SlideShare a Scribd company logo
Network Architecture and Design 1
Security & Authentication in
WLAN
 State of the Art and Evolution
Network Architecture and Design 2
Organizations and Groups
 WECA The Wireless Ethernet Compatibility Alliance
certifies compliance with the IEEE 802.11 standards. Awards
the WiFi (Wireless Fidelity).
 IEEE 802.1X defines changes to the MAC Bridge in
order to provide Port based network access control capability.
 IEEE 802.11i defining MAC enhancements to provide
enhanced security for 802.11. This is a work in progress, and
802.1X is an important part of this. (end of 2002)
Network Architecture and Design 3
First Generation WLAN
Security
 Virtual Private Network-VPN
 Ensures privacy through encryption.
 Runs transparently over a WLAN
 Use of a VPN is independent of any native WLAN
security scheme, thus is not mentioned here.
Network Architecture and Design 4
First Generation WLAN
Security
 Service Set Identifier-SSID
 Analogous to a common network name.
 Serves to logically segment users and APs.
 Is a piece of information advertised or
preconfigured at the station.
 SSID may be requested when joining a
WLAN.
 SSID is not secure, because an AP
advertises its SSID in its beacons.
Network Architecture and Design 5
First Generation WLAN
Security
 Wired Equivalent Privacy-WEP
 Optional implementation for IEEE 802.11b.
 A WECA requirement of at least 40 bit encryption
for WiFi certification.
 Goals

Deny access to users that do not possess the appropriate
WEP key.

Prevent the decoding of traffic that is WEP encrypted
without the possession of the WEP key.
Network Architecture and Design 6
First Generation WLAN
Security
 Wired Equivalent Privacy-WEP
 WEP is a symmetric encryption mechanism.

IEEE 802.11b has chosen 40-bit keys.

Some vendors use 128-bit WEP encryption.

Key distribution or negotiation is not mentioned
in the standard.
Network Architecture and Design 7
First Generation Process
 Authentication: Is the process of verifying the credentials of a
client desiring to join a WLAN.
 Open System Authentication: Process in clear
text.
 Shared Key Authentication: Uses a key to
encrypt a challenge text.
 Association: Is the process of associating a client with a given AP
in the WLAN.
Network Architecture and Design 8
First Generation Process
Probe Phase
1.- When initialization, the
client sends a probe request
packet out on all the channels.
2.- The APs that hear this
packet send a probe response
packet back to the station.
This probe response packet
contains some information such
as SSID, which is used to
determine which AP associate.
Network Architecture and Design 9
First Generation Process
Authentication Phase
Shared key mode.
The WEP key is already
configured in the client.
Network Architecture and Design 10
First Generation Process
Association Phase
After being authenticated, the client sends an
association request to the AP.
Network Architecture and Design 11
IEEE 802.11WEP Key
Management
 Key distribution or negotiation is not mentioned in the
standard.
 The standard provides two mechanisms to select a key
to encrypt a frame.
 Four default keys shared by all clients.

Secure communication between users with default keys.
 Once keys become widely distributed, they are more
compromised.
‒ “Key mapping” relationship with another station.

More secure operation since fewer stations have the keys.
 Distribution of such unicast keys is problematic as group
increases.
Network Architecture and Design 12
WEP Deficiencies
 WEP uses RC4; using a shared secret key, generates an
arbitrarily long sequence of bytes from a pseudorandom number.
 This stream is XORed with the plaintext to
produce the encrypted ciphertext. It works well in
SSL.
 802.11b uses 40-bit keys
 Hackers can crack them in hours, but takes so
much to crack 104-bit keys.
 But…Easy to break RC4 encryption with keystream reuse.
Network Architecture and Design 13
802.11 Security Weaknesses
 Physical
 Hardware loss, without user identification,
Authentication, Accounting and Auditing.
 Impersonation
 Does not identify users, just hardware.
 No mutual authentication, enables Rogue AP’s.
 Integrity
 WEP supports per packet encryption but not
authentication.
 Possibility to recover the RC4 stream.
Network Architecture and Design 14
802.11 Security Weaknesses
 Disclosure
 Can be obtained both MAC address, time of
association/disassociation.
 Problems with static global keys.

Secret by more than two is not a secret

Enables rogue AP attacks.

