220 likes | 324 Views
Detecting and Blocking Unauthorized Access in Wi-Fi Networks Haidong Xia and Jos é Brustoloni. Department of Computer Science University of Pittsburgh 210 S. Bouquet St. #6111, Pittsburgh, PA 15260, USA Tel.: +1 (412) 624-8852, Fax: +1 (412) 624-8854 Email: jcb@cs.pitt.edu
E N D
Detecting and Blocking Unauthorized Access in Wi-Fi NetworksHaidong Xia and José Brustoloni Department of Computer Science University of Pittsburgh 210 S. Bouquet St. #6111, Pittsburgh, PA 15260, USA Tel.: +1 (412) 624-8852, Fax: +1 (412) 624-8854 Email:jcb@cs.pitt.edu Web:http://www.cs.pitt.edu/~jcb/
Motivation • Securing Wi-Fi networks is feasible but labor-intensive • IPsec, dynamic WEP w/ IEEE 802.1x, WPA, IEEE 802.11i • HW, SW installation, configuration in user computers • Wi-Fi networks that serve large number of user-owned computers typically resort to not-so-secure but easier-to-use authentication schemes • Many university departments: MAC address filtering • University campuses and commercial hotspots: captive portals • Unauthorized access is easy in such networks • MAC address spoofing • Session hijacking, freeloading Jose' Brustoloni -- Networking'2004
Contribution • Novel mechanisms for detecting and blocking unauthorized access in Wi-Fi networks • session id checking • MAC sequence number tracking • Work with default HW/SW configuration in user computers • possible applications in universities, commercial hotspots • Interoperate with IPsec, 802.1x, WPA, 802.11i • application in easy-to-use Internet-only access for authenticated guests while members use stronger but more-difficult-to-configure security • Experiments demonstrate modest overhead Jose' Brustoloni -- Networking'2004
Native Wi-Fi security AP RADIUS 802.1x client AP router Internet encrypted Wi-Fi w/ dynamic keys AP • WEP hopelessly insecure → new schemes based on 802.1x • 802.1x access point restricts user’s access until RADIUS-authenticated • EAP supports a variety of user authentication schemes • EAP-TLS (certificate-based), PEAP (password-based) • Pre-shared keys for residential, SOHO networks • After user authenticated, all traffic between user and access point • encrypted with per-session keys and dynamic WEP, TKIP (WPA), • or AES-CCMP (802.11i) Jose' Brustoloni -- Networking'2004
Hurdles for native Wi-Fi security • Install and configure new software, firmware, possibly hardware in user computers • Must implement same drafts as access points and RADIUS server do • Work in progress – e.g., PEAP, 802.11i still drafts • Interoperability currently problematic • Default configuration probably (no) pre-shared key • Different configurations likely necessary if used in hotspots and homes • Configuration confusing for end users – many knobs to turn • How to support on-the-spot sign-ups? Jose' Brustoloni -- Networking'2004
MAC address filtering • Access points configured to accept only packets that contain certain MAC addresses • Often combined with suppression of 802.11 beacon packets (security by obscurity ...) • Sometimes combined with static WEP keys • Attackers can easily find approved MAC address and spoof it • ethereal • Linux: ifconfig ethXX hw ether xx:xx:xx:xx:xx:xx • Windows: smac application, control panel (some drivers), or registry • WEP keys, if used, can be found by social engineering, airsnort, WEPcrack • Difficult to support large or dynamic user groups Jose' Brustoloni -- Networking'2004
Captive portals AP • First proposed by Stanford’s SPINACH project (INFOCOM’99) • Widely used in university campuses and commercial hotspots • User’s Web browser automatically redirected to captive portal • SSL-secured page where user enters id and password • may use a variety of back-ends for authentication (Kerberos, RADIUS, LDAP) • After authentication, user’s MAC and IP addresses are authorized Internet plain Wi-Fi Captive portal default client AP intranet AP Jose' Brustoloni -- Networking'2004
Session hijacking attack • Hijacker snoops victim’s MAC and IP addresses and access point’s MAC address • Periodically sends to victim 802.11 disassociation or deauthentication notifications purported to come from access point (causing denial-of-service) • Hijacker uses victim’s MAC and IP addresses to obtain unauthorized access Jose' Brustoloni -- Networking'2004
Victim continues to communicate (no denial of service) If victim does not have personal firewall, victim may respond to packets destined to freeloader (e.g., TCP RST), disrupting freeloader’s communication However, if victim has personal firewall, victim does not respond to such packets Both victim and freeloader get access: potential for collusion Freeloading attack Jose' Brustoloni -- Networking'2004
