access allowed

Association and authentication The 802.11 association happens first Need to talk to the AP and get an IP address Open authentication we don t have the WEP key yet Access beyond AP prohibited until authn succeeds AP drops non-eapol traffic After key is sent in EAPOW-key, access beyond AP is allowed Security conversation between supplicant and authentication server Wireless NIC and AP are passthrough devices

Before authentication Supplicant Controlled port prevents supplicant LAN access Uncontrolled port allows authenticator to contact authentication server the Air Authenticator AuthN Server Directory

After authentication Supplicant Controlled port now permits supplicant to access LAN the Air Authenticator AuthN Server Directory

802.11/802.1x state machine Class 1 frames State 1 802.11 unauthenticated Unassociated Successful open authn DeauthN notification State 2 Class 1, 2 frames 802.11 authenticated Unassociated Successful assoc or reassoc Class 1, 2, 3 frames Successful 802.1x authn Class 1, 2, 3 frames State 3 802.11 authenticated Associated State 4 802.11 authenticated Associated 802.1x authenticated Disassoc notification EAPOL-logoff DeauthN notification

Encryption keys Client and RADIUS server generate peruser session WEP keys Never sent over the air RADIUS server sends key to AP (encrypted with RADIUS shared secret) Access point has a global WEP key Used during AP authentication to client Sent in EAPOW-key message Encrypted with session key Session keys regenerated when Key time exceeded (60 minute default) Client roams to new AP

Extensible authentication protocol

EAP Link-layer security framework Simple encapsulation protocol for authentication mechanisms Runs over any link layer, lossy or lossless No built-in security Doesn t assume physically secure link Authentication methods must incorporate their own security

Authentication methods EAP allows choice of authentication methods For mutual authentication TLS: authentication server supplies certificate IKE: server demonstrates possession of preshared key or private key (certificate) Kerberos: server demonstrates knowledge of session key

AuthN supported in Windows EAP-MD5 disallowed for wireless Can t create encrypted session between supplicant and authenticator Would transfer password hashes in the clear Cannot perform mutual authentication Vulnerable to man-in-the-middle attacks EAP-TLS in Windows XP release Requires client certificates Best to have machine and user Service pack 1 adds protected EAP

Protected EAP (PEAP) Extension to EAP Allows use of any secure authentication mechanism for EAP No need to write individual EAP-enabled methods Windows PEAP allows: MS-CHAPv2 passwords TLS certificates SecurID For many deployments, passwords still (alas) are necessary

EAP architecture SecurID TLS MS-CHAPv2 TLS GSS_API Kerberos PEAP IKE MD5 method layer EAP EAP layer PPP 802.3 802.5 802.11 Anything media layer

Note Do not configure IAS and XP for both EAP-TLS alone PEAP with any method Man-in-the-middle vulnerability If you need TLS and MS-CHAPv2 together Deploy only PEAP Select both MS-CHAPv2 and TLS methods

How it works: The Windows logon process over PEAP with MS-CHAPv2

Security requirements, again Mutual device authentication Workstation and AP No rogue access points Prevents man-in-the-middle attacks Ensures key is transferred to correct entity User authentication No unauthorized access or interception WEP key uniqueness and regeneration Stop packet/disassociation spoofing

Windows domain logon Two logons occur Machine User Machine accounts look like user accounts Certificate credential User ID/password/domain credential Take advantage of this

Windows PEAP authentication First phase machine logon 802.11 association Authenticate AP Authenticate computer Transition controlled port status For machine account access to authorized resources Second phase user logon Authenticate user Transition controlled port status For user account access to authorized resources

Windows PEAP authentication First phase 1. Supplicant performs regular 802.11 association 2. Supplicant sets up TLS channel with authenticator and requests authentication server s certificate 3. Supplicant Verifies name and dates on certificate Validates chain

Our requirements so far Mutual device authentication Workstation and AP No rogue access points User authentication No unauthorized access or interception WEP key uniqueness and regeneration Packet/disassociation spoofing

Windows PEAP authentication First phase 4. Supplicant sends machine credentials to authenticator over previously-established TLS channel 5. Authenticator checks validity by contacting authentication server (RADIUS) 6. Authentication server contacts directory to verify credentials

Windows PEAP authentication First phase 7. If valid, RADIUS generates WEP key 8. Authenticator delivers key to supplicant and transitions controlled port status to permit supplicant access to LAN (to resources allowed access through machine account only) 9. Computer logs on to domain

