330 likes | 532 Views
Wireless Security. Chapter 24 Wireless Network Security. Objectives. The student shall be able to: Define the main function of the IEEE standards: 802.11a, 802.11b, 802.11g, 802.11i, 802.11n Define Access Point, BSS, ESS, WEP, WPA2
E N D
Wireless Security Chapter 24 Wireless Network Security
Objectives The student shall be able to: • Define the main function of the IEEE standards: 802.11a, 802.11b, 802.11g, 802.11i, 802.11n • Define Access Point, BSS, ESS, WEP, WPA2 • Describe how a man-in-the-middle attack could occur within a wireless network, and how sniffing could be used by an attacker. • Define 3 main protections for WLAN protocol configurations. • Define 3 additional protections that will help safeguard an access point or station. • Define the purposes of the phases of WLAN connections: discovery, authentication, key exchange, protected data transfer.
IEEE 802.11 - WIFI 802.11a - Wireless network bearer operating in the 5 GHz ISM band with data rate up to 54 Mbps 802.11b - Wireless network bearer operating in the 2.4 GHz ISM band with data rates up to 11 Mbps 802.11e - Quality of service and prioritisation 802.11f - Handover 802.11g - Wireless network bearer operating in 2.4 GHz ISM band with data rates up to 54 Mbps 802.11h - Power control 802.11i - Authentication and encryption 802.11j - Interworking 802.11k - Measurement reporting 802.11n - Wireless network bearer operating in the 2.4 and 5 GHz ISM bands with data rates up to 600 Mbps 802.11s - Mesh networking 802.11ac - Wireless network bearer operating below 6GHz to provide data rates of at least 1Gbps per second for multi-station operation and 500 Mbps on a single link 802.11ad - Wireless network bearer providing very high throughput at frequencies up to 60GHz 802.11af - Wi-Fi in TV spectrum white spaces (often called White-Fi)
Typical Configuration Security Issues: Shared Medium Offsite access: War Driving
WIFI Protocol Stack Physical Layer: Transmits bits MAC Layer: Discards packets received with errors LLC Layer: An optional layer retransmits if necessary
IEEE 802.11 Extended Service Set Access Point (AP): Provides access to the distribution system Can serve as the coordination function, which controls when stations are permitted to transmit. Basic Service Set (BSS): Set of stations controlled by a single coordination function (AP) Extended Service Set (ESS): A set of 1 or more interconnected BSSs/LANs that appear to the LLC as a single BSS. Distribution System: A system which internconnects a set of BSSs/LANs into an ESS
Man-in-the-Middle Attack 10.1.1.1 10.1.1.3 (2) Login (1) Login (4) Password (3) Password 10.1.1.2
Wireless Attacks Eavesdrop Attacks Active Attacks Nontraditional Networks: Other protocols (Bluetooth, PDAs) may be insecure Identity Theft: Impersonation of MAC address Denial of Service: Bombarding a WLAN with messages Network Injection: Attacker inject packets to affect connection or network configuration • Accidental Association: Connecting through the wrong Access Point • Malicious Association: Connecting through a Spoofed Access Point • Ad hoc Network: Connecting through another Station
Securing Wireless Transmissions • Hide Service Set Identifier (SSID) • Do not broadcast SSID • Assign cryptic name • Reduce External Signal Strength • Reduce power level • Position AP in innermost building • Use directional antennas • Use signal-shielding techniques • Encrypt all transmissions (WPA2 best)
Secure Wireless AP • Use Firewall • Use Anti-virus/Anti-spyware software • Change Router Standard Configuration • Change default password • Change default router identifier • Configure for Specific MAC Addresses • Harder but not impossible to break in
Secure Station • Stolen Device • Encrypt disk • Backup data • Malware – Malicious App • Antivirus – Antispyware software • Firewall • Secure other interfaces (e.g., Bluetooth) • Secure authentication
