e Nc Wireless Security Short Version

download e Nc Wireless Security Short Version

of 25

Transcript of e Nc Wireless Security Short Version

  • 8/6/2019 e Nc Wireless Security Short Version

    1/28

    Wireless (802.11) SecurityWireless (802.11) Security

    Douglas ReevesDouglas Reeves

    NC State UniversityNC State University

    Southeast Wireless SymposiumSoutheast Wireless Symposium

    December 02, 2003December 02, 2003

  • 8/6/2019 e Nc Wireless Security Short Version

    2/28

    Whats New?Whats New?

    AnybodyAnybody (in range) can listen or transmit!(in range) can listen or transmit!

    Security problemsSecurity problems notnot specific to wirelessspecific to wireless

    SpamSpam

    VirusesViruses WormsWorms

    Insider attacks (e.g., corrupt employees)Insider attacks (e.g., corrupt employees)

  • 8/6/2019 e Nc Wireless Security Short Version

    3/28

    Characteristics of 802.11 ServiceCharacteristics of 802.11 Service

    Wireless LAN standard, introduced 1997Wireless LAN standard, introduced 1997

    802.11b802.11b

    most widely used version, up to 11 Mb/smost widely used version, up to 11 Mb/s

    2.4GHz (unlicensed) frequency band2.4GHz (unlicensed) frequency band rangerange

    several hundred feetseveral hundred feet with omnidirectional antennawith omnidirectional antenna

    up to 25 milesup to 25 miles with directional antennawith directional antenna

  • 8/6/2019 e Nc Wireless Security Short Version

    4/28

    ModesModes

    InfrastructureInfrastructure modemode clients connect to base stationsclients connect to base stations

    multiple base stations may cover larger area,multiple base stations may cover larger area,allow client roamingallow client roaming

    identified by SSIDidentified by SSID

    Ad HocAd Hoc modemode

    clients communicate directly with each otherclients communicate directly with each other

  • 8/6/2019 e Nc Wireless Security Short Version

    5/28

    Scanning for Access PointsScanning for Access Points

    Access points periodically transmitAccess points periodically transmit beaconbeaconframesframes (SSID, data rate, etc.)(SSID, data rate, etc.)

    Client scans frequencies and picks an accessClient scans frequencies and picks an access

    point based on SSID, signal strength, ...point based on SSID, signal strength, ...

    Client switches to assigned channel andClient switches to assigned channel andestablishes an associationestablishes an association

  • 8/6/2019 e Nc Wireless Security Short Version

    6/28

    Sending DataSending Data

    Sender waits until no one transmittingSender waits until no one transmitting

    Then waits random interval and transmitsThen waits random interval and transmits

    Optional slot reservationOptional slot reservation

    Client first sends requestClient first sends request--toto--send (send (RTSRTS) frame) frame

    Access point sends clearAccess point sends clear--toto--send (send (CTSCTS) frame) framewhen ready to receivewhen ready to receive

    Requesting client sends data, all other clientsRequesting client sends data, all other clientsmust waitmust wait

  • 8/6/2019 e Nc Wireless Security Short Version

    7/28

    ReliabilityReliability

    Receiving station checks CRC code in frameReceiving station checks CRC code in frameto detect errorsto detect errors

    Acknowledges faultAcknowledges fault--free frame, lack offree frame, lack of

    acknowledgment means resend dataacknowledgment means resend data

  • 8/6/2019 e Nc Wireless Security Short Version

    8/28

    Energy ConservationEnergy Conservation

    Client can turn off radio interface whenClient can turn off radio interface whennothing to send or receivenothing to send or receive

    Access Point periodically transmits aAccess Point periodically transmits a specialspecial

    frameframe clients have packets waitingclients have packets waiting Each clientEach client wakes up periodicallywakes up periodically to receiveto receive

    the special framethe special frame

    if a node has a packet waiting, requests packetif a node has a packet waiting, requests packetafter waiting random intervalafter waiting random interval