Our requirements so far Mutual device authentication Workstation and AP No rogue access points User authentication No unauthorized access or interception WEP key uniqueness and regeneration Packet/disassociation spoofing

Windows PEAP authentication Second phase 1. Logon dialog appears 2. Supplicant sends user credentials to authenticator 3. Authenticator checks validity by contacting authentication server (RADIUS) 4. Authentication server contacts directory 5. If valid, authenticator extends controlled port status to permit supplicant full access to LAN 6. User logged on to domain

Our requirements so far Mutual device authentication Workstation and AP No rogue access points User authentication No unauthorized access or interception WEP key uniqueness and regeneration Packet/disassociation spoofing

Why use machine accounts? Domain logon required for: Machine group policies Computer startup scripts Software installation settings When user account passwords expire Need associated WIC and transitioned controlled port for user notification and change dialog Machine account logon phase allows password expiration notices and changes to occur normally Cisco s LEAP can t deal with this No facility for machine authentication

Why passwords? Not all customers are ready for a PKI Managing user certificates stored on computer hard drives will always be painful Some personnel might roam among computers Smartcards solve this Technical and sociological issues can delay or prevent deployment PEAP enables (pretty) secure wireless now Allows easy migration to certificates and smartcards later

Remaining vulnerabilities

Remaining vulnerabilities Two related vulnerabilities not addressed with 802.1x Bit flipping with known IVs à packet spoofing Disassociation denials of service Simple addition to 802.1x will solve both

Bit-flipping attacks WEP doesn t perform per-packet authentication IC is not a keyed message integrity check Flipped bits in WEP packet à recalculated IC To spoof or replay: Flip bits in WEP packet where IV is known AP accepts packet Layer 3 device rejects, sends predictable response Build response database and derive key

Disassociation attacks 802.11 associate/disassociate messages are unauthenticated and unencrypted Attacker can forge disassociation message Bothersome denials of service

Solution: keyed IC Change behavior of WEP s IC Derive key from seed value, source and destination MACs, payload Any change to these will alter the IC Include in every WEP packet

Deployment

System requirements Client: Windows XP service pack 1 Server: Windows Server 2003 IAS Internet Authentication Service our RADIUS server Certificate on IAS computer Backporting to Windows 2000 Client and IAS must have SP3 No zero-config support in the client See KB article 313664 Supports only TLS and MS-CHAPv2 Future EAP methods in XP and 2003 might not be backported

Setup 1. Build Windows Server 2003 IAS server 2. Join to domain 3. Enroll computer certificate 4. Register IAS in Active Directory 5. Configure RADIUS logging 6. Add AP as RADIUS client 7. Configure AP for RADIUS and 802.1x 8. Create wireless client access policy 9. Configure clients Don t forget to import CA root

Access policy Policy condition NAS-port-type = Wireless IEEE 802.11 and Wireless other Windows-group = <some group in AD> Optional; allows administrative control Should contain user and computer accounts Profile No regular authentication methods EAP type: protected EAP; use certificate from step 3 Encryption: only strongest (MPPE 128-bit) Attributes: Ignore-user-dialin-properties = True

What else?

Interoperability PEAP standards authors Microsoft Cisco RSA Our implementation is version 0 Not compatible with version 1 Working towards interoperability PEAP allows servers and clients to support multiple versions

802.1x alternative WPA (Wi-Fi protected access) Includes TKIP (temporal key integrity protection) Uses RC4, rotates keys every 10,000 packets Combines shared 128-bit key with client MAC and 128-bit IV Provides key uniqueness WPA relies on 802.1x for user and mutual device authentication In beta now for Windows XP

The future long term IEEE is working on 802.11i Replacement for WEP Includes TKIP, 802.1x, and keyed IC Uses AES Addresses all currently known vulnerabilities and poor implementation decisions Need to be IEEE member to read work in progress Expected ratification in September 2003

References Security of the WEP Algorithm http://www.isaac.cs.berkeley.edu/isaac/wep-faq.html 802.1x--Port Based Network Access Control http://www.ieee802.org/1/pages/802.1x.html PPP Extensible Authentication Protocol http://www.ietf.org/rfc/rfc2284.txt PPP EAP-TLS Authentication Protocol http://www.ietf.org/rfc/rfc2176.txt Protected EAP Protocol ftp://ftp.rfc-editor.org/in-notes/internet-drafts/draft-

2003 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY.