DESIGNING AND DEPLOYING SECURE WIRELESS LANS. Karl McDermott Cisco Systems Ireland kamcderm@cisco.com



Similar documents
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi

WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.

Recommended Wireless Local Area Network Architecture

The following chart provides the breakdown of exam as to the weight of each section of the exam.

Configuring Security Solutions

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline

How To Secure Your Network With 802.1X (Ipo) On A Pc Or Mac Or Macbook Or Ipo On A Microsoft Mac Or Ipow On A Network With A Password Protected By A Keyed Key (Ipow)

The next generation of knowledge and expertise Wireless Security Basics

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance

CISCO WIRELESS CONTROL SYSTEM (WCS)

Wireless security. Any station within range of the RF receives data Two security mechanism

Security in IEEE WLANs

Security Awareness. Wireless Network Security

Cisco SAFE: Wireless LAN Security in Depth

Authentication in WLAN

Cisco Wireless Control System (WCS)

Industrial Communication. Securing Industrial Wireless

Certified Wireless Security Professional (CWSP) Course Overview

All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices

1.1 Demonstrate how to recognize, perform, and prevent the following types of attacks, and discuss their impact on the organization:

Enterprise A Closer Look at Wireless Intrusion Detection:

Agenda. Wireless LAN Security. TCP/IP Protocol Suite (Internet Model) Security for TCP/IP. Agenda. Car Security Story

A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model

Wireless Security. New Standards for Encryption and Authentication. Ann Geyer

Wireless Security and Healthcare Going Beyond IEEE i to Truly Ensure HIPAA Compliance

Technical Brief. Wireless Intrusion Protection

Designing, Securing and Monitoring a/b/g/n Wireless Networks

WEP Overview 1/2. and encryption mechanisms Now deprecated. Shared key Open key (the client will authenticate always) Shared key authentication

How To Secure Wireless Networks

Wireless Network Analysis. Complete Network Monitoring and Analysis for a/b/g/n

Wireless Security for Mobile Computers

How To Protect A Wireless Lan From A Rogue Access Point

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

WLAN Security Why Your Firewall, VPN, and IEEE i Aren t Enough to Protect Your Network

Network Access Security. Lesson 10

Observer Analyzer Provides In-Depth Management

WHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks

Ebonyi State University Abakaliki 2 Department of Computer Science. Our Saviour Institute of Science and Technology 3 Department of Computer Science

CS 356 Lecture 29 Wireless Security. Spring 2013

Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.

White paper. Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points.

Developing Network Security Strategies

Wireless LAN Security Mechanisms

WIRELESS NETWORK SECURITY

Introduction to WiFi Security. Frank Sweetser WPI Network Operations and Security

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

Chapter 6 CDMA/802.11i

Topics in Network Security

Chapter 2 Wireless Networking Basics

All You Wanted to Know About WiFi Rogue Access Points

Wireless Networks. Welcome to Wireless

m-trilogix White Paper on Security in Wireless Networks

Attacking Automatic Wireless Network Selection. Dino A. Dai Zovi and Shane A. Macaulay

ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3

WIRELESS NETWORKING SECURITY

Computer Networks. Secure Systems

The Importance of Wireless Security

WLAN - Good Security Principles. WLAN - Good Security Principles. Example of War Driving in Hong Kong* WLAN - Good Security Principles

Security in Wireless Local Area Network

Wireless Robust Security Networks: Keeping the Bad Guys Out with i (WPA2)

Best Practices for Outdoor Wireless Security

Recommended IP Telephony Architecture

Network security, TKK, Nov

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

A Dynamic Extensible Authentication Protocol for Device Authentication in Transport Layer Raghavendra.K 1, G. Raghu 2, Sumith N 2

