six strategies to secure wireless lans

22
Six Strategies to Secure Wireless LANs Joel Snyder, PhD Senior Partner Opus One

Upload: palma

Post on 15-Jan-2016

36 views

Category:

Documents


0 download

DESCRIPTION

Six Strategies to Secure Wireless LANs. Joel Snyder, PhD Senior Partner Opus One. It’s not as insecure as some folks want you to believe… You can’t “break into” a wireless LAN in 15 minutes It’s not trivial to “break into” wireless networks - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Six Strategies to Secure Wireless LANs

Six Strategies to Secure Wireless LANs

Joel Snyder, PhDSenior PartnerOpus One

Page 2: Six Strategies to Secure Wireless LANs

I’m not here to spread FUD about WLAN Security

It’s not as insecure as some

folks want you to believe…

You can’t “break into” a wireless

LAN in 15 minutes

It’s not trivial to “break into”

wireless networks

Adolescents are not decoding

your wireless transmissions at 30

miles per hour

On the other hand…

Compared to other networking we do,

wireless has the least inherent

security

Denial-of-Service is a real danger from

intentional and unintentional sources

You will have to work harder with

wireless networks to gain the same

level of security you get in other

environments

Page 3: Six Strategies to Secure Wireless LANs

The 6 pages of security in 802.11 don’t help much

The SSID is not a security feature and hiding it won’t do you any

good. (but it will bother everyone who tries to use your LAN)

Page 4: Six Strategies to Secure Wireless LANs

Denial of Service attacks are unstoppableNo standardized security proposal for 802.11 does anything

about the poor state of management

… and the microwave oven in your break room really does

act as an effective tool for shutting down local access.

Page 5: Six Strategies to Secure Wireless LANs

Wired Equivalent Privacy is the Built-in OptionWired Equivalent Privacy is the Built-in Option

Designed to provide security equivalent to a wired networkDesigned to provide security equivalent to a wired network

Uses shared WEP key of 40 bitsUses shared WEP key of 40 bits

• Nonstandard, but common, extension uses 104 bitsNonstandard, but common, extension uses 104 bits

Uses an initialization vector (IV) of 24 bits—client changes this Uses an initialization vector (IV) of 24 bits—client changes this

every packet and is included in the packet in the clearevery packet and is included in the packet in the clear

Combined IV+WEP key gives a key size of 64 or 128 bitsCombined IV+WEP key gives a key size of 64 or 128 bits

Packet includes a integrity check value (ICV)—basically a CRC Packet includes a integrity check value (ICV)—basically a CRC

checkcheck

Provides encryption but no user or per-packet authenticationProvides encryption but no user or per-packet authentication

Page 6: Six Strategies to Secure Wireless LANs

How does WEP work?

Access Point

The World

Shared key used by everyone

IV Payload CRC-32

Key ID bits

RC4 encrypted

Serves as integrity check

Page 7: Six Strategies to Secure Wireless LANs

Known WEP Vulnerabilities40-bit WEP key

Weak IVs

IV Replay

Known packet attackKnown packet start attack

Bit Flipping attack

Management

Page 8: Six Strategies to Secure Wireless LANs

The worst WEP vulnerability:Management!

WEP keys are

generally static.

WEP keys are shared

among lots of users.

WEP keys are passed

around and are hard

to change.

This is roughly the

same as giving

everyone in the

company the same

password and then

refusing to let

anyone change it!

Page 9: Six Strategies to Secure Wireless LANs

Firewall-style AAA is a strategy for controlling access

Access Point

The World

Access Point

Corporate Network

Page 10: Six Strategies to Secure Wireless LANs

A wide variety of vendors are bringing products to market based on solving the problem without doing the hard work• Vernier

• Perfigo

• Reefedge

You can use this technique and maintain security• If you’re willing to play with the access points

• Say “hello” to Airespace, Aruba, etc.

Firewall-style AAA is popular with folks who do not understand the security exposure

Page 11: Six Strategies to Secure Wireless LANs

Firewall-style AAA is popular with folks who do not understand the security exposure, II

Sometimes you’ll take this tack if

you define “security” differently

• Plausible deniability in an academic

setting

Sometimes firewall-style is a useful

adjunct for keeping the casual user

off your wireless LAN

Page 12: Six Strategies to Secure Wireless LANs

802.1X gives link layer authentication

SupplicantEAP over WirelessEAP over LAN

Supplicant

Authenticators Authentication Server (e.g.,

RADIUS server)

EAP over RADIUS

The World

Page 13: Six Strategies to Secure Wireless LANs

802.1X has special support for wireless communications

When properly used with a TLS-based authentication

mechanism, you get per-user/per-session WEP keys

• TLS (certificates for user and authentication server)

• TTLS or PEAP (certificates for authentication server; legacy

authentication for users)