Permits that anyone into the network to decrypt other
conversations.
 Dictionary attacks.
 Denial of Service
 Disassociation attacks.
Network Architecture and Design 15
IEEE 802.1X
 Security in 802.11 can be broken in
 Authentication framework
 Authentication algorithm/protocol
 Encryption
• Is a standard
–Scalable.
–Centralized Framework for Authentication.
–Deploys a variety of authentication protocols.
–Still in development.
IEEE 802.1X
Network Architecture and Design 16
How 802.1X Addresses
802.11 Security Issues
 Extensible Authentication Protocol-EAP
framework.
 User ID and strong authentication.
 Dynamic key derivation.
 Mutual authentication.
 Per-packet authentication.
Network Architecture and Design 17
EAP Framework
 EAP provides a flexible link layer security
framework
 Simple encapsulation protocol for IETF authentication
standards

Transport Level Security–TLS (Windows).

Internet Key Exchange–IKE (Certicom-Lucent).

GSS_API (Kerberos).

Other mutual authentications schemes (Cisco LEAP).
 Run over lossy or lossless media and any link layer
(PPP,802.3)
 Does not assume physical secure link.
Network Architecture and Design 18
EAP Architecture
Network Architecture and Design 19
Identification &
Authentication
 Users identified by usernames, not MAC
addresses.
 Supports extended authentication.
 Non password based authentication.

Public key certificates and smartcards.

IKE

Biometrics

Token cards
 Password based

One-time passwords

Any GSS_API (Kerberos)
Network Architecture and Design 20
Per-User Per-Session Keys
 802.1X enables secure derivation of per-user
session key.
 Provides ability to securely change global keys.
 WEP keys are dynamically derived at the client
when log-on.
 Global key, such as broadcast WEP key, is sent
from AP to client, encrypted using the unicast
session key.
 Makes per-user WEP keys easy to administer.
Network Architecture and Design 21
Mutual Authentication
 802.1X needs EAP methods supporting mutual
authentication.
 Guarantees right key transfers
 Prevents Man-in-the-middle, Rogue Server attacks
 Mutual Authentication EAP methods.
 TLS: Supply certificate, prove possession of private
key.
 IKE: Server demonstrates possession of pre-shared
key or private key.
 GSS_API (Kerberos):server must demonstrate
knowledge of the session key.
Network Architecture and Design 22
Per-Packet Authentication
 EAP supports per packet authentication
& integrity. But not to all messages
 TLS, IKE derive session key, with this the
negotiations are authenticated and integrity
protected.
 Using WEP, session key can be used to
encrypt, authenticate and integrity
protect some messages as:
 Success & Failure.
Network Architecture and Design 23
WLAN Security Topics
Coming
 Temporal Key Integrity Protocol – TKIP
 Initially referred as WEP2. Solve the key
reuse in WEP.
 128-bit shared temporal key.
 Combines