  • 8/6/2019 e Nc Wireless Security Short Version

    9/28

    Security Problems of 802.11Security Problems of 802.11

    1.1. Unauthorized orUnauthorized orrogue access pointsrogue access points onontrusted networkstrusted networks

    2.2. Access to network byAccess to network by unauthorized clientsunauthorized clients

    (theft of service, "war driving")(theft of service, "war driving")3.3. Interception andInterception and monitoring of wirelessmonitoring of wireless

    traffictraffic

    range can be hundreds of feetrange can be hundreds of feet

    packet analyzer software freely availablepacket analyzer software freely available

    4.4. JammingJamming is easy, unlicensed frequencyis easy, unlicensed frequency

  • 8/6/2019 e Nc Wireless Security Short Version

    10/28

    Security Problems (cont'd)Security Problems (cont'd)

    5.5. ClientClient--toto--client attacksclient attacks (in ad hoc mode)(in ad hoc mode)

    6.6. DenialDenial or degradationor degradation of serviceof service

    flood with bogus packets,flood with bogus packets,association/authentication requests, association/authentication requests,

    7.7. MisconfigurationMisconfiguration possibilitiespossibilities

    no encryption usedno encryption used

    weak (guessable) password used to generateweak (guessable) password used to generate

    keykey

    weak protection of encryption key on clientweak protection of encryption key on clientmachinemachine

    weak protection of management interface forweak protection of management interface for

    access pointaccess point

  • 8/6/2019 e Nc Wireless Security Short Version

    11/28

    Attacks on Control MessagesAttacks on Control Messages

    Ex.: Attacker issues spoofedEx.: Attacker issues spoofed"deauthenticate" or "disassociate" frames"deauthenticate" or "disassociate" frames

    Ex.: Attacker continually sends RTS framesEx.: Attacker continually sends RTS frames

    to reserve slotsto reserve slots Ex.: PowerEx.: Power--saving attackssaving attacks

    attacker causes access point to discard packetsattacker causes access point to discard packetswhile client is still sleepingwhile client is still sleeping

    attacker convinces client there is no data waitingattacker convinces client there is no data waiting

    Trivial to implement (e.g., on PDA)Trivial to implement (e.g., on PDA)

    May require changes to the standardMay require changes to the standard

  • 8/6/2019 e Nc Wireless Security Short Version

    12/28

    (In)Security in 802.11b(In)Security in 802.11b

    Authentication is the process of provingAuthentication is the process of provingidentityidentity

    open: just supply correct SSIDopen: just supply correct SSID

    shared key: relies on WEPshared key: relies on WEP

    WEPWEP: Wired Equivalent Privacy: Wired Equivalent Privacy

  • 8/6/2019 e Nc Wireless Security Short Version

    13/28

    WEPWEP

    Without WEP,Without WEP, nono confidentiality, integrity, orconfidentiality, integrity, orauthentication of user dataauthentication of user data

    The cipher used in WEP is RC4, keylengthThe cipher used in WEP is RC4, keylength

    from 40 up to 128 bitsfrom 40 up to 128 bits Key isKey is sharedshared by all clients and the baseby all clients and the base

    stationstation

    compromising one node compromises networkcompromising one node compromises network

    Manual key distributionManual key distribution among clientsamong clientsmakes changing the key difficultmakes changing the key difficult

  • 8/6/2019 e Nc Wireless Security Short Version

    14/28

    WEP Encryption WeaknessWEP Encryption Weakness

    Initialization Vector (IV) used duringInitialization Vector (IV) used duringencryption isencryption is only 24 bitsonly 24 bits longlong

    Key to cracking: find packets with duplicateKey to cracking: find packets with duplicate

    public IVspublic IVs repetition of IV guaranteed on busy networksrepetition of IV guaranteed on busy networksdue to small IV spacedue to small IV space

    Tools:Tools: WEPCrackWEPCrack,, AirSnortAirSnort

    15 minutes to 24 hours to collect enough15 minutes to 24 hours to collect enoughpacketspackets

