wireless radius access susan mulholland joseph paulowskey joseph woulfe

33
Wireless RADIUS Access Susan Mulholland Joseph Paulowskey Joseph Woulfe

Upload: whitney-caldwell

Post on 26-Dec-2015

217 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Wireless RADIUS Access Susan Mulholland Joseph Paulowskey Joseph Woulfe

Wireless RADIUS Access

Susan Mulholland

Joseph Paulowskey

Joseph Woulfe

Page 2: Wireless RADIUS Access Susan Mulholland Joseph Paulowskey Joseph Woulfe

What is a Wi-Fi?

Stands for Wireless Fidelity The wireless networking and networking

is called 802.11 Can connect PC’s, notebooks, and PDAs

to enable them to share internet connections, printers and documents

Can be up to 300 feet

Page 3: Wireless RADIUS Access Susan Mulholland Joseph Paulowskey Joseph Woulfe

Three kinds of 802.11

802.11b The first version of 802.11b Slowest Least expensive

802.11a The second version Can handle up to 54 mega bits per second Operates at 5 GHz

802.11g The third version Operates at 2.4 GHz Has advantage of higher speeds

Page 4: Wireless RADIUS Access Susan Mulholland Joseph Paulowskey Joseph Woulfe

Advantages of Wi-Fi

Allows LANs to be deployed without cabling Reduce the costs of network deployment and

expansion. Can host wireless LANs. Networks support roaming Wi-Fi client works in all different countries A global set of standards

Page 5: Wireless RADIUS Access Susan Mulholland Joseph Paulowskey Joseph Woulfe

Disadvantages of Wi-Fi

Power consumption is high Concerns about battery life and heat Has limited range. Access points could be used to steal personal

information transmitted from Wi-Fi users. Wired Equivalent Privacy or WEP is easy to be

breakable even when correctly configured. WPA2 Wired Protected Access is improved and better than WEP.

Page 6: Wireless RADIUS Access Susan Mulholland Joseph Paulowskey Joseph Woulfe

Wi-Fi Security

If a hotspot is open, then anyone with a Wi-Fi card can access the hotspot. The original standard was 64-bit encryption that was easily broken.

If it is secure using 128-bit encryption, then the user needs to know a WEP key to connect. Using a hotspot at your house, you need a WEP 128-bit encryption preventing intruders into your network.

Page 7: Wireless RADIUS Access Susan Mulholland Joseph Paulowskey Joseph Woulfe

Wi-Fi network in your home

802.11b Is slightly less expensive and the slowest of the three

802.11. For home use, 802.11g costs just a little more, but is up to 5 times faster. If you will be doing a lot of file transfers between computers in your home, 802.11g is definitely the way to go.

802.11g Costs just a little more, Up to 5 times faster. If you do a lot of file transfers

between computers in your home, then 802.11g is the best the way to go.

Page 8: Wireless RADIUS Access Susan Mulholland Joseph Paulowskey Joseph Woulfe

Two kinds of Wi-Fi

Commerical Wi-Fi Services are available such as Internet cafes, Borders

bookstore, and more. T-Mobile has many hotspots in all Borders and Starbucks.

Free Wi-Fi Many members of local governments have joined with

local community groups to help expand free Wi-Fi networks. Some community groups built their Wi-Fi networks based on volunteer efforts and donations.

Page 9: Wireless RADIUS Access Susan Mulholland Joseph Paulowskey Joseph Woulfe

About Wi-Fi revolution

Consultants from Pyramid Research predicted that more Americans would use Wi-Fi than cellular networks by 2007.

Last year, approximately 30.2 million Americans used Wi-Fi, according to Pyramid comparing with 213 million mobile-phone customers.

Demand for Wi-Fi is increasing. However, the pace shows signs of slowdown.

Page 10: Wireless RADIUS Access Susan Mulholland Joseph Paulowskey Joseph Woulfe

RADIUS

Stands for: Remote Dial In User Service The Certificates are used to authenticate

the user’s computer and to authenticate the RADIUS server.

