1.64k likes | 1.95k Views
Security Issues in 802.11 Wireless Networks. Prabhaker Mateti Wright State University www.wright.edu/~pmateti. Talk Outline. Wireless LAN Overview Wireless Network Sniffing Wireless Spoofing Wireless Network Probing AP Weaknesses Denial of Service Man-in-the-Middle Attacks War Driving
E N D
Security Issues in 802.11 Wireless Networks Prabhaker Mateti Wright State University www.wright.edu/~pmateti
Talk Outline • Wireless LAN Overview • Wireless Network Sniffing • Wireless Spoofing • Wireless Network Probing • AP Weaknesses • Denial of Service • Man-in-the-Middle Attacks • War Driving • Wireless Security Best Practices • Conclusion WiFi Security
Ack • This talk is an overview of what has been known for a couple of years. • Figures borrowed from many sources on the www. • Apologies that I lost track of the original sources. WiFi Security
This talk is based on … • Prabhaker Mateti, “Hacking Techniques in Wireless Networks”, in The Handbook of Information Security, Editor: Bidgoli, John Wiley, 2005 • www.wright.edu/~pmateti/InternetSecurity/ WiFi Security
Wireless LAN Overview Without security issues
OSI Model Application Presentation Session Transport Network Data Link 802.11 MAC header 802.11 Physical 802.11 PLCP header WiFi Security
IEEE 802.11 • Published in June 1997 • 2.4GHz operating frequency • 1 to 2 Mbps throughput • Can choose between frequency hopping or direct sequence spread modulation WiFi Security
IEEE 802.11b • 1999 • Data Rate: 11 Mbps • Reality: 5 to 7 Mbps • 2.4-Ghz band; runs on 3 channels • shared by cordless phones, microwave ovens, and many Bluetooth products • Only direct sequence modulation is specified • Most widely deployed today WiFi Security
IEEE 802.11a • Data Rate: 54 Mbps • Reality: 25 to 27 Mbps • Runs on 12 channels • Not backward compatible with 802.11b • Uses Orthogonal Frequency Division Multiplexing (OFDM) WiFi Security
IEEE 802.11g • An extension to 802.11b • Data rate: 54 Mbps • 2.4-Ghz band WiFi Security
IEEE 802.11n • An extension to 802.11a/b/g • Final draft expected in 2010 • Data rate: 600 Mbps • 2.4-Ghz band WiFi Security
802 .11 Terminology: Station (STA) • Device that contains IEEE 802.11 conformant MAC and PHY interface to the wireless medium, but does not provide access to a distribution system • Most often end-stations available in terminals (work-stations, laptops etc.) • Typically Implemented in a PC-Card • Built into recent laptops and PDAs WiFi Security
PC-Card Hardware Radio Hardware 802.11 frame format WMAC controller with Station Firmware (WNIC-STA) 802.3 frame format Platform Computer Driver Software (STADr) Ethernet V2.0 / 802.3 frame format Protocol Stack Station Architecture • Ethernet-like driver interface • supports virtually all protocol stacks • Frame translation according to IEEE 802.1H • Ethernet Types 8137 (Novell IPX) and 80F3 (AARP) encapsulated via the Bridge Tunnel encapsulation scheme • IEEE 802.3 frames: translated to 802.11 • All other Ethernet Types: encapsulated via the RFC 1042 (Standard for the Transmission of IP Datagrams over IEEE 802 Networks) encapsulation scheme • Maximum Data limited to 1500 octets • Transparent bridging to Ethernet WiFi Security
Radio Frequency Spectrum 5.15-5.35 5.725-5.825GHz IEEE 802.11a HiperLAN/2 WiFi Security
Channel Spacing (5MHz) 2.462 2.437 2.412 Non-overlapping channels WiFi Security
Terminology: Access-Point (AP) • A transceiver that serves as the center point of a stand-alone wireless network or as the connection point between wireless and wired networks. • Device that contains IEEE 802.11 conformant MAC and PHY interface to the wireless medium, and provide access to a Distribution System for associated stations (i.e., AP is a STA) • Most often infra-structure products that connect to wired backbones • Implemented in a “box” containing a STA PC-Card. WiFi Security
PC-Card Hardware Radio Hardware 802.11 frame format WMAC controller with Access Point Firmware (WNIC-AP) 802.3 frame format Bridge Software Driver Software (APDr) Ethernet V2.0 / 802.3 frame format Kernel Software (APK) Bridge Hardware Ethernet Interface Access-Point (AP) Architecture • Stations select an AP and “associate” with it • APs support • Roaming • Power Management • Time synchronization functions (Beaconing) • Traffic flows through AP WiFi Security
