330 likes | 542 Views
802.11 Wireless Security. Presentation by Paul Petty and Sooner Brooks-Heath. Wireless Networks? Beer….huh?. Presentation Outline. 802.11 Protocol Overview 802.11 (in)Security Wireless LAN Attacks Software Demonstration. 802.11 Protocol Overview. IEEE Wireless LAN Standard
E N D
802.11 Wireless Security Presentation by Paul Petty and Sooner Brooks-Heath
Presentation Outline • 802.11 Protocol Overview • 802.11 (in)Security • Wireless LAN Attacks • Software Demonstration
802.11 Protocol Overview • IEEE Wireless LAN Standard • Operates on ISO Model within the Data Link and Physical Layers • Two Primary Operating Modes • Infrastructure Mode • Ad-Hoc Mode • SSID assigned to Access Points
Security Methods • Two Main Security Objectives of 802.11 • User Authentication • Protocol Specified • Other • Data Integrity and Privacy • WEP • Third Party
Security Methods - Authentication • 802.11 Specifies Two Modes for Authentication • OSA (Opens Systems Authentication) • Shared Key Authentication • Other Authentication Methods (Currently Used) • MAC Address Table
Open System Authentication Node Access Point
Open System Authentication Node Access Point Beacon
Open System Authentication Node Access Point Beacon Authentication Req SSID Matches
Open System Authentication Node Access Point Beacon Authentication Req SSID Matches Access Point Accepts Node Authentication Resp
Open System Authentication Node Access Point Beacon Authentication Req SSID Matches Access Point Accepts Node Authentication Resp Node is Associated
Shared Key Authentication Node Access Point
Shared Key Authentication Node Access Point Authentication Req
Shared Key Authentication Node Access Point Authentication Req Challenge Text
Shared Key Authentication Node Access Point Authentication Req Challenge Text WEP Encryption of Challenge Text
Shared Key Authentication Node Access Point Authentication Req Challenge Text WEP Encryption of Challenge Text Encrypted Challenge Text
Shared Key Authentication Node Access Point Authentication Req Challenge Text WEP Encryption of Challenge Text WEP Decryption of Encrypted Challenge Text Encrypted Challenge Text
Shared Key Authentication Node Access Point Authentication Req Challenge Text WEP Encryption of Challenge Text WEP Decryption of Encrypted Challenge Text Encrypted Challenge Text Authentication Decision
Shared Key Authentication Node Access Point Authentication Req Challenge Text WEP Encryption of Challenge Text WEP Decryption of Encrypted Challenge Text Encrypted Challenge Text Authentication Decision Node Approval based on Decision
MAC Address Authentication • Access Points Programmed With List of MAC Addresses • Only Valid Node MAC Addresses Authorized • Practical in Smaller Wireless LANs • Not Outlined in 802.11 Protocol – Hardware Specific
Data Integrity and Privacy • Due to the vulnerability of the wireless medium, the 802.11 protocol has specified a method of protecting the integrity and privacy of data transmitted over wireless LANs. • Wired Equivalent Privacy (WEP)
WEP – Wired Equivalent Privacy • WEP is the security protocol for wireless LANs operating under the 802.11 standard. • WEP is designed to provide the security of a wired LAN through encryption via the RC4 algorithm. • Primary function is to safeguard against eavesdropping.
RC4 • Stream Cipher or Symmetric Encryption Algorithm • Developed by Ron Rivest at RSA Securities in 1987 • Source Code Cracked and Leaked in 1994 • Often Used in Software Applications due to its Speed • Original WEP Schemes Specified 40 bit keys • New Hardware Specifies 104 bit keys
Initialization: For i = 0 .. N - 1 S[i] = i j = 0 Scrambling: For i = 0 .. N - 1 j = j + S[i] + K[i mod l] Swap(S[i], S[j]) RC4 Algorithms KSA PRGA Initialization: i = 0 j = 0 Generation Loop: i = i + 1 j = j + S[i] Swap(S[i], S[j]) Output z = S[S[i] + S[j]]
ICV Encrypted under Key + IV using the RC4 Stream Cipher Hdr + Prbl IV Data Encrypted WEP Packet Header and Preamble Information 24 bit Initialization Vector
Example of RC4 Encoding Two (00000010 in binary) is our encrypting variable (key). It is XORed with some plain text to produce cipher text. For this example we will use the plain text message “HI” H I 0 1 0 0 1 0 0 0 0 1 0 0 1 0 0 1 XOR 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 1 0 0 1 0 1 0 0 1 0 0 1 0 1 1 Encrypted Message Once the receiving node gets the message, it must XOR the encrypted message with the same key to decrypt it. 0 1 0 0 1 0 1 0 0 1 0 0 1 0 1 1 Encrypted Message XOR 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 1 0 0 1 0 0 0 0 1 0 0 1 0 0 1 H I
Problems with WEP • No Defined Key Management Protocol • Manual Key Configuration Required • Initialization Vector (IV) is too Small • Inappropriate Integrity Check Value Algorithm • Weak Use of RC4 • Easily Forged Authentication Messages
Attack Types Against Wireless LANs • Passive • Packet Listening and Decryption • Active • Table Building • Man-in-the-Middle Attacks • Bit Flipping
Demonstration AirMagnet Wireless LAN Discovery Suite • Application for Laptop PCs and PDAs • Wireless LAN Analyzer • Real Time Packet Capture and Decode • AP SSID Discovery • Mismatch Tools
Conclusion • Wireless LANs under 802.11 are NOT fully secured • Possible Attack Prevention Techniques • VPNs • Dynamic Key Rescheduling • 802.1X – User Authentication • More research needs to be done on wireless LAN security techniques and their implementation.
Questions ? - References Listed on Project Website -