Detecting and blocking session hijackings Session id checking: • Captive portal sends to client a session management page with cookie containing a cryptographically random session id • Session management page is SSL-secured and tagged with http-equiv = “refresh” directive • Client’s browser periodically sends to captive portal request to refresh the session management page • Each request accompanied by cookie with session id • Captive portal deauthorizes MAC and IP addresses of client whose refresh request and session id cookie were not received in the previous period Jose' Brustoloni -- Networking'2004
Detecting freeloading • Each 802.11 packet contains a 12-bit sequence number • Increments by one for each new packet sent; remains the same in case of MAC-layer fragmentation or retransmission • Implemented in adaptor’s firmware; cannot be changed by host • In case of freeloading, sequence numbers of packets using the same MAC and IP addresses form two (or more) trend lines Jose' Brustoloni -- Networking'2004
Blocking freeloading Jose' Brustoloni -- Networking'2004 MAC sequence number tracking: Access point tracks MAC sequence numbers of packets from each associated client In case MAC sequence number returns from a trend line to the previous trend line, access point notifies captive portal for deauthorizing client’s MAC and IP addresses
Comparison between the two defenses • Session id checking is inappropriate against freeloading because in the latter case, the victim continues to communicate and refresh the session management page • MAC sequence number tracking is inappropriate against session hijacking because the latter causes a simple jump in sequence number • simple jump can also happen without hijacking (e.g., client moves out of range and then back in range) • need two trend lines for robust detection • Therefore, use defenses in tandem • Both defenses are transparent to clients: no client configuration required Jose' Brustoloni -- Networking'2004
Implementation • Access point: IBM Thinkpad T30, Pentium 4 1.8 GHz, 256 MB RAM Linux 2.4.20 with modified HostAP driver • Captive portal: Dell Dimension 4550, Pentium 4 2.4 GHz, 256 MB RAM Linux 2.4.20, Apache server • Authentication server: identical Dell computer running OpenLDAP • Test server: identical Dell computer • Test clients: IBM T30 and older Dell and Sony laptops, Sharp PDAs, Dell Dimension 8300 desktops w/ PCI 802.11 cards • Throughput measurements using ttcp • Round-trip measurements using ethereal Jose' Brustoloni -- Networking'2004
Experimental results Verified that: • PittNet Wireless and Starbucks Wi-Fi networks are vulnerable to session hijacking and freeloading • Session id checking detects and blocks session hijacking • reaction delay controlled by refresh period • MAC sequence number tracking detects and blocks freeloading • reaction as soon as legitimate client resumes transmission • Session id checking and MAC sequence number tracking: • interoperate well • work with a variety of network interface cards (including Prism 2, 2.5 (Netgear, Linksys, D-Link), Proxim Orinoco, Cisco Aironet) Jose' Brustoloni -- Networking'2004
Session id checking - throughput Jose' Brustoloni -- Networking'2004
Session id checking – CPU utilization For 1 s refresh Jose' Brustoloni -- Networking'2004
Session id checking - delay Jose' Brustoloni -- Networking'2004
MAC sequence number tracking - throughput Jose' Brustoloni -- Networking'2004
MAC sequence number tracking - delay Jose' Brustoloni -- Networking'2004
Conclusions • Session id checking and MAC sequence number tracking are novel defenses that can help block unauthorized access in: • academic Wi-Fi networks • commercial hotspots • Tradeoff between speed of reaction to session hijacking and CPU and bandwidth overhead of session id checking • Project 1 s reaction time with < 10% CPU overhead @ 1.8 GHz • Overhead of MAC sequence number tracking is very low Jose' Brustoloni -- Networking'2004
IPsec-based Wi-Fi security AP • Use in hotspots proposed at WWW’2000 (Brustoloni & Garay) • Microsoft IPsec client does not support nested IPsec tunnels • if used for LAN, IPsec not available for wider-range VPNs • Thus, need to install IPsec client SW in user computer • Many knobs to turn; interoperation challenging; user needs certificate • Currently viable only with abundant tech support • Perhaps will become easier-to-use with IKEv2 Internet Wi-Fi w/ IPsec IPsec Gateway IPsec client AP intranet AP Jose' Brustoloni -- Networking'2004