46
Implementing Wireless LAN Security

Implementing Wireless LAN Security. Objectives List wireless security solutions Tell the components of the transitional security model Describe the personal

  • View
    212

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Implementing Wireless LAN Security. Objectives List wireless security solutions Tell the components of the transitional security model Describe the personal

Implementing Wireless LAN Security

Page 2: Implementing Wireless LAN Security. Objectives List wireless security solutions Tell the components of the transitional security model Describe the personal

Objectives

• List wireless security solutions

• Tell the components of the transitional security model

• Describe the personal security model

• List the components that make up the enterprise security model

Page 3: Implementing Wireless LAN Security. Objectives List wireless security solutions Tell the components of the transitional security model Describe the personal

Wireless Security Solutions

• IEEE 802.11a and 802.11b standards included WEP specification– Vulnerabilities quickly realized– Organizations implemented “quick fixes”

• Did not adequately address encryption and authentication

• IEEE and Wi-Fi Alliance started working on comprehensive solutions– IEEE 802.11i and Wi-Fi Protected Access (WPA)

• Foundations of today’s wireless security

Page 4: Implementing Wireless LAN Security. Objectives List wireless security solutions Tell the components of the transitional security model Describe the personal

WEP2

• Attempted to overcome WEP limitations by adding two new security enhancements– WEP key increased to 128 bits– Kerberos authentication

• User issued “ticket” by Kerberos server

• Presents ticket to network for a service

– Used to authenticate user

• No more secure than WEP– Collisions still occur– New dictionary-based attacks available

Page 5: Implementing Wireless LAN Security. Objectives List wireless security solutions Tell the components of the transitional security model Describe the personal

Dynamic WEP

• Solves weak IV problem by rotating keys frequently– More difficult to crack encrypted packet

• Uses different keys for unicast and broadcast traffic– Unicast WEP key unique to each user’s session

• Dynamically generated and changed frequently

– Broadcast WEP key must be same for all users on a particular subnet and AP

Page 6: Implementing Wireless LAN Security. Objectives List wireless security solutions Tell the components of the transitional security model Describe the personal

Dynamic WEP (continued)B

Should be B

Should be A

Page 7: Implementing Wireless LAN Security. Objectives List wireless security solutions Tell the components of the transitional security model Describe the personal

Dynamic WEP (continued)

• Can be implemented without upgrading device drivers or AP firmware– No-cost and minimal effort to deploy

• Does not protect against man-in-the-middle attacks

• Susceptible to DoS attacks

Page 8: Implementing Wireless LAN Security. Objectives List wireless security solutions Tell the components of the transitional security model Describe the personal

IEEE 802.11i

• Provides solid wireless security model– Robust security network (RSN)– Addresses both encryption and authentication

• Encryption accomplished by replacing RC4 with a block cipher– Manipulates entire block of plaintext at one time

• Block cipher used is Advanced Encryption Standard (AES)– Three step process– Second step consists of multiple rounds of

encryption

Page 9: Implementing Wireless LAN Security. Objectives List wireless security solutions Tell the components of the transitional security model Describe the personal

IEEE 802.11i (continued)

Page 10: Implementing Wireless LAN Security. Objectives List wireless security solutions Tell the components of the transitional security model Describe the personal

IEEE 802.11i (continued)

• IEEE 802.11i authentication and key management is accomplished by IEEE 802.1x standard– Implements port security

• Blocks all traffic on port-by-port basis until client authenticated using credentials stored on authentication server

• Key-caching: Stores information from a device on the network, for faster re-authentication (In the case when a user roams away and returns)

• Pre-authentication: Allows a device to become authenticated to an AP before moving to it (Current AP will forward authentication info to the roamed-to AP

Page 11: Implementing Wireless LAN Security. Objectives List wireless security solutions Tell the components of the transitional security model Describe the personal

IEEE 802.11i (continued)

Page 12: Implementing Wireless LAN Security. Objectives List wireless security solutions Tell the components of the transitional security model Describe the personal

Wi-Fi Protected Access (WPA)

• Subset of 802.11i that addresses encryption and authentication

• Temporal Key Integrity Protocol (TKIP): Replaces WEP’s encryption key with 128-bit per-packet key– Dynamically generates new key for each packet

• Prevents collisions– Authentication server can use 802.1x to produce

unique master key for user sessions– Creates automated key hierarchy and management

system

Page 13: Implementing Wireless LAN Security. Objectives List wireless security solutions Tell the components of the transitional security model Describe the personal