Temporal key

Client’s MAC address

Adds 16-octet initialization vector.
To produce a key to encrypt the data.
 Temporal key change every 10,000 packets.
Network Architecture and Design 24
WLAN Security Topics
Coming
 Advanced Encryption Standard – AES
 AES offers much stronger encryption.
 Replaces the aging Data Encryption Standard
(DES) in NIST.
 Solves the problem of stronger encryption needed
by 802.11.
 AES requires a coprocessor (additional hardware).
 Companies need to replace existing access points
and client NICs.
 802.11i standard will likely include AES.
Network Architecture and Design 25
Cisco Implementation
 EAP describes an extensible packet exchange to allow
the passing of authentication information between the
client and the PPP server.
 WLAN is not a PPP. 802.1X EAP over LAN (EAPOL)
defines how encapsulate EAP in Ethernet or token ring
packets.
 EAPOW – EAP over Wireless LAN, is EAPOL but when
used in wireless networks.
 Is also used EAP over Radius to encapsulate within RADIUS
packets.
Network Architecture and Design 26
Protocols used to encapsulate EAP
Network Architecture and Design 27
Cisco Implementation - LEAP
 Cisco-Lightweight Extensible Authentication Protocol.
 Aironet client adapters that supports EAP-LEAP authentication
(FW 4.10).
 Cisco Aironet Series APs supporting 802.1x EAP authenticator
(Ver 11.0).
 Secure Access Control Server used for AAA and EAP RADIUS
services (Ver 2.6 running in Win NT/2000 server).
 Lightweight because:
 Minimal support from client CPU while mutual authentication.
 Supports embedded systems (printers).
 Runs on OS without support for native EAP authentication.
 Support popular OS (Windows, Linux, MacOS).
Network Architecture and Design 28
Cisco Implementation
 The entire authentication and key distribution process
is accomplished in three phases: Start, Authenticate,
and Finish
Network Architecture and Design 29
Start Phase
Network Architecture and Design 30
 The authenticate sequence varies based on the
mutual authentication method chosen.
 If we were using Transport Level Security (TLS) to
transfer certificates in a PKI implementation, then
EAP-TLS messages would be used.
Authenticate Phase
Network Architecture and Design 31
Authenticate Phase
AP is in the middle acting solely
as a transport vehicle
Network Architecture and Design 32
Finish Phase
Network Architecture and Design 33
Finish Phase
 Both derive the session key from the user's password.
 AP sends an EAPOW-KEY message to the client
supplying the key length.
 The key value (or actual WEP key) is not sent since
the client has already derived it on its own.
 AP encrypts with the session key (unicast) a full-
length derived multicast key and sends to client.
 The client and AP activate WEP and use this session
multicast WEP key for all communications.
Network Architecture and Design 34
Tentative Applications
 Handoff
 Client is assumed authenticated.
 Just update multicast key on the adjacent AP.
 Ad Hoc Mode
 802.1x can be used.
 User credentials are stored in each station.
 New EAP method for this purpose must be
designed.
Network Architecture and Design 35
References
 Mishra A, Arbaugh W.; “An Initial Security Analysis of the IEEE 802.1X
Standard”. This article shows some weaknesses of the 802.1X protocol.
 William A. Arbaugh, Narendar Shankar, and Y.C. Justin Wan, "Your
802.11 Wireless Network Has No Clothes“; one of the first articles that
shows the 802.11b security problems
 Nikita Borisov, Ian Goldberg, and David Wagner, "Intercepting Mobile
Communications: The Insecurity of 802.11“
 D.Simon, B. Aboba, T. Moore; IEEE 802.11 Security and 802.1X. This
presentation explains the security problems on 802.11 and how 802.1X
helps to fix them.
 Steinke Steve; “Security and 802.11 Wireless Networks”; this article
explains WEP deficiencies.
 Security for Next Generation Wireless LANs; A Cisco paper that
describes the first generation WLAN security.
Network Architecture and Design 36
References
 Scott Fluhrer, Itsik Mantin and Adi Shamir; Weaknesses in the Key
Scheduling Algorithm of RC4 , this paper presents several weaknesses in
the key scheduling algorithm of RC4 and describes their cryptanalytic
significance.
 AirSnort one of the best-known WEP cracking tools, which employs the
RC4 weaknesses to attack WLAN networks. AirSnort recovers encryption
keys, operates by passively monitoring transmissions, computing the
encryption key when enough packets have been gathered.
 Wireless LAN at Risk: An article that tells how easy can be to access a
WLAN if even the minimal wireless security basics and precautions are
not taken into account.
 Sean Whalen, Analysis of WEP and RC4 Algorithms; This paper explains
briefly the WEP encryption mechanism and some ways to crack it.
Network Architecture and Design 37
End of Ninth Lecture

More Related Content

PPTX
Wireless network security
Vishal Agarwal
 
PPTX
Chapter 7 - Wireless Network Security.pptx
AmanuelZewdie4
 
PPT
Ch06 Wireless Network Security
Information Technology
 
PPT
WLAN and IP security
Chaitanya Tata, PMP
 
PPT
wireless lan security for their all details
SatyamPrakash38
 
PDF
Pentesting Your Own Wireless Networks, June 2011 Issue
Ishan Girdhar
 
PPT
wireless lan security.ppt
SagarBedarkar3
 
PPT
Wireless security837
mark scott
 
Wireless network security
Vishal Agarwal
 
Chapter 7 - Wireless Network Security.pptx
AmanuelZewdie4
 
Ch06 Wireless Network Security
Information Technology
 
WLAN and IP security
Chaitanya Tata, PMP
 
wireless lan security for their all details
SatyamPrakash38
 
Pentesting Your Own Wireless Networks, June 2011 Issue
Ishan Girdhar
 
wireless lan security.ppt
SagarBedarkar3
 
Wireless security837
mark scott
 

Similar to Introdutction – Security & Authentication in WLAN (20)