Insecure WEP Protocol Problems: All devices in a network share a secret key No mutual authentication Key is static Key is limited in size and scope
Robust Security NetworkFive 802.11i Phases Discovery: AP & STA negotiate cipher suite and authentication method Authentication: AP & STA mutually authenticate Authentication: Can you prove you are who you say you are? Key Management: Keys are generated and distributed to AP/STA. Protected Data Transfer: Encrypted transmissions Connection Termination: Secure connection torn down
Discovery Phase Discovery Phase: Negotiation of: Encryption & Integrity Cipher Suite WEP TKIP CCMP Vendor Specific Authentication & Key Mgmt IEEE 802.1X Pre-shared Key Vendor-Specific Key management approach
Discovery Phase: 3 Stages Network & Security Capability Discovery: What device and security capabilities exist? AP broadcasts Beacons to advertise network & security policies (Optional) STA sends Probe <-> and gets Probe Response back Open System Authentication STA & AP exchange identifiers Simple for backward compatibility Association Agree on set of security capabilities Association Request (STA) Association Response (AP)
MAC: Beacon w. Security MAC: Probe Request (w. Security)
MAC: Probe Request MAC: Probe Request
MAC: Probe Response cont’d Probe Response, Cont’d
MAC: Probe Response w. Security Probe Response, cont’d w. security
Authentication Phase Mutual authentication between an STA and Authentication Server Before Authentication: Uncontrolled All packets go to the Authentication Server After Authentication: Controlled STA packets can go to other BSS or DS.
Authentication Phase Stages Connect to AS (Authentication Server) STA -> AS: Connection Request AP acknowledges & forwards request EAP Exchange Extensive Authentication Protocol (EAP) IEEE 802.1X Port-Based Network Access Control The STA and AS authentication each other Secure Key Delivery AS -> STA: Master Session Key Relies on EAP for secure exchange
Key Management Phase:Two Types of Keys Pairwise Keys: Unicast(AP<->STA) Unique per STA Pre-Shared Key: Pre-shared before transmission PTK = HMAC-SHA-1(PMK+MAC Addresses[STA,AP]+nonce) Confirmation Key: Integrity & Authenticity of control frames Encryption: Confidentiality of key exchange Temporal key: Used for data exchange Group Keys: Multicast (AP<->STAs) GTK changed when STA leaves network Nonce: Time-related number prevents replay
Key Management Phase Unicast 4-Way Handshake: STA AP EAPOL-key(Anonce, Unicast)) EAPOL-key(Snonce, Unicast, MIC) (Both sides generate PTK from Anonce, Snonce, MAC addresses, PMK) EAPOL-key(Install PTK, Unicast, MIC)) EAPOL-Key(Unicast, MIC) Group Key Distribution EAPOL-key(GTK,MIC) EAPOL-Key(MIC) Notes Anonce, Snonce: Timed values & Local MAC Addresses MIC=Message Integrity Code (HMAC-MD5 or HMAC-SHA-1-128)
Data Transfer PhaseIEEE 802.11i Temporal Key Integrity Protocol (TKIP) WEP-Compatible Message Integrity Code (MIC) = 64 bits Calculated from MAC addresses + data + key material Data Confidentiality: Uses RC4 to encrypt MPDU+MIC Sequence number prevents replay Counter Mode CBC MAC Protocol (CCMP) Integrity: Cipher-block-chaining Message Auth. Code (CBC-MAC) Confidentiality: AES CTR block cipher mode.
Pseudo-Random Function Generator Used for Nonces Expand Pairwise keys Generate IEEE 802.11i PRF(K,A,B,Len) K=Secret key A=connection-specific text string (nonce or key expansion) B=data specific to each case Len=desired # pseudorandom bits for output Counter I, incrementing
Summary Protocol Design Good Practices Hidden identity Low Signal Strength Firewall Avoid default configuration (password, id) Encrypt transmissions Encrypt mobile devices Antivirus/Antispyware S/W • A set of authentication mechanisms from bad to good • Negotiated security • Mutual authentication before service • Session keys • Integrity (MAC), Nonce (Replay), Encryption • Multicast keys possible