Wi-Fi Protected Access (continued)

• Message Integrity Check (MIC): Designed to prevent attackers from capturing, altering, and resending data packets– Replaces CRC from WEP– CRC does not adequately protect data integrity

• Authentication accomplished via IEEE 802.1x or pre-shared key (PSK) technology– PSK passphase serves as seed for generating keys

Page 14: Implementing Wireless LAN Security. Objectives List wireless security solutions Tell the components of the transitional security model Describe the personal

Wi-Fi Protected Access (continued)

Message Integrity Check (MIC)

Page 15: Implementing Wireless LAN Security. Objectives List wireless security solutions Tell the components of the transitional security model Describe the personal

Wi-Fi Protected Access 2 (WPA2)

• Second generation of WPA security– Based on final IEEE 802.11i standard– Uses AES for data encryption – Supports IEEE 802.1x authentication or PSK

technology– Allows both AES and TKIP clients to operate in

same WLAN (This is useful is case of having legacy devices that can not support AES).

Page 16: Implementing Wireless LAN Security. Objectives List wireless security solutions Tell the components of the transitional security model Describe the personal

Summary of Wireless Security Solutions

• Wi-Fi Alliance categorizes WPA and WPA2 by modes that apply to personal use and to larger enterprises

Security timeline

Page 17: Implementing Wireless LAN Security. Objectives List wireless security solutions Tell the components of the transitional security model Describe the personal

Summary of Wireless Security Solutions (continued)

Wireless security solutions

Wi-Fi modes

802.1xAES

Page 18: Implementing Wireless LAN Security. Objectives List wireless security solutions Tell the components of the transitional security model Describe the personal

Transitional Security Model

• Transitional wireless implementation– Should be temporary

• Until migration to stronger wireless security possible

– Should implement basic level of security for a WLAN• Including authentication and encryption

Page 19: Implementing Wireless LAN Security. Objectives List wireless security solutions Tell the components of the transitional security model Describe the personal

Authentication: Shared Key Authentication

• Uses WEP keys

• Networks that support multiple devices should use all four keys– Same key should not be designated as default on

each device

Page 20: Implementing Wireless LAN Security. Objectives List wireless security solutions Tell the components of the transitional security model Describe the personal

Authentication: SSID Beaconing

• Turn off SSID beaconing by configuring APs to not include it– Beaconing the SSID is default mode for all APs

• Good practice to use cryptic SSID– Should not provide any information about the

location or type of equipment to attackers

Page 21: Implementing Wireless LAN Security. Objectives List wireless security solutions Tell the components of the transitional security model Describe the personal

Authentication: MAC Address Filtering

MAC address filter

Page 22: Implementing Wireless LAN Security. Objectives List wireless security solutions Tell the components of the transitional security model Describe the personal

WEP Encryption

• Although vulnerabilities exist, should be turned on if no other options for encryption are available– Use longest WEP key available– May prevent script kiddies or “casual” eavesdroppers

from attacking

Transitional security model

Page 23: Implementing Wireless LAN Security. Objectives List wireless security solutions Tell the components of the transitional security model Describe the personal

Personal Security Model

• Designed for single users or small office home office (SOHO) settings – Generally 10 or fewer wireless devices

• Two sections:– WPA: Older equipment– WPA2: Newer equipment

Page 24: Implementing Wireless LAN Security. Objectives List wireless security solutions Tell the components of the transitional security model Describe the personal

WPA Personal Security: PSK Authentication

• Uses passphrase (PSK) that is manually entered to generate the encryption key– PSK used a seed for creating encryption keys

• Key must be created and entered in AP and also on any wireless device (“shared”) prior to (“pre”) the devices communicating with AP

Page 25: Implementing Wireless LAN Security. Objectives List wireless security solutions Tell the components of the transitional security model Describe the personal

WPA Personal Security: TKIP Encryption

• TKIP is a substitute for WEP encryption– Fits into WEP procedure with minimal change

• Device starts with two keys:– 128-bit temporal key– 64-bit MIC

• Three major components to address vulnerabilities:– MIC– IV sequence– TKIP key mixing

• TKIP required in WPA

Page 26: Implementing Wireless LAN Security. Objectives List wireless security solutions Tell the components of the transitional security model Describe the personal

WPA Personal Security: TKIP Encryption (continued)

TKIP/MIC process

Page 27: Implementing Wireless LAN Security. Objectives List wireless security solutions Tell the components of the transitional security model Describe the personal