PPTX
Wireless lan security(10.8)
SubashiniRathinavel
 
PPTX
Wireless security
paripec
 
PDF
802 11 3
rphelps
 
PPS
Iuwne10 S04 L05
Ravi Ranjan
 
PDF
Attack Robustness and Security Enhancement with Improved Wired Equivalent Pro...
IDES Editor
 
PPT
Shashank wireless lans security
Shashank Srivastava
 
PPTX
Wireless Security
Università Degli Studi Di Salerno
 
PPTX
Wi fi security
Virendra Thakur
 
PPT
Implementing 802.1x Authentication
dkaya
 
PPT
Wi fi protected-access
bhanu4ugood1
 
PPT
5169 wireless network_security_amine_k
Rama Krishna M
 
PDF
IEEE 802.1X and Axis’ Implementation
Axis Communications
 
PDF
DTS Solution - Wireless Security Protocols / PenTesting
Shah Sheikh
 
PPT
Wi Fi Technology
Alok Pandey (AP)
 
PPT
Wireless and WLAN Secuirty, Presented by Vijay
thevijayps
 
PPT
Security Issues of 802.11b
guestd7b627
 
PPT
Security Issues of IEEE 802.11b
Sreekanth GS
 
PPTX
Wireless Security null seminar
Nilesh Sapariya
 
PPS
Iuwne10 S04 L02
Ravi Ranjan
 
PPTX
WLAN SECURITY BY SAIKIRAN PANJALA
Saikiran Panjala
 
Wireless lan security(10.8)
SubashiniRathinavel
 
Wireless security
paripec
 
802 11 3
rphelps
 
Iuwne10 S04 L05
Ravi Ranjan
 
Attack Robustness and Security Enhancement with Improved Wired Equivalent Pro...
IDES Editor
 
Shashank wireless lans security
Shashank Srivastava
 
Wi fi security
Virendra Thakur
 
Implementing 802.1x Authentication
dkaya
 
Wi fi protected-access
bhanu4ugood1
 
5169 wireless network_security_amine_k
Rama Krishna M
 
IEEE 802.1X and Axis’ Implementation
Axis Communications
 
DTS Solution - Wireless Security Protocols / PenTesting
Shah Sheikh
 
Wi Fi Technology
Alok Pandey (AP)
 
Wireless and WLAN Secuirty, Presented by Vijay
thevijayps
 
Security Issues of 802.11b
guestd7b627
 
Security Issues of IEEE 802.11b
Sreekanth GS
 
Wireless Security null seminar
Nilesh Sapariya
 
Iuwne10 S04 L02
Ravi Ranjan
 
WLAN SECURITY BY SAIKIRAN PANJALA
Saikiran Panjala
 
Ad

Recently uploaded (20)

PPTX
INTESTINALPARASITES OR WORM INFESTATIONS.pptx
PRADEEP ABOTHU
 
PPTX
Artificial-Intelligence-in-Drug-Discovery by R D Jawarkar.pptx
Rahul Jawarkar
 
DOCX
pgdei-UNIT -V Neurological Disorders & developmental disabilities
JELLA VISHNU DURGA PRASAD
 
PPTX
How to Close Subscription in Odoo 18 - Odoo Slides
Celine George
 
PPTX
Tips Management in Odoo 18 POS - Odoo Slides
Celine George
 
PPTX
TEF & EA Bsc Nursing 5th sem.....BBBpptx
AneetaSharma15
 
PPTX
Artificial Intelligence in Gastroentrology: Advancements and Future Presprec...
AyanHossain
 
PPTX
Python-Application-in-Drug-Design by R D Jawarkar.pptx
Rahul Jawarkar
 
PPTX
Basics and rules of probability with real-life uses
ravatkaran694
 
PDF
Virat Kohli- the Pride of Indian cricket
kushpar147
 
PDF
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
Nguyen Thanh Tu Collection
 
PDF
Biological Classification Class 11th NCERT CBSE NEET.pdf
NehaRohtagi1
 
PPTX
Information Texts_Infographic on Forgetting Curve.pptx
Tata Sevilla
 
PPTX
BASICS IN COMPUTER APPLICATIONS - UNIT I
suganthim28
 
PPTX
Introduction to pediatric nursing in 5th Sem..pptx
AneetaSharma15
 
PPTX
An introduction to Dialogue writing.pptx
drsiddhantnagine
 
PPTX
Five Point Someone – Chetan Bhagat | Book Summary & Analysis by Bhupesh Kushwaha
Bhupesh Kushwaha
 