Page 11: Wireless RADIUS Access Susan Mulholland Joseph Paulowskey Joseph Woulfe

Deployment Diagram This diagram shows how the user’s

wireless device will connect through the wireless access point. The credentials will then be sent from the access point to the radius server which will verify the user information using the Network Information Service (NIS) server. Upon verification in the NIS server the user acceptance will be passed back up to the RADIUS server then back up to the access point which will put the user back on the network. The user will then be allowed to do a DHCP request for an IP address and the DHCP server will respond.

Page 12: Wireless RADIUS Access Susan Mulholland Joseph Paulowskey Joseph Woulfe

Architectural Design

Page 13: Wireless RADIUS Access Susan Mulholland Joseph Paulowskey Joseph Woulfe

Radiusd.conf

The radiusd.conf file is the main configuration file for the FreeRadius Server

radiusd.conf file.• Port =1812 #sets the port to listen on to

1812

• Log_auth = yes #sets the server to log authentication requests

Page 14: Wireless RADIUS Access Susan Mulholland Joseph Paulowskey Joseph Woulfe

Clients.conf The clients.conf file is a configuration file for the FreeRadius server

that establishes what clients can connect to the radius server.

The following are the lines that were modified in the client.conf file to allow for the single test access point to be a client as well as the local host to be a client for testing.

• client [134.198.161.212]{secret = cmps354shortname = WAP354}

• client localhost{secret = cmps354shortname = lh}

Page 15: Wireless RADIUS Access Susan Mulholland Joseph Paulowskey Joseph Woulfe

Eap.conf The eap.conf file is a file that handles the configuration for the EAP

protocols in FreeRadius. The following lines have to be adjusted.

• default_eap_type = tls #tls is the authentication form that is being used• #The following is from the tls module• private_key_password = • private_key_file = ${raddbdir}/certs/serverkey_cert.pem• certificate_file = ${raddbdir}/certs/serverkey_cert.pem• CA_file = /usr/local/openssl/cmpsCA/cacert.pem• dhfile = /dev/null #link to a built in null location• random_file = /dev/urandom #link to a built in random number generator• #The following is from the ttls module• #default_eap_type = • copy_request_to_tunnel = yes• use_tunnled_reply = yes

Page 16: Wireless RADIUS Access Susan Mulholland Joseph Paulowskey Joseph Woulfe

Installing OpenSSL

OpenSSL by default is installed onto the FreeBSD 5.4 system

After installing OpenSSL the administrator has to go to the directory that contains the configuration files for OpenSSL.

By default on FreeBSD the path is /usr/local/openssl/.

From there you can find the file openssl.cnf this file has a number of lines that should be edited for ease of use.

Page 17: Wireless RADIUS Access Susan Mulholland Joseph Paulowskey Joseph Woulfe

openssl.cnf

lines that should be edited for ease of use.

# These are some of the lines that should be modified• [ CA_default ]

dir = ./cmpsCA # Where the CA is kept#further downcountryName_default = US stateOrProvinceName_default =Pennsylvania 0.organizationName_default = Computing Science Department

Page 18: Wireless RADIUS Access Susan Mulholland Joseph Paulowskey Joseph Woulfe

xpextensions

After editing the defaults of the openssl.cnf file another file must be created because these certificates are going to be used on Microsoft Windows XP computers.

The file should be created and named xpextensions.