WPA2 Personal Security: PSK Authentication

• PSK intended for personal and SOHO users without enterprise authentication server– Provides strong degree of authentication protection

• PSK keys automatically changed (rekeyed) and authenticated between devices after specified period of time or after set number of packets transmitted (rekey interval)

• Employs consistent method for creating keys– Uses shared secret entered at AP and devices

• Random sequence of at least 20 characters or 24 hexadecimal digits

Page 28: Implementing Wireless LAN Security. Objectives List wireless security solutions Tell the components of the transitional security model Describe the personal

WPA2 Personal Security: AES-CCMP Encryption

• WPA2 personal security model encryption accomplished via AES

• AES-CCMP: Encryption protocol in 802.11i– CCMP based on Counter Mode with CBC-MAC of

AES encryption algorithm– Cipher Block Chaining-Message Authentication

Code– CBC-MAC provides data integrity

• AES processes blocks of 128 bits– Cipher key length can be 128, 192 and 256 bits– Number of rounds can be 10, 12, and 14

Page 29: Implementing Wireless LAN Security. Objectives List wireless security solutions Tell the components of the transitional security model Describe the personal

WPA2 Personal Security: AES-CCMP Encryption (continued)

• AES encryption/decryption computationally intensive– Better to perform in hardware

Personal security model

Page 30: Implementing Wireless LAN Security. Objectives List wireless security solutions Tell the components of the transitional security model Describe the personal

Enterprise Security Model

• Most secure level of security that can be achieved today for wireless LANs– Designed for medium to large-size organizations– Intended for setting with authentication server

• Like personal security model, divided into sections for WPA and WPA2

• Additional security tools available to increase network protection

Page 31: Implementing Wireless LAN Security. Objectives List wireless security solutions Tell the components of the transitional security model Describe the personal

WPA Enterprise Security: IEEE 802.1x Authentication

• Uses port-based authentication mechanisms

• Network supporting 802.1x standard should consist of three elements:– Supplicant: Wireless device which requires secure

network access– Authenticator: Intermediary device accepting

requests from supplicant• Can be an AP or a switch

– Authentication Server: Accepts requests from authenticator, grants or denies access

Page 32: Implementing Wireless LAN Security. Objectives List wireless security solutions Tell the components of the transitional security model Describe the personal

WPA Enterprise Security: IEEE 802.1x Authentication (continued)

802.1x protocol

Page 33: Implementing Wireless LAN Security. Objectives List wireless security solutions Tell the components of the transitional security model Describe the personal

WPA Enterprise Security: IEEE 802.1x Authentication (continued)

• Supplicant is software on a client implementing 802.1x framework

• Authentication server stores list of names and credentials of authorized users– Remote Authentication Dial-In User Service

(RADIUS) typically used• Allows user profiles to be maintained in central

database that all remote servers can share

Page 34: Implementing Wireless LAN Security. Objectives List wireless security solutions Tell the components of the transitional security model Describe the personal

WPA Enterprise Security: IEEE 802.1x Authentication (continued)

• 802.1x based on Extensible Authentication Protocol (EAP)– Several variations:

• EAP-Transport Layer Security (EAP-TLS)

• Lightweight EAP (LEAP)

• EAP-Tunneled TLS (EAP-TTLS)

• Protected EAP (PEAP)

• Flexible Authentication via Secure Tunneling (FAST)

– Each maps to different types of user logons, credentials, and databases used in authentication

Page 35: Implementing Wireless LAN Security. Objectives List wireless security solutions Tell the components of the transitional security model Describe the personal

WPA Enterprise Security: TKIP Encryption

• TKIP is a “wrapper” around WEP – Provides adequate encryption mechanism for WPA

enterprise security– Dovetails into existing WEP mechanism

• Vulnerabilities may be exposed in the future

Page 36: Implementing Wireless LAN Security. Objectives List wireless security solutions Tell the components of the transitional security model Describe the personal

WPA2 Enterprise Security: IEEE 802.1x Authentication

• Enterprise security model using WPA2 provides most secure level of authentication and encryption available on a WLAN

• IEEE 802.1x is strongest type of wireless authentication currently available

• Wi-Fi Alliance certifies WPA and WPA2 enterprise products using EAP-TLS (Transport Layer Security)

Page 37: Implementing Wireless LAN Security. Objectives List wireless security solutions Tell the components of the transitional security model Describe the personal

WPA2 Enterprise Security: AES-CCMP Encryption

• AES: Block cipher that uses same key for encryption and decryption– Bits encrypted in blocks of plaintext

• Calculated independently

– block size of 128 bits– Three possible key lengths: 128, 192, and 256 bits– WPA2/802.11i uses128-bit key length– Includes four stages that make up one round

• Each round is iterated 10 times

Page 38: Implementing Wireless LAN Security. Objectives List wireless security solutions Tell the components of the transitional security model Describe the personal

WPA2 Enterprise Security: AES-CCMP Encryption (continued)

Enterprise security model

Page 39: Implementing Wireless LAN Security. Objectives List wireless security solutions Tell the components of the transitional security model Describe the personal

Other Enterprise Security Tools: Virtual Private Network (VPN)

• Virtual private network (VPN): Uses a public, unsecured network as if it were private, secured network

• Two common types:– Remote-access VPN: User-to-LAN connection used

by remote users– Site-to-site VPN: Multiple sites can connect to other

sites over Internet

• VPN transmissions are achieved through communicating with endpoints

Page 40: Implementing Wireless LAN Security. Objectives List wireless security solutions Tell the components of the transitional security model Describe the personal

Other Enterprise Security Tools: Virtual Private Network (continued)

• Endpoint: End of tunnel between VPN devices– Can local software, dedicated hardware device, or

even a firewall

• VPNs can be used in WLAN setting– Tunnel though WLAN for added security

• Enterprise trusted gateway: Extension of VPN– Pairs of devices create “trusted” VPN connection

between themselves– Can protect unencrypted packets better than a VPN

endpoint

Page 41: Implementing Wireless LAN Security. Objectives List wireless security solutions Tell the components of the transitional security model Describe the personal

Other Enterprise Security Tools: Wireless Gateway

• AP equipped with additional functionality– Most APs are wireless gateways

• Combine functionality of AP, router, network address translator, firewall, and switch

• On enterprise level, wireless gateway may combine functionality of a VPN and an authentication server– Can provide increased security for connected APs

Page 42: Implementing Wireless LAN Security. Objectives List wireless security solutions Tell the components of the transitional security model Describe the personal

Other Enterprise Security Tools: Wireless Intrusion Detection System

(WIDS)• Intrusion-detection system (IDS): Monitors

activity on network and what the packets are doing– May perform specific function when attack detected– May only report information, and not take action

• Wireless IDS (WIDS): Constantly monitors RF frequency for attacks– Based on database of attack signatures or on

abnormal behavior– Wireless sensors lie at heart of WIDS– Hardware-based have limited coverage, software-

based have extended coverage

Page 43: Implementing Wireless LAN Security. Objectives List wireless security solutions Tell the components of the transitional security model Describe the personal

Other Enterprise Security Tools: Captive Portal

• Web page that wireless users are forced to visit before they are granted access to Internet

• Used in one of the following ways:– Notify users of wireless policies and rules– Advertise to users specific services or products– Authenticate users against a RADIUS server

• Often used in public hotspots

Page 44: Implementing Wireless LAN Security. Objectives List wireless security solutions Tell the components of the transitional security model Describe the personal

Summary

• IEEE 802.11i and Wi-Fi Protected Access (WPA), have become the foundations of today’s wireless security

• Dynamic WEP attempts to solve the weak initialization vector (IV) problem by rotating the keys frequently, making it much more difficult to crack the encrypted packet

• The IEEE 802.11i standard provided a more solid wireless security model, such as the block cipher Advanced Encryption Standard (AES) and IEEE 802.1x port security

Page 45: Implementing Wireless LAN Security. Objectives List wireless security solutions Tell the components of the transitional security model Describe the personal

Summary (continued)

• WPA is a subset of 802.11i and addresses both encryption and authentication

• The transitional security model uses shared key authentication, turning off SSID beaconing, and implementing MAC address filtering

• The personal security model is designed for single users or small office home office (SOHO) settings of generally 10 or fewer wireless devices and does not include an authentication server

Page 46: Implementing Wireless LAN Security. Objectives List wireless security solutions Tell the components of the transitional security model Describe the personal

Summary (continued)

• The enterprise security model is intended for settings in which an authentication server is available; if an authentication server is not available the highest level of the personal security model should be used instead

• Additional security tools that can supplement the enterprise security model to provide even a higher degree of security include virtual private networks, wireless gateways, wireless intrusion detection systems (WIDS), and captive portals