PPTX
CARE OF UNCONSCIOUS PATIENTS .pptx
AneetaSharma15
 
PPTX
HISTORY COLLECTION FOR PSYCHIATRIC PATIENTS.pptx
PoojaSen20
 
PPTX
Dakar Framework Education For All- 2000(Act)
santoshmohalik1
 
INTESTINALPARASITES OR WORM INFESTATIONS.pptx
PRADEEP ABOTHU
 
Artificial-Intelligence-in-Drug-Discovery by R D Jawarkar.pptx
Rahul Jawarkar
 
pgdei-UNIT -V Neurological Disorders & developmental disabilities
JELLA VISHNU DURGA PRASAD
 
How to Close Subscription in Odoo 18 - Odoo Slides
Celine George
 
Tips Management in Odoo 18 POS - Odoo Slides
Celine George
 
TEF & EA Bsc Nursing 5th sem.....BBBpptx
AneetaSharma15
 
Artificial Intelligence in Gastroentrology: Advancements and Future Presprec...
AyanHossain
 
Python-Application-in-Drug-Design by R D Jawarkar.pptx
Rahul Jawarkar
 
Basics and rules of probability with real-life uses
ravatkaran694
 
Virat Kohli- the Pride of Indian cricket
kushpar147
 
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
Nguyen Thanh Tu Collection
 
Biological Classification Class 11th NCERT CBSE NEET.pdf
NehaRohtagi1
 
Information Texts_Infographic on Forgetting Curve.pptx
Tata Sevilla
 
BASICS IN COMPUTER APPLICATIONS - UNIT I
suganthim28
 
Introduction to pediatric nursing in 5th Sem..pptx
AneetaSharma15
 
An introduction to Dialogue writing.pptx
drsiddhantnagine
 
Five Point Someone – Chetan Bhagat | Book Summary & Analysis by Bhupesh Kushwaha
Bhupesh Kushwaha
 