  • 8/6/2019 e Nc Wireless Security Short Version

    15/28

    Improvement (to WEP) #1:Improvement (to WEP) #1: 802.1x802.1x

    PortPort--based user authentication and keybased user authentication and keydistributiondistribution

    Currently supported by most access pointsCurrently supported by most access points

    and client OSesand client OSes

  • 8/6/2019 e Nc Wireless Security Short Version

    16/28

    Improvement #2:Improvement #2: WPAWPA (Wi(Wi--Fi ProtectedFi Protected

    Access)Access)

    Incorporates 802.1XIncorporates 802.1X

    AdvantagesAdvantages

    stronger, centralized user authenticationstronger, centralized user authentication

    automatically negotiated perautomatically negotiated per--user keys withuser keys withfrequent key updatesfrequent key updates

    stronger encryption algorithm choicesstronger encryption algorithm choices

    Hardware support may be needed forHardware support may be needed foradequate performanceadequate performance

  • 8/6/2019 e Nc Wireless Security Short Version

    17/28

    TKIP (Temporal Key Integrity Protocol)TKIP (Temporal Key Integrity Protocol)

    Extension of IV to 48 bitsExtension of IV to 48 bits

    Includes IV sequencing (rotates keys moreIncludes IV sequencing (rotates keys moreoften)often)

    Adds a frame integrityAdds a frame integrity--check function that ischeck function that ismuch stronger than CRCmuch stronger than CRC

  • 8/6/2019 e Nc Wireless Security Short Version

    18/28

    Extensible Authentication Protocol (EAP)Extensible Authentication Protocol (EAP)

    1.1. During association, client must provideDuring association, client must providecredentialscredentials

    2.2. Access point requests authentication ofAccess point requests authentication of

    user from RA

    DIUS serveruser from RA

    DIUS server3.3. If successful, access point will accept trafficIf successful, access point will accept traffic

    from client, encryption keys derived for thefrom client, encryption keys derived for thesessionsession

    4.4. When client logs off, the access point willWhen client logs off, the access point willdisable the client's portsdisable the client's ports

  • 8/6/2019 e Nc Wireless Security Short Version

    19/28

    EAP Authentication TypesEAP Authentication Types

    5 contenders, no clear consensus (wait for5 contenders, no clear consensus (wait forthe dust to settle?)the dust to settle?)

    PEAPPEAP has support from Microsoft+Cisco+RSA,has support from Microsoft+Cisco+RSA,being standardized by IETFbeing standardized by IETF

    EAPEAP--TTLSTTLS also being standardizedalso being standardized LEAPLEAP is Ciscois Cisco--proprietaryproprietary

    interoperability problemsinteroperability problems

    User credentials = name/password, orUser credentials = name/password, ordigital certificatedigital certificate

    use of certificates requires certificate serveruse of certificates requires certificate serverinfrastructureinfrastructure

  • 8/6/2019 e Nc Wireless Security Short Version

    20/28

    Improvement #3:Improvement #3: 802.11i802.11i

    WPA + dynamic negotiation ofWPA + dynamic negotiation ofauthentication and encryption algorithmsauthentication and encryption algorithms

    AES is the primary encryption algorithmAES is the primary encryption algorithm

    Requires hardware supportRequires hardware support newer access points + wireless cards will benewer access points + wireless cards will be

    firmware upgradeablefirmware upgradeable

    older access points + wireless cards will have toolder access points + wireless cards will have to

    be replacedbe replaced

    Still under development; ratified andStill under development; ratified andavailableavailable midmid--2004?2004?