WHITEPAPER. Wireless LAN Security for Healthcare and HIPAA Compliance

Running Head: WIRELESS DATA NETWORK SECURITY FOR HOSTPITALS

WIRELESS SECURITY TOOLS

Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example

Closing Wireless Loopholes for PCI Compliance and Security

Securing end devices

WiFi Security: Deploying WPA/WPA2/802.1X and EAP in the Enterprise

Wireless Threats To Corporate Security A Presentation for ISACA UK Northern Chapter

WIRELESS SECURITY IN (WI-FI ) NETWORKS

Design and Implementation Guide. Apple iphone Compatibility

Implementing Security for Wireless Networks

Wireless Network Security. Pat Wilbur Wireless Networks March 30, 2007

Wi-Fi Client Device Security and Compliance with PCI DSS

Ensuring HIPAA Compliance in Healthcare

Wireless Technology Seminar

How Cisco Tracks RFID with Active RFID and Wireless LANs


JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

Wi-Fi, Health Care, and HIPAA

Wireless VPN White Paper. WIALAN Technologies, Inc.

SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005

Link Layer and Network Layer Security for Wireless Networks

Transcription:

DESIGNING AND DEPLOYING SECURE WIRELESS LANS Karl McDermott Cisco Systems Ireland kamcderm@cisco.com 1

Agenda Wireless LAN Security Overview WLAN Security Authentication and Encryption Radio Monitoring Intrusion Detection Services Location Services and RFID Tracking 2

Why WLAN Security Is Important? Vulnerabilities: Hackers Employees Lessons: War Driving Do not rely on basic WEP encryption; Requirement for Enterprise class Security (WPA, EAP/802.1x protocols, Wireless IDS, VLANs/SSIDs, etc) Employees will install WLAN equipment on their own (compromises security of your entire network) Out of the box configuration of APs: All security features are disabled! Business impact due to stolen data: Potential financial and legal consequences (Laws to protect data confidentiality; Example: Healthcare) 3

WLAN Security Vulnerabilities and Threats Different forms of Vulnerabilities and Threats Exist Encryption Vulnerabilities: WEP Authentication Vulnerabilities: Shared-Key authentication, Dictionary attacks, and MITM attacks WLAN Sniffing and SSID Broadcasting Address Spoofing: Mac-address spoofing and IP address spoofing (both hostile/outsider attacks as well as insider attacks) Misconfigured APs and Clients Denial of Service (DoS) attacks: Using 802.11 deauthentication/ disassociation frames, RF jamming, etc. 4

Bit Flipping Vulnerability Access Point Attacker ICV Bit Flipped Frame WEP Bit Flipped Frame Pass Layer 3 Receiver CRC Fail Ciphertext Error Msg WEP Plaintext Error Msg Predicted Plaintext Error Msg XOR Key Stream Ciphertext Error Msg 5

WLAN Sniffing and SSID Broadcasting Disabling SSID Broadcast should not be considered a security mechanism- Potential attackers can uncover your SSID by observing probe responses! 6

Unknown WLANS - Rogue AP Frustrated insider User that installs wireless AP in order to benefit from increased efficiency and convenience it offers Common because of wide availability of low cost APs Usually ignorant of AP security configuration, default configuration most common Malicious hacker Penetrates physical security specifically to install a rogue AP Can customize AP to hide it from detection tools Hard to detect more effective to prevent via 802.1x and physical security More likely to install LINUX box than an AP >99.9% of Rogue APs Jones from Accounting <.1% of Rogue APs 7

Agenda Wireless LAN Security Overview WLAN Security Authentication and Encryption Radio Monitoring Intrusion Detection Services Location Services and RFID Tracking 8

802.11 security approaches Open network SSID can be captured with passive monitoring MAC filtering WEP MACs can be sniffed/spoofed Can be cracked online/offline given enough traffic & time Change keys frequently Traffic can still be decrypted offline Place APs on DMZ Requires VPN access to get back into network Use VPN Doesn t handle roaming WPA and/or EAP 9

Authentication methods Open systems authentication Shared key authentication EAP / 802.1x 10