CARE OF UNCONSCIOUS PATIENTS .pptx
AneetaSharma15
 
HISTORY COLLECTION FOR PSYCHIATRIC PATIENTS.pptx
PoojaSen20
 
Dakar Framework Education For All- 2000(Act)
santoshmohalik1
 
Ad

Introdutction – Security & Authentication in WLAN

  • 1. Network Architecture and Design 1 Security & Authentication in WLAN  State of the Art and Evolution
  • 2. Network Architecture and Design 2 Organizations and Groups  WECA The Wireless Ethernet Compatibility Alliance certifies compliance with the IEEE 802.11 standards. Awards the WiFi (Wireless Fidelity).  IEEE 802.1X defines changes to the MAC Bridge in order to provide Port based network access control capability.  IEEE 802.11i defining MAC enhancements to provide enhanced security for 802.11. This is a work in progress, and 802.1X is an important part of this. (end of 2002)
  • 3. Network Architecture and Design 3 First Generation WLAN Security  Virtual Private Network-VPN  Ensures privacy through encryption.  Runs transparently over a WLAN  Use of a VPN is independent of any native WLAN security scheme, thus is not mentioned here.
  • 4. Network Architecture and Design 4 First Generation WLAN Security  Service Set Identifier-SSID  Analogous to a common network name.  Serves to logically segment users and APs.  Is a piece of information advertised or preconfigured at the station.  SSID may be requested when joining a WLAN.  SSID is not secure, because an AP advertises its SSID in its beacons.
  • 5. Network Architecture and Design 5 First Generation WLAN Security  Wired Equivalent Privacy-WEP  Optional implementation for IEEE 802.11b.  A WECA requirement of at least 40 bit encryption for WiFi certification.  Goals  Deny access to users that do not possess the appropriate WEP key.  Prevent the decoding of traffic that is WEP encrypted without the possession of the WEP key.
  • 6. Network Architecture and Design 6 First Generation WLAN Security  Wired Equivalent Privacy-WEP  WEP is a symmetric encryption mechanism.  IEEE 802.11b has chosen 40-bit keys.  Some vendors use 128-bit WEP encryption.  Key distribution or negotiation is not mentioned in the standard.
  • 7. Network Architecture and Design 7 First Generation Process  Authentication: Is the process of verifying the credentials of a client desiring to join a WLAN.  Open System Authentication: Process in clear text.  Shared Key Authentication: Uses a key to encrypt a challenge text.  Association: Is the process of associating a client with a given AP in the WLAN.
  • 8. Network Architecture and Design 8 First Generation Process Probe Phase 1.- When initialization, the client sends a probe request packet out on all the channels. 2.- The APs that hear this packet send a probe response packet back to the station. This probe response packet contains some information such as SSID, which is used to determine which AP associate.
  • 9. Network Architecture and Design 9 First Generation Process Authentication Phase Shared key mode. The WEP key is already configured in the client.
  • 10. Network Architecture and Design 10 First Generation Process Association Phase After being authenticated, the client sends an association request to the AP.
  • 11. Network Architecture and Design 11 IEEE 802.11WEP Key Management  Key distribution or negotiation is not mentioned in the standard.  The standard provides two mechanisms to select a key to encrypt a frame.  Four default keys shared by all clients.  Secure communication between users with default keys.  Once keys become widely distributed, they are more compromised. ‒ “Key mapping” relationship with another station.  More secure operation since fewer stations have the keys.  Distribution of such unicast keys is problematic as group increases.
  • 12. Network Architecture and Design 12 WEP Deficiencies  WEP uses RC4; using a shared secret key, generates an arbitrarily long sequence of bytes from a pseudorandom number.  This stream is XORed with the plaintext to produce the encrypted ciphertext. It works well in SSL.  802.11b uses 40-bit keys  Hackers can crack them in hours, but takes so much to crack 104-bit keys.  But…Easy to break RC4 encryption with keystream reuse.
  • 13. Network Architecture and Design 13 802.11 Security Weaknesses  Physical  Hardware loss, without user identification, Authentication, Accounting and Auditing.  Impersonation  Does not identify users, just hardware.  No mutual authentication, enables Rogue AP’s.  Integrity  WEP supports per packet encryption but not authentication.  Possibility to recover the RC4 stream.
  • 14. Network Architecture and Design 14 802.11 Security Weaknesses  Disclosure  Can be obtained both MAC address, time of association/disassociation.  Problems with static global keys.  Secret by more than two is not a secret  Enables rogue AP attacks.  Permits that anyone into the network to decrypt other conversations.  Dictionary attacks.  Denial of Service  Disassociation attacks.
  • 15. Network Architecture and Design 15 IEEE 802.1X  Security in 802.11 can be broken in  Authentication framework  Authentication algorithm/protocol  Encryption • Is a standard –Scalable. –Centralized Framework for Authentication. –Deploys a variety of authentication protocols. –Still in development. IEEE 802.1X
  • 16. Network Architecture and Design 16 How 802.1X Addresses 802.11 Security Issues  Extensible Authentication Protocol-EAP framework.  User ID and strong authentication.  Dynamic key derivation.  Mutual authentication.  Per-packet authentication.
  • 17. Network Architecture and Design 17 EAP Framework  EAP provides a flexible link layer security framework  Simple encapsulation protocol for IETF authentication standards  Transport Level Security–TLS (Windows).  Internet Key Exchange–IKE (Certicom-Lucent).  GSS_API (Kerberos).  Other mutual authentications schemes (Cisco LEAP).  Run over lossy or lossless media and any link layer (PPP,802.3)  Does not assume physical secure link.
  • 18. Network Architecture and Design 18 EAP Architecture
  • 19. Network Architecture and Design 19 Identification & Authentication  Users identified by usernames, not MAC addresses.  Supports extended authentication.  Non password based authentication.  Public key certificates and smartcards.  IKE  Biometrics  Token cards  Password based  One-time passwords  Any GSS_API (Kerberos)
