assembling a secure 802.11 wireless network

23
ASSEMBLING A SECURE 802.11 WIRELESS ASSEMBLING A SECURE 802.11 WIRELESS NETWORK NETWORK Joerg Fritsch, NATO C3 Agency Joerg Fritsch, NATO C3 Agency RSA Conference 2005, 18 Oct, 2pm, Austria Center Vienna

Upload: joerg-fritsch

Post on 18-Nov-2014

2.354 views

Category:

Technology


4 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Assembling a secure 802.11 wireless network

ASSEMBLING A SECURE 802.11 WIRELESSASSEMBLING A SECURE 802.11 WIRELESSNETWORKNETWORK

Joerg Fritsch, NATO C3 AgencyJoerg Fritsch, NATO C3 Agency

RSA Conference 2005, 18 Oct, 2pm, Austria Center Vienna

Page 2: Assembling a secure 802.11 wireless network

Session learning objectives

• Understand the meaning of NIST recommendations and ‘FIPS’

compliance.

• Introduce the building blocks of a secure 802.11 wireless

network.

• Visualize aspects of site survey, planning and roll out of a secure

wireless network.

• Discriminate between ‘WLAN compatible’ and ‘security

compatible’ equipment.

• Know why this is important for your future plans

Page 3: Assembling a secure 802.11 wireless network

What is “NIST compliant” WLAN ?

• U.S. NIST = National Institute ofStandards and Technology

• NIST WLAN = 56recommendationshttp://csrc.nist.gov/publications/nistpubs/800-48/NIST_SP_800-48.pdf

• last updated in November 2002,but still pretty much up-to-dateand relevant to implementers

• mainly standards which were (atthat time) still in the draft stage

• rumor about proposed updatesince beginning 2005http://www.findarticles.com/p/articles/mi_qa3649/is_200501/ai_n9468284

• NIST makes recommendations,not law, not recipes

Page 4: Assembling a secure 802.11 wireless network

“NIST compliant” = new standards, (i.e. bebrave…)

• Network authentication

— 802.1x

— EAP, EAP-FAST

— LEAP etc.

• Temporal key management

— WPA, WPAv2

• Ciphers

— AES

— TKIP

Page 5: Assembling a secure 802.11 wireless network

What are the building blocks?

• Users (fixed, or mobile)

• Access points

• Authentication (this is new, compared to traditional WLAN)

• Confidentiality

— Link encryption by APs

— IPSec overlay (fully FIPS compliant WLANs, - this is also a new idea)

• Monitoring and logging

• Physical Security of the APs

Page 6: Assembling a secure 802.11 wireless network

What about FIPS compliance ?

• (U.S) Federal Information Processing Standard

• “Mandatory” feature that equipment bought by the government

must support

• Currently there are no FIPS compliant wireless access points

• Be careful! Some vendors advertise this, but they really mean a

combination of AP and VPN

• FIPS 140-2 compliance always generated by some sort of VPN

concentrator (at our site Cisco VPN 3K)

Page 7: Assembling a secure 802.11 wireless network

IPSEC overlay:Fully NIST and FIPS compliant WLANs

Advantages

• Fully “NIST compliant”

• Common vulnerabilities (i.e.

during association of the WLAN

client) do not fire.

• Increases security and

interoperability

• Integrates well with strong

authentication

Disadvantages

• Industry's efforts are aiming for

integrated wireless networks

! you cut the link between you

and the rest of the world

• VPN Client required (compatibility,

interoperability!)

• Single Sign On is hard to achieve

Page 8: Assembling a secure 802.11 wireless network

There are 2 ways to assemble the buildingblocks: WLAN collocated with LAN

• We prefer this implementation

framework because

• SSO for all WLAN Clients

• Additional Software (VPN Client)

optional

• All private network services

available for WLAN Clients

— File and Print services

— VLAN segmentation

— VoIP

Page 9: Assembling a secure 802.11 wireless network

There are two ways to assemble the buildingblocks: WLAN segregated from LAN

• Additional security

• Integrates best with

— IPSEC overlay

— Server based computing

• WLAN itself still needs to be

secured

• Firewall policy easily will become

permissive if not implemented in

conjunction with IPSEC overlay or

server based computing

Page 10: Assembling a secure 802.11 wireless network

Planning of a NIST compliant WLAN net

• All the stuff for a regular installation

— Site Survey Tools

• RF propagation Software

• Antennas, Cards & GPS

• Floor Plans

— Site Survey

• Selection of cell size and antennas

• General positioning indoor/outdoor

— Recommendations on physical security vs shielding & interference

• … plus physical security of the APs (manipulation, theft)

• … this can make your life much, much harder

Page 11: Assembling a secure 802.11 wireless network

Rolling out a NIST-compliant WLAN net(Here’s what we did at NC3A)

• Our design goals

• Our security goals

• Our implementation plan

• What we bought and our experience of implementing it

• What we have learned (so far…)

— How it fits with our existing hard- and software

(If it’s only 6 months old, can you call it “legacy” ???)

— Risk evaluation !!!!!!!