Open system authentication Required by 802.11 Just requires SSID from client Only identification required is MAC address of client WEP key not verified, but device will drop packets it can t decrypt 11

Shared key authentication Utilizes challenge/response Requires & matches key Steps Client requests association to AP AP issues challenge to client Client responds with challenge encrypted by WEP key AP decrypts clients & verifies WEAK! Attacker sniffs plaintext AND cipher-text! 12

802.1x authentication Encapsulates EAP traffic over LAN (aka EAPoL) EAP: Standard for securely transporting authc data Supports a variety of authentication methods LEAP, EAP-TLS, etc. Port-based only access is to authentication server until authentication succeeds Similar to what s used on Ethernet switches Originally designed for campus-wired networks Requires little overhead by access point 13

802.1x authentication (cont.) 3 entities Supplicant (e.g., laptop w/wireless card) Authenticator (e.g., access point) Authentication server (e.g., RADIUS) Three Main Elements 1. Mutual authentication between client and RADIUS 2. Encryption keys dynamically derived after authentication 3. Centralized policy control, 14

EAP-FAST Authentication Overview Supplicant AP Enterprise Network RADIUS server EAPOL Start Start EAP Authentication EAP-Request/Identity Ask client for identity EAP -Response/Identity (EAP-ID) RADIUS Access request Access Request with EAP-ID key Client derives PMK EAP success WPA Key Management Protected DATA Transfer Secure Tunnel (via TLS & PAC) Client-side Authentication RADIUS Access Accept (Pass PMK to AP) Perform sequence defined by EAP-FAST key 15

Wired Equivalent Privacy (WEP) Part of 802.11 specification 64-bit key Shared key 40 bits Initialization vector (IV) = 24 bits Uses RC4 for encryption Weaknesses/attacks FMS key recovery attack weak IVs Filter weak IVs to mitigate IV too short, gets reused after 5 hours IP redirection, MITM attacks Traffic injection attacks Bit-flip attacks WEP2 added, increases key length to 128 bits 16

TKIP/MIC to the rescue Fixes key reuse in WEP Same encryption as WEP (RC4) MIC Message Integrity Code TKIP Temporal Key Integrity Protocol Protects IV by removing predictability Per Packet keying 17

VPN Authentication Overview Alternative to 802.1X over WLAN IETF standardized IPSec implementation Key benefits Mutual authentication between client machine and VPN concentrator using Shared-Key or Digital Certificate Provides 3DES or AES Encryption Provides SHA/MD5 for data integrity protection Provides Centralized user authentication (such as OTP) and administration 18

VPN Deployment Requirements Two-Factor Authentication Client Machine IPSec VPN supplicant VPN supplicant & WLAN adapter supplicant integration (optional) Personal Firewall for Local Attack Mitigation Client Machine RADIUS/OTP Servers VPN Concentrator Access Point Packet Filtering VPN Concentrator Authenticate Remote Users Terminate IPSec DHCP services (DHCP pool or DHCP Relay) 19

Agenda Wireless LAN Security Overview WLAN Security Authentication and Encryption Radio Monitoring Intrusion Detection Services Location Services and RFID Tracking 20

What is Wireless IDS? Wireless Intrusion Detection permits the detection of malicious or non-malicious security events on the WLAN Rogue AP detection Denial-of-Service detection WLAN Exploit Signature Analysis RF Interference detection Detection of attempts to access WLAN network and attempts to attract managed clients (honeypot) 21

Radio (Air/RF) Monitoring Si NMS Si Si Network Core Wireless Controller or IDS Server WDS Service (aggregation point) Si Si Distribution RM RM Access Rogue AP Rogue AP RM 22

Rogue AP Detection & Suppression Real-time RF monitoring ALL channels scanned while offering service Can scan country channels only or all channels During Scan all 802.11 packets are collected and characterized Rogue beacons, Rogue clients, 802.11 interference Matched against IDS signatures. Rogue AP suppression techniques Trace the rogue AP over the wired network and shut-down the switch port Use of managed devices to disassociate clients from unauthorized AP and prevent further associations via 802.11 deauthentication frames 23