  • 8/6/2019 e Nc Wireless Security Short Version

    21/28

    Security Through OtherMeansSecurity Through OtherMeans

    UseUse firewallsfirewalls to isolate wireless traffic fromto isolate wireless traffic fromwired networkwired network

    UseUse intrusion detectionintrusion detection to detect attacks onto detect attacks on

    wireless networkswireless networks UseUse IPSec / VPNsIPSec / VPNs to protect traffic at IPto protect traffic at IP

    layerlayer

    UseUse TLS (SSL)TLS (SSL) to protect traffic atto protect traffic atapplication layerapplication layer

  • 8/6/2019 e Nc Wireless Security Short Version

    22/28

    Recommendations: GeneralRecommendations: General

    1.1. Get informedGet informed about risks!about risks!

    2.2. RegularRegular security auditssecurity audits and penetrationand penetrationassessmentsassessments

    3.3. RequireRequire "strong" passwords"strong" passwords, limit number, limit numberof login attemptsof login attempts

    4.4. Disable ad hocDisable ad hoc modemode

    invites access by unauthorized nodes to yourinvites access by unauthorized nodes to yourcomputercomputer

  • 8/6/2019 e Nc Wireless Security Short Version

    23/28

    Recommendations: Access PointsRecommendations: Access Points

    5.5. EnforceEnforce standard security settingsstandard security settings for eachfor each802.11b access point802.11b access point

    6.6. Regularly search toRegularly search to identify unknownidentify unknown

    access pointsaccess points7.7. RequireRequire centralized user authenticationcentralized user authentication

    (RADIUS) to configure the access point(RADIUS) to configure the access point

    8.8. EncryptEncrypt all access pointall access point managementmanagementtraffictraffic

  • 8/6/2019 e Nc Wireless Security Short Version

    24/28

    Recommendations: OtherRecommendations: Other

    9.9. UseUse distributed personal firewalldistributed personal firewall on eachon eachclientclient

    10.10.UseUse VPNsVPNs to supplement encryption andto supplement encryption and

    authentication for 802.11bauthentication for 802.11b11.11.Maintain anMaintain an intrusion detection systemintrusion detection system onon

    the wireless networkthe wireless network

    12.12.UseUse firewallsfirewalls to separate wireless networksto separate wireless networksfrom internal networksfrom internal networks

  • 8/6/2019 e Nc Wireless Security Short Version

    25/28

    Recommendations: WLAN SecurityRecommendations: WLAN Security

    WEP (WEP (fairfair)) enable wireless frame encryptionenable wireless frame encryption

    use longest keyuse longest key

    change the WEP key regularly (manually)change the WEP key regularly (manually)

    802.1X and WPA (user authentication +802.1X and WPA (user authentication +dynamic keys) (dynamic keys) (betterbetter))

    use as soon as practical and stableuse as soon as practical and stable

    set rekeying to occur every few hoursset rekeying to occur every few hours

    802.11i (802.11i (bestbest))

    upgrade / use when available and supportedupgrade / use when available and supported

  • 8/6/2019 e Nc Wireless Security Short Version

    26/28

    SSL / TLSSSL / TLS

    Widely used for webWidely used for web--based transactionsbased transactions

    Requires end users to have digitalRequires end users to have digitalcertificatescertificates

  • 8/6/2019 e Nc Wireless Security Short Version

    27/28

    VPNs and IPsecVPNs and IPsec

    Wireless network is untrustedWireless network is untrusted higher layer provides securityhigher layer provides security

    all IP traffic protectedall IP traffic protected

    Critical stepsCritical steps1.1. client establishes security association with VPNclient establishes security association with VPNgatewaygateway

    2.2. no nonno non--VPN traffic is allowed out of the LANVPN traffic is allowed out of the LAN(filtered by firewall)(filtered by firewall)

    Have to install IPSec software on clientHave to install IPSec software on client

  • 8/6/2019 e Nc Wireless Security Short Version

    28/28

    Tools for Breaking WEPTools for Breaking WEP

    WEPCrackWEPCrack is an open source tool foris an open source tool forbreaking 802.11 WEP secret keysbreaking 802.11 WEP secret keys

    AirSnortAirSnort is a wireless LAN (WLAN) toolis a wireless LAN (WLAN) toolwhich recovers encryption keyswhich recovers encryption keys

    requires approximately 5requires approximately 5--10 million encrypted10 million encryptedpackets to be gatheredpackets to be gathered

    on a busy network:on a busy network: 15 minutes15 minutes

    on a typical network: 24 hourson a typical network: 24 hours