Basic Configuration WiFi Security
Terminology: Basic Service Set (BSS) • A set of stations controlled by a single “Coordination Function” (that determines when a station can transmit or receive) • Similar to a “cell” in pre IEEE terminology • A BSS may or may not have an AP WiFi Security
Basic Service Set (BSS) BSS WiFi Security
Terminology: Distribution System (DS) • A system to interconnect a set of BSSs • Integrated: A single AP in a standalone network • Wired: Using cable to interconnect the AP • Wireless: Using wireless to interconnect the AP WiFi Security
Terminology: Independent Basic Service Set (IBSS) • A BSS forming a self-contained network in which no access to a Distribution System is available • A BSS without an AP • One of the stations in the IBSS can be configured to “initiate” the network and assume the Coordination Function • Diameter of the cell determined by coverage distance between two wireless stations WiFi Security
Independent Basic Service Set (IBSS) IBSS WiFi Security
Terminology: Extended Service Set (ESS) • A set of one or more BSS interconnected by a Distribution System (DS) • Traffic always flows via AP • Diameter of the cell is double the coverage distance between two wireless stations WiFi Security
Terminology: Service Set Identifier (SSID) • Network name • Up to 32 bytes long • One network (ESS or IBSS) has one SSID • E.g., “WSU Wireless”; • Known Defaults for many vendors • “101” for 3COM • “tsunami” for Cisco WiFi Security
Terminology: Basic Service Set Identifier (BSSID) • Cell identifier • One BSS has one BSSID • 6 bytes long • BSSID = MAC address of AP WiFi Security
802.11 Communication • CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) instead of Collision Detection • WLAN adapter cannot send and receive traffic at the same time on the same channel • Hidden Node Problem • Four-Way Handshake WiFi Security
Four-Way Handshake Source Destination RTS – Request to Send CTS – Clear to Send DATA ACK WiFi Security
Infrastructure operation modes Root Mode Repeater Mode WiFi Security
802.11 Packet Structure • 30 byte header • 4 addresses WiFi Security Graphic Source: Network Computing Magazine August 7, 2000
802.11 Physical Layer Packet Structure • 24 byte header (PLCP, Physical Layer Convergence Protocol) • Always transferred at 1 Mbps WiFi Security Graphic Source: Network Computing Magazine August 7, 2000
802.11 Frames • Format depends on type of frame • Control Frames • Management Frames • Data Frames WiFi Security
802.11 Frame Formats Bytes: 2 2 6 6 6 2 6 0-2312 4 Frame Frame Duration Sequence Body Addr 1 Addr 2 Addr 3 Addr 4 CRC Control ID Control 802.11 MAC Header Bits: 2 2 4 1 1 1 1 1 1 1 1 Protocol To From More Pwr More Type SubType Retry WEP Rsvd Version DS DS Frag Mgt Data Frame Control Field WiFi Security
Bits: 2 2 4 1 1 1 1 1 1 1 1 Protocol To From More Pwr More Type SubType Retry WEP Rsvd Version DS DS Frag Mgt Data Frame Control Field To DS From DS Address 1 Address 2 Address 3 Address 4 0 0 DA SA BSSID N/A 0 1 DA BSSID SA N/A 1 0 BSSID SA DA N/A 1 1 RA TA DA SA Address Field Description Addr. 1 = All stations filter on this address. Addr. 2 = Transmitter Address (TA), Identifies transmitter to address the ACK frame to. Addr. 3 = Dependent on To and From DS bits. Addr. 4 = Only needed to identify the original source of WDS (Wireless Distribution System) frames. WiFi Security
Bits: 2 2 4 1 1 1 1 1 1 1 1 Protocol To From More Pwr More Type SubType Retry WEP Rsvd Version DS DS Frag Mgt Data Frame Control Field Type field descriptions Type and subtype identify the function of the frame: • Type=00 Management Frame Beacon (Re)Association Probe (De)Authentication Power Management • Type=01 Control Frame RTS/CTS ACK • Type=10 Data Frame WiFi Security
802.11 Management Frames • Beacon • Timestamp, Beacon Interval, Capabilities, SSID, Supported Rates, parameters • Traffic Indication Map • Probe • SSID, Capabilities, Supported Rates • Probe Response • Timestamp, Beacon Interval, Capabilities, SSID, Supported Rates, parameters • Same for Beacon except for TIM WiFi Security
Management Frames (cont’d) • Association Request • Capability, Listen Interval, SSID, Supported Rates • Association Response • Capability, Status Code, Station ID, Supported Rates • Re-association Request • Capability, Listen Interval, SSID, Supported Rates, Current AP Address • Re-association Response • Capability, Status Code, Station ID, Supported Rates WiFi Security