Autonomous AP: Rogue AP Location 24

Wireless enabled Location Solutions ( Active RFID ) 25

Active RFID Location Solutions Provide Real time Asset information provide the answers to: What Do We Have? How Many Do We Have? Where Is It? What Is It s Status? Real-time Location Tracking Presence Choke-point Infant X is in room Y Pallet X is on the line Vehicle X entered the terminal 26

Example Asset Loss in Hospitals [Hospitals] cannot find 15-20% of the devices they own. Arthur Gasch, Medical Strategy Planning Infusion pumps simply disappear. When it comes time to do preventative maintenance, we cannot find them. Materials Manager, large US hospital Data from hospitals demonstrates magnitude of problem: 500-bed hospital: loses 40 of 500 pumps per year (8%) 150-bed hospital: loses 250 of 1500 pumps per year (17%) Loss= failure to locate the equipment in time for scheduled preventative maintenance 27

Applications for location information Location based trending RF Capacity Management Troubleshooting Security Visibility Asset Management Streamline Workflow Security Better rogue detection Perimeter security Policy enforcement Location/movement based alerts Voice Code Blue, Voice Alerts E911 Location Based Content Distribution LOCATION Telemetry Relevant information about tracked item 28

RF Location Architecture Browser Based Remote Console HTTPS NMS SOAP/XML 3 rd party Integrated Applications: E911, Asset Tracking, ERP, Workflow Automation Wireless Location Appliance APs collect RSSI from 802.11 devices and tags RSSI Location information is aggregated by Controllers SOAP/XML Information is sent to the Location Appliance for computation Wireless LAN Controller Access Point Access Point Location information is visually displayed by NMS NMS provides immediate applications for RF capacity management, location based security & asset visibility. Rich location information can be used by Location Appliance API for integration & display by location based applications Wi-Fi 2003 Cisco Handsets, Systems, Inc. clients, All rights reserved. rogues & Wi-Fi Tags 29

Location services technologies Closest AP: Identify AP with strongest RSSI. Limited accuracy: an AP can easily cover several thousand feet. RF Triangulation: All APs identify the strength with which they hear a client. Intelligent algorithms triangulate responses to find probable location. More accurate than closest AP. But does not account for effect of building material and people on signal e.g. multi-path, attenuation, reflection RF Fingerprinting: RF prediction creates a grid that identifies how every single part of the floorplan looks to all APs. Real world information is gathered by APs is compared to these fingerprints to determine location to within a few meters. 30

Wi-Fi Active RFID Tags Interoperability: Interoperable with any standards based 802.11 tag Proven interoperability with PanGo & Aeroscout tags Battery life: 3-5 years, depends on beacon/blink rates Unassociated tags promote battery life; intelligent motion detectors provide intelligent alerting only, preserving battery life Security mechanisms: 802.11i/WPA2 & VLANs Unassociated tags do not associate to network Rich Device Information Relay: Serial telemetry information capable Dimensions: Varies slightly by vendor but approximately 2.44 (2.61) x 1.57 (1.74) x 0.67 (0.88) /62mm (66.3) x 40mm (44.2) x 17mm (22.35) Weight:1.2oz (35g) -2.5oz (w/batteries) Various Mounting Options Environmental Durability: Operating Temperature: varies by vendor: -30 C to +75 C (-22 F to 167 F) to 32 to 130 F (0 to 54 C) Dirt/Dust/Water resistance, includes rubber lining IP-67, IP-68 31

Summary WPA, WPA2, with an EAP protocol solution is recommended for WLAN security deployment Segment wireless network along the same lines as wired network and use the same access restrictions Implement wired security features as well as Wireless IDS Radio Monitoring is a requirement even if you do not have a wireless network Radio Monitoring also delivers Location Services 32