  • 20. Network Architecture and Design 20 Per-User Per-Session Keys  802.1X enables secure derivation of per-user session key.  Provides ability to securely change global keys.  WEP keys are dynamically derived at the client when log-on.  Global key, such as broadcast WEP key, is sent from AP to client, encrypted using the unicast session key.  Makes per-user WEP keys easy to administer.
  • 21. Network Architecture and Design 21 Mutual Authentication  802.1X needs EAP methods supporting mutual authentication.  Guarantees right key transfers  Prevents Man-in-the-middle, Rogue Server attacks  Mutual Authentication EAP methods.  TLS: Supply certificate, prove possession of private key.  IKE: Server demonstrates possession of pre-shared key or private key.  GSS_API (Kerberos):server must demonstrate knowledge of the session key.
  • 22. Network Architecture and Design 22 Per-Packet Authentication  EAP supports per packet authentication & integrity. But not to all messages  TLS, IKE derive session key, with this the negotiations are authenticated and integrity protected.  Using WEP, session key can be used to encrypt, authenticate and integrity protect some messages as:  Success & Failure.
  • 23. Network Architecture and Design 23 WLAN Security Topics Coming  Temporal Key Integrity Protocol – TKIP  Initially referred as WEP2. Solve the key reuse in WEP.  128-bit shared temporal key.  Combines  Temporal key  Client’s MAC address  Adds 16-octet initialization vector. To produce a key to encrypt the data.  Temporal key change every 10,000 packets.
  • 24. Network Architecture and Design 24 WLAN Security Topics Coming  Advanced Encryption Standard – AES  AES offers much stronger encryption.  Replaces the aging Data Encryption Standard (DES) in NIST.  Solves the problem of stronger encryption needed by 802.11.  AES requires a coprocessor (additional hardware).  Companies need to replace existing access points and client NICs.  802.11i standard will likely include AES.
  • 25. Network Architecture and Design 25 Cisco Implementation  EAP describes an extensible packet exchange to allow the passing of authentication information between the client and the PPP server.  WLAN is not a PPP. 802.1X EAP over LAN (EAPOL) defines how encapsulate EAP in Ethernet or token ring packets.  EAPOW – EAP over Wireless LAN, is EAPOL but when used in wireless networks.  Is also used EAP over Radius to encapsulate within RADIUS packets.
  • 26. Network Architecture and Design 26 Protocols used to encapsulate EAP
  • 27. Network Architecture and Design 27 Cisco Implementation - LEAP  Cisco-Lightweight Extensible Authentication Protocol.  Aironet client adapters that supports EAP-LEAP authentication (FW 4.10).  Cisco Aironet Series APs supporting 802.1x EAP authenticator (Ver 11.0).  Secure Access Control Server used for AAA and EAP RADIUS services (Ver 2.6 running in Win NT/2000 server).  Lightweight because:  Minimal support from client CPU while mutual authentication.  Supports embedded systems (printers).  Runs on OS without support for native EAP authentication.  Support popular OS (Windows, Linux, MacOS).
  • 28. Network Architecture and Design 28 Cisco Implementation  The entire authentication and key distribution process is accomplished in three phases: Start, Authenticate, and Finish
  • 29. Network Architecture and Design 29 Start Phase
  • 30. Network Architecture and Design 30  The authenticate sequence varies based on the mutual authentication method chosen.  If we were using Transport Level Security (TLS) to transfer certificates in a PKI implementation, then EAP-TLS messages would be used. Authenticate Phase
  • 31. Network Architecture and Design 31 Authenticate Phase AP is in the middle acting solely as a transport vehicle
  • 32. Network Architecture and Design 32 Finish Phase
  • 33. Network Architecture and Design 33 Finish Phase  Both derive the session key from the user's password.  AP sends an EAPOW-KEY message to the client supplying the key length.  The key value (or actual WEP key) is not sent since the client has already derived it on its own.  AP encrypts with the session key (unicast) a full- length derived multicast key and sends to client.  The client and AP activate WEP and use this session multicast WEP key for all communications.
  • 34. Network Architecture and Design 34 Tentative Applications  Handoff  Client is assumed authenticated.  Just update multicast key on the adjacent AP.  Ad Hoc Mode  802.1x can be used.  User credentials are stored in each station.  New EAP method for this purpose must be designed.
  • 35. Network Architecture and Design 35 References  Mishra A, Arbaugh W.; “An Initial Security Analysis of the IEEE 802.1X Standard”. This article shows some weaknesses of the 802.1X protocol.  William A. Arbaugh, Narendar Shankar, and Y.C. Justin Wan, "Your 802.11 Wireless Network Has No Clothes“; one of the first articles that shows the 802.11b security problems  Nikita Borisov, Ian Goldberg, and David Wagner, "Intercepting Mobile Communications: The Insecurity of 802.11“  D.Simon, B. Aboba, T. Moore; IEEE 802.11 Security and 802.1X. This presentation explains the security problems on 802.11 and how 802.1X helps to fix them.  Steinke Steve; “Security and 802.11 Wireless Networks”; this article explains WEP deficiencies.  Security for Next Generation Wireless LANs; A Cisco paper that describes the first generation WLAN security.
  • 36. Network Architecture and Design 36 References  Scott Fluhrer, Itsik Mantin and Adi Shamir; Weaknesses in the Key Scheduling Algorithm of RC4 , this paper presents several weaknesses in the key scheduling algorithm of RC4 and describes their cryptanalytic significance.  AirSnort one of the best-known WEP cracking tools, which employs the RC4 weaknesses to attack WLAN networks. AirSnort recovers encryption keys, operates by passively monitoring transmissions, computing the encryption key when enough packets have been gathered.  Wireless LAN at Risk: An article that tells how easy can be to access a WLAN if even the minimal wireless security basics and precautions are not taken into account.  Sean Whalen, Analysis of WEP and RC4 Algorithms; This paper explains briefly the WEP encryption mechanism and some ways to crack it.
  • 37. Network Architecture and Design 37 End of Ninth Lecture