Source: B. Aboba

Our good friends Microsoft and

Cisco are doing a great deal of harm here…

Page 14: Six Strategies to Secure Wireless LANs

EAP-TTLS or PEAP AuthenticationEAP-TTLS or PEAP Authentication(1 of 2)

EAPOW-Start

EAP-Response/Identity

EAP-Response/TLS-Client-Hello

Access blockedAssociation

EAP-Request/Identity

EAP-Request/TTLS-Start

RADIUSEAPOW

Supplicant802.11 access point & 802.1X Authenticator RADIUS

server

Radius-Access-RequestEAP-Response/Identity

Radius-Access-ChallengeEAP-Request/TTLS-Start

Radius-Access-RequestEAP-Response/TLS-Client-Hello

Radius-Access-ChallengeEAP-RequestTLS-Server-HelloTLS-Server-Certificate

EAP-RequestTLS-Server-HelloTLS-Server-Certificate

Server is Authenticated

Page 15: Six Strategies to Secure Wireless LANs

EAP-TTLS or PEAP (2 of 2) Supplicant 802.11 access point & 802.1X Authenticator RADIUS server

Radius-Access-RequestEAP-ResponseTLS-Key-Exchange, Cipher

Radius-Access-ChallengeEAP-Request/TLS-Change-Cipher

Radius-Access-RequestEAP-Response/TLS-Record[User Authentication]

Radius-Access-AcceptEAP-SuccessMS-MPPE-Recv-Key

Encrypted Tunnel is Established

EAP-ResponseTLS-Key-ExchangeTLS-Change-Cipher

EAP-RequestTLS-Change-Cipher

EAP-ResponseTLS-Record[User Auth]

EAP-Key

EAP-Success

WEP enabled

Page 16: Six Strategies to Secure Wireless LANs

802.11i: Robust Security

IEEE developing 802.11 supplement “Specification for Robust Security” in Task Group I (802.11i)

Improved security with deployed hardwareComplete “robust” security: whole new modelEstimated approval date: 2004Wi-Fi Protected Access provides an

intermediate standard

Page 17: Six Strategies to Secure Wireless LANs

802.11i represents IEEE “fixing” of 802.11 802.11i represents IEEE “fixing” of 802.11 securitysecurityTemporal Key Integrity Protocol (TKIP)Temporal Key Integrity Protocol (TKIP)

• Enhances WEP to provide a per-packet re-keying Enhances WEP to provide a per-packet re-keying mechanismmechanism

• Adds a Message Integrity Check (MIC) field to packet to Adds a Message Integrity Check (MIC) field to packet to stop packet tampering—also adds break-in evasion features stop packet tampering—also adds break-in evasion features in the MICin the MIC

• Needs 802.1X to provide base key change mechanismNeeds 802.1X to provide base key change mechanism

Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)• Replaces RC4 in WEPReplaces RC4 in WEP

Encryption of management framesEncryption of management frames Wi-Fi Protected Access(WPA) calls for a subset of 802.11i

Page 18: Six Strategies to Secure Wireless LANs

Wi-Fi’s WPA

Wireless Ethernet Compatability Alliance (WECA), AKA Wi-Fi Alliance initially provided 802.11 interoperability certification• Board Members

Agere, Cisco, Dell, Intermec, Intel, Intersil, Microsoft, Nokia, Philips, Sony, Symbol, TI

Have provided an “interim standard” for 802.11 security: Wi-Fi Protected Acess (WPA)• Immediate interoperability without waiting for IEEE 802.11i• WPA 1.2 is portions of 802.11i, Draft 3.0

Uses TKIP, but not AES-CCMP (or WRAP)

Page 19: Six Strategies to Secure Wireless LANs

IPsec gives serious security

IP in IPSEC

The World

IP Payload ESP-AuthESP

3-DES encrypted

IP

SHA-1 authenticated

Positive bi-directional authentication of user and gatewayPer-packet encryption and authenticationHigh re-key rateSelector-based firewall rules

Page 20: Six Strategies to Secure Wireless LANs

So many choices, so little time...

WEP

802.1X

802.11i / WPA

Very compatible; easy to set up

User authentication; per-session WEP key; useful in wired and wireless

802.1X + better encryption + per-packet authentication + DoS evasion

Questionable security; changing keys difficult; other security flaws

Need client (supplicant); need new RADIUS server

Not a standard yet; need new hardware for AES

Solution Pros Cons

Page 21: Six Strategies to Secure Wireless LANs

So many choices, so little time, II

Web authentication

IPsec

IPsec pass through

Most compatible; ultra easy to use

Strongest security model; use same model for wireless as Internet remote access

Easy to integrate into existing network + VPN

Very weak security; easy to hijack, eavesdrop

Need client software; deployment and updating hard

Tunnel server can be easily overloaded; doesn’t work well for guest users

Solution Pros Cons

Page 22: Six Strategies to Secure Wireless LANs

Thank you.

Questions, comments?