Management Frames (cont’d) • Dis-association • Reason code • Authentication • Algorithm, Sequence, Status, Challenge Text • De-authentication • Reason WiFi Security
Association + Authentication State 1: Unauthenticated Unassociated Successful authentication Deauthentication Deauthentication State 2: Authenticated Unassociated Successful association Disassociation State 3: Authenticated Associated WiFi Security
Authentication • To control access to the infrastructure via authentication. • The station first needs to be authenticated by the AP in order to join the APs network. • Stations identify themselves to other stations (or APs) prior to data traffic or association. • Two authentication subtypes: • Open system. • shared key. WiFi Security
Open System Authentication • A sends an authentication request to B • B sends the result back to A WiFi Security
Shared Key Authentication WiFi Security
Beacons sent out 10x second Advertise capabilities Station queries access points Requests features Access points respond With supported features Authentication just a formality May involve more frames Probe request Authentication request Association request Probe response Authentication response Association response Access Point Discovery WiFi Security
Association • Next Step after authentication • Association enables data transfer between Client and AP • The Client sends an association request frame to the AP who replies to the client with an association response frame either allowing or disallowing the association WiFi Security
Association • To establish relationship with AP • Stations scan frequency band to and select AP with best communications quality • Active Scan: send a “Probe request” on specific channels and assess response • Passive Scan: assess communications quality from beacon message • AP maintains list of associated stations in MAC FW • Record station capability (data-rate) • To allow inter-BSS relay • Station’s MAC address is also maintained in bridge learn table associated with the port it is located on WiFi Security
WEP: Wired Equivalent Privacy • Designed to be computationally efficient, self-synchronizing, and exportable • Data headers remain unencrypted. • The cipher used is RC4(v, k) • Shared key k: Manual distribution among clients. WiFi Security
WEP Encryption • WEP encryption key: a shared 40- or 104-bit long number. • WEP keys are used for authentication and encryption of data. • A 32-bit integrity check value (ICV) is calculated that provides data integrity for the MAC frame. The ICV is appended to the end of the frame data. • A 24-bit initialization vector (IV) is appended to the WEP key. • IV and WEP encryption key are input to a pseudo-random number generator (PRNG) to generate a bit sequence that is the same size as the combination of [data+ICV]. • The PRNG bit sequence is bit-wise XORed with [data+ICV] to produce the encrypted portion of the payload that is sent between the wireless AP and the wireless client. • The IV is added to the front of the encrypted [data+ICV] which becomes the payload for the wireless MAC frame. • The result is IV+ encrypted [data+ICV]. WiFi Security
WEP Decryption • IV is obtained from the front of the MAC payload. • WEP encryption key is concatenated with the IV. • The concatenated WEP encryption key and IV is used as the input of the same PRNG to generate a bit sequence of the same size as the combination of the [data + ICV]. • The PRNG bit sequence is XORed with the encrypted [data+ICV] to decrypt the [data+ICV] portion of the payload. • The ICV for the data portion of the payload is calculated and compared with the value included in the incoming frame. • The WEP key remains constant over a long duration (days and months) but the IV can be changed frequently depending on the degree of security needed. WiFi Security
802.11 Hdr Data 802.11 Hdr 802.11 Hdr IV Append ICV = CRC32(Data) Check ICV = CRC32(Data) Select and insert IV Per-packet Key = IV || RC4 Base Key RC4 Encrypt Data || ICV Remove IV from packet Per-packet Key = IV || RC4 Base Key RC4 Decrypt Data || ICV ICV Data ICV Encrypted Data 24 bits WEP WiFi Security
WEP Protocol • Key is shared by all clients and the base station. • PRNG – Pseudo Random Number Gen WiFi Security