Editor's Notes

  • #2: IEEE 802.1X provides so called Port based network access control capability because, for example, an AP blocks all its ports until client can authenticate itself.
  • #3: This is a way that a network administrator can use to improve security. This uses internet security protocols as SSL and others encrypting the message from the client. This is not part of the protocol.
  • #4: in order for an AP to be operating in 802.11b compliant mode it is typically set to "Broadcast-SSID mode“ first generation WLAN networks resort to nothing more secure than using secret SSIDs as a means to deny access to unauthorized users.
  • #5: WEP is the core for the first generation WLAN security. Is call Wired Equivalent Privacy because this scheme attempts just to achieve a security level comparable with those in a wired network as Ethernet.
  • #6: Symmetric because the same process to encrypt and decrypt. The missing of the process for key distribution or negotiation was the root of the problem because now, each vendor implements its own method.
  • #9: Both the client and the AP must be set-up to the same authentication scheme (open or shared) for this phase to perform properly. Because the authentication process must begin from the AP, the authentication request serves to AP begins the process.
  • #12: Key reuse is a big deal, because two messages encrypted with same IV and key, reveal info of both, also these two ciphertexts XORed between them produce the plain text XORed.
  • #13: This is a summary of the 802.11 weaknesses in a practical point of view. This serves to design what a solution must address. Physical and Impersonation weaknesses are related with the pre-programmed static WEP keys. If just hardware is identified by means of MAC address, includes the same problems that static keys. Integrity is related to the possibility of data modification. RC4 recovery can be done if encrypted packets are known, (as TCP or Ack’s).
  • #14: Disclosure refers to an unintended exposure of data. Dictionary attack is to use a list of words to guess a password. Disassociation attack enables session hijacking.
  • #16: Dynamic key refers to the creation of one key for each user at each session. Mutual authentication is that client authenticates itself with the AP, but also AP must authenticate itself with the client.
  • #17: EAP is not a authentication technique, but is a flexible link layer security framework where encapsulates common authentication standards in. In the EAP frame there’s a field called TYPE, where is specified the type of authentication procedure used.
  • #18: APIs refers to Application Program Interface NDIS = Network Driver Interface Specific. 802.3=Ethernet Protocol. 802.5=Token Ring Protocol.
  • #20: The derivation of per-user session key depends on the authentication method used in the implementation (TLS=Windows, Cisco – Username, Password; IKE=Certicom-Lucent – Digital Certificate). The client and AP have the WEP key, is not necessary the transmission over the air; with this, the client can decrypt the multicast key which will be used to encrypt all the communication during the session. Easy to administer because is not needed anymore to store this keys.
  • #21: The attacks can be defeated with mutual authentication because the rogue AP can’t authenticate as an real AP with the client, in the past it didn’t need authenticate with the client; for MiM the hacker can’t authenticate as a valid AP to the client neither as a valid client with the AP.
  • #30: PKI public key infrastructure is a system of digital certificates, Certificate Authorities, and other registration authorities that verify and authenticate the validity of each party involved in an Internet transaction