Page 19: Wireless RADIUS Access Susan Mulholland Joseph Paulowskey Joseph Woulfe

xpextensions

The following lines should be added to xpextensions:• [ xpclient_ext]extendedKeyUsage =

1.3.6.1.5.5.7.3.2

• [ xpserver_ext ]extendedKeyUsage = 1.3.6.1.5.5.7.3.1

Page 20: Wireless RADIUS Access Susan Mulholland Joseph Paulowskey Joseph Woulfe

Creating a Certificate Authority

To create a certificate authority you must edit the CA.sh file in the openssl/misc directory • CATOP=./cmpsCA #this path should match

the dir specified in #openssl.cnf

Page 21: Wireless RADIUS Access Susan Mulholland Joseph Paulowskey Joseph Woulfe

Creating and Signing Certificates

The first step for creating the server certificates is to make a certificate request with this command:• $ openssl req -new -nodes -keyout server_key.pem -out

server_req.pem -days 730 -config ./openssl.cnf After making the request it will prompt the user to enter

some organization information then the request will be created under the file server_req.pem

This server request now has to be signed by your created certificate authority and the xpextensions needs to be added to the certificate. This can be done with the command:• $ openssl ca -config ./openssl.cnf \-policy policy_anything -

out server_cert.pem \-extensions xpserver_ext -extfile ./xpextensions \-infiles ./server_req.pem

Page 22: Wireless RADIUS Access Susan Mulholland Joseph Paulowskey Joseph Woulfe

Creating and Signing Certificates

client_req.pem The client certificate follows the same process

as the server certificate First you must create a signing request.

• $ openssl req -new -keyout client_key.pem \ -out client_req.pem -days 730 -config ./openssl.cnf

Then you sign the request with the same certificate authority • $ openssl ca -config ./openssl.cnf \-policy

policy_anything -out client_cert.pem \-extensions xpclient_ext -extfile ./xpextensions \-infiles ./client_req.pem

Page 23: Wireless RADIUS Access Susan Mulholland Joseph Paulowskey Joseph Woulfe

Creating and Signing Certificates

Finally after you have created your signed certificate in the client_cert.pem you have to convert it to a .p12 file for windows machines.

You can do that with this command openssl pkcs12 -export -in client_cert.pem \-inkey client_key.pem -out client_cert.p12 -clcerts

Page 24: Wireless RADIUS Access Susan Mulholland Joseph Paulowskey Joseph Woulfe

Wireless Access Points

The Wireless Access points need to be configured for the network

Set static IP IP address should be reflected in the

clients.conf file of the radius directory The SSID needs to be modified to

“CMPS”

Page 25: Wireless RADIUS Access Susan Mulholland Joseph Paulowskey Joseph Woulfe

Wireless Access Points

Page 26: Wireless RADIUS Access Susan Mulholland Joseph Paulowskey Joseph Woulfe

User Interface Design

SecureW2 Supplicant The SecureW2 client is a WPA

supplicant that installs onto the users Windows XP computer.

This is used to authenticate the user through the RADIUS server using the TTLS protocol.

Page 27: Wireless RADIUS Access Susan Mulholland Joseph Paulowskey Joseph Woulfe

SecureW2 Installation

The SecureW2 client can be downloaded from

http://www.securew2.com/uk/download/index.htm

Page 28: Wireless RADIUS Access Susan Mulholland Joseph Paulowskey Joseph Woulfe

SecureW2 Installation

Page 29: Wireless RADIUS Access Susan Mulholland Joseph Paulowskey Joseph Woulfe

SecureW2 Installation

Page 30: Wireless RADIUS Access Susan Mulholland Joseph Paulowskey Joseph Woulfe

Configuration

SecureW2 allows for PAP authentication SecureW2 also allows you to input a

user id and password combination for quick reconnecting to the network

This can be used on a personal computer

The configuration of the SecureW2 Client is shown below

Page 31: Wireless RADIUS Access Susan Mulholland Joseph Paulowskey Joseph Woulfe
Page 32: Wireless RADIUS Access Susan Mulholland Joseph Paulowskey Joseph Woulfe
Page 33: Wireless RADIUS Access Susan Mulholland Joseph Paulowskey Joseph Woulfe

Resources

http://en.wikipedia.org/wiki/WiFi http://www.wi-fihotspotlist.com/ http://www.wififreespot.com/pa.html http://www.wifimaps.com/ http://www.cs.scranton.edu/%7Etjm2f/

school/cmps490/SystemDocumentation.doc#_Toc121278389