210 likes | 224 Views
Secure and Flexible Support for Visitors in Enterprise Wi-Fi Networks. José Carlos Brustoloni Dept. Computer Science, University of Pittsburgh 210 S. Bouquet St. #6111, Pittsburgh, PA 15260 – USA Email: jcb@cs.pitt.edu Joint work with Haidong Xia. Motivation.
E N D
Secure and Flexible Support for Visitors in Enterprise Wi-Fi Networks José Carlos Brustoloni Dept. Computer Science, University of Pittsburgh 210 S. Bouquet St. #6111, Pittsburgh, PA 15260 – USA Email: jcb@cs.pitt.edu Joint work with Haidong Xia
Motivation Will Wi-Fi enable ubiquitous Internet access? • Cheap • Adapters built-in most notebook computers and PDAs • Access points being deployed everywhere • Most access points meant for use only by members of owning organization (use by others is trespass, even if technically possible) • Commercial hotspots viable only in high-utilization areas Jose' Carlos Brustoloni
Contribution: Secure Opportunistic Hotspots • Enable noncommercial Wi-Fi networks to provide: • to members of owning organization: unrestricted connectivity • to invited or paying visitors: Internet access • for members, high security and similar performance • up-to-date enterprise Wi-Fi security protocols (WPA or 802.11i) • firewall blocks visitor access to intranet • traffic control limits bandwidth used by visitors • for invited visitors, improved collaboration and productivity • for paying visitors, opportunistic access without establishing account with owning organization • for owning organization, amortized costs of members’ and invited visitors’ connectivity Jose' Carlos Brustoloni
Challenges • How to block unauthorized visitor access? • Enterprise Wi-Fi security solutions (WPA, 802.11i) inadequate: would require reconfiguration of visitors’ computers • Captive portals readily interoperate, commonly used, but vulnerable to session hijacking and freeloading attacks New defenses: session id checking and MAC sequence number tracking • How to bill paying visitors? • Subscriptions and pay-per-use accounts inadequate: limited coverage and uptime, no marketing, sales or support staff • Physical prepaid tokens may be impractical to sell (need outlet and staff) or buy (user needs to find and go to outlet, which needs to be open) New method: virtual prepaid tokens (VPTs) Jose' Carlos Brustoloni
Supporting both WPA/802.11i (for members) and captive portals (for visitors) • Visitor authentication by captive portal • SSL-secured Web page that requests visitor’s username and password • prisonwall redirects Web requests of unauthorized visitors to captive portal • captive portal authorizes visitor’s access by registering visitor’s IP and MAC addresses in prisonwall • packets of authorized visitors unencrypted, authenticated simply by address • On the contrary, packets of members encrypted and authenticated by MAC • How can the access point broadcast both to visitors and members (e.g., DHCP, ARP)? • Our solution: • keep track of number of associated members and visitors • if both present, broadcast packets twice, once encrypted and once unencrypted • low overhead Jose' Carlos Brustoloni
Session hijacking attack • Hijacker snoops victim’s MAC and IP addresses and access point’s MAC address • Periodically sends to victim 802.11 disassociation or deauthentication notifications purported to come from access point (causing denial-of-service) • Hijacker uses victim’s MAC and IP addresses to obtain unauthorized access Jose' Carlos Brustoloni
Detecting and blocking session hijackings Session id checking: • Captive portal sends to client a session management page with cookie containing a cryptographically random session id • Session management page is SSL-secured and tagged with http-equiv = “refresh” directive • Client’s browser periodically sends to captive portal request to refresh the session management page • Each request accompanied by cookie with session id • Captive portal deauthorizes MAC and IP addresses of client whose refresh request and session id cookie were not received in the previous period Jose' Carlos Brustoloni
Victim continues to communicate (no denial of service) If victim does not have personal firewall, victim may respond to packets destined to freeloader (e.g., TCP RST), disrupting freeloader’s communication However, if victim has personal firewall, victim does not respond to such packets Both victim and freeloader get access: potential for collusion Freeloading attack Jose' Carlos Brustoloni
Detecting freeloading • Each 802.11 packet contains a 12-bit sequence number • Increments by one for each new packet sent; remains the same in case of MAC-layer fragmentation or retransmission • Implemented in adaptor