Page 12: Assembling a secure 802.11 wireless network

Primary Design Goals

• Following the U.S. NIST security guidelines for governmental use

— Not required in NATO as yet, but probably a “best practice”

• Building a network that

— provides an acceptable privacy for a NATO UNCLASSIFIED network

— is not too difficult to implement

— Can teach us about future, higher security WLAN nets

• New features supportable on our existing hardware

• Preserving the advantages of a traditional WLAN

— Mobility

— user friendly

— low administrative overhead

Page 13: Assembling a secure 802.11 wireless network

Security Goals

• Do the best we can do (remember, it’s NATO UNCLASSIFIED)

• Do not cut the link between us and the rest of the world

• Mitigate known risks

• Imagine the unknown risks

• Know who is on our network (and who might try to sneak in)

• Understand what we are doing, and why

• Visualize the new network perimeter

Page 14: Assembling a secure 802.11 wireless network

We live in a simple security environment(not everyone is so lucky)

We can place APs in

corridors where they

are visible and

accessible

Page 15: Assembling a secure 802.11 wireless network

Fitting the APs to the Physical Building

We find that even simple RF

propagation models are quite effective

and realistic …

But you need to have good physical

building plans

Page 16: Assembling a secure 802.11 wireless network

What we bought

• Authentication:

— Funk “Steel Belted Radius” Server

— Microsoft Windows Domain Controller

• Access points: Cisco 1200 Access Points

• Antennas: 2dBi omni directional, ceiling mountable

• Confidentiality:

— WPA/TKIP or WPAv2/AES through Cisco IOS on APs

— FIPS-compliant Cisco VPN 3000 is used alternatively

• Monitoring and Logging: OpenSystems Envision HA

Page 17: Assembling a secure 802.11 wireless network

What we bought (continued)

• Cisco 6509 Wireless Service Module

— Centralized management of APs

— Achieve roaming qualities good enough for 802.11g telephones

• Clients: Disable Windows Zero Configuration Utility

— Several Vendor (Laptop) Client Utilities in use

• Atheros, IBM, Dell TrueMobile, Cisco all work for us

• Meanwhile long list of “Cisco Compatible Client Devices”

published (this was not there when we started …)http://csrc.nist.gov/publications/nistpubs/800-48/NIST_SP_800-48.pdf

• No security compatible wireless Print Servers available

— Lowest common denominator: WPA-PSK

— Print Servers segregated from LAN

Page 18: Assembling a secure 802.11 wireless network

Problems we had during installation(and how we solved them)

• New wireless networks require a lot of new wires to be pulledthroughout the building

— We rejected “wireless, wireless” approach to get more useable

bandwidth throughout the building

• Changed our minds several times on authentication

— Cisco LEAP, PEAP/Microsoft CHAPv2, EAP-TLS

— Settled on LEAP (straight forward implementation, easy

reauthentication through cached credentials)

• New equipment first available with FCC certification, then re-configured for non-US channel schemes

— We started with US-legal equipment for testing, prototyping, then

waited for “street-legal” European models

Page 19: Assembling a secure 802.11 wireless network

Lessons Learned

• Do not compare a corporate WLAN to your living room WLAN

— corporate WLANs can use: authentication, VLAN Tagging, multiple SSIDs, fast

roaming, positioning engines

• WiFi compatible is not security compatible

— “WiFi certified” = interoperability of equipment on an unprotected HotSpot

• Secure WLANs needs excellent signal stability; - i.e. FCC-approved equipment

not good enough for a secure ETSI WLAN

— FCC client adapters get de-authenticated frequently w/o any obvious reason

• Expect incompatibilities even within the product lines of a single vendor

— problems and fixed bugs sometimes reappear after a firmware upgrade

(i.e. de-authentication at high network load or when USB devices are (dis)connected)

• Even reasonably-priced RF propagation models turned out to be very accurate

— EKAHAU Site Survey, ESS

Page 20: Assembling a secure 802.11 wireless network

So what? Why is this useful to you?

• NIST-compliant WLAN an “interesting” technology

• It’s not super-secure but it attempts to go a significant step beyond

commercial “best practice”

• It is not influenced by any vendor, or any network philosophy

• Since we must live with WLAN, this is a way to sleep easily at night

• By forcing considering of AP physical security, it may also force an

evaluation of other physical security issues. This is good.

• (left as an exercise for the student)

Page 21: Assembling a secure 802.11 wireless network

Questions & Answers

Thank you for your attention

[email protected]

Page 22: Assembling a secure 802.11 wireless network

If you were in “their” shoes: What you need toattack WLANs

• NO Pringles Antenna!

• Educated guesses

• Time !!! – If they are not carried out in a staged or protected labenvironment most attacks need time

• Wireless network sniffers and analyzers

— Kismet, http://www/kismetwireless.net

— Netstumbler, http://www.netstumbler.org

— Airopeek, http://www.airopeek.com

• Tools to decrypt WEP Keys

— Airsnort, http://airsnort.shmoo.com

— Weplab, http://weplab.sourceforge.net

— Chochop

Page 23: Assembling a secure 802.11 wireless network

If you were in “their” shoes: What you need toattack WLANs (continued)

• WPA disassociation/de-authentication Attacks

— Airforge (re-inject packets – such as de-authentication packets),

http://new.remote-exploit.org

• Attacks on the LEAP authentication

— Asleap, http://asleap.sourceforge.net

• WPA PSK brut force attacks

— Cowpatty, http://sourceforge.net/projects/cowpatty

• Attacks on the Wireless Client

— Airpwn, http://airpwn.sourceforge.net

— Hotspotter, http://new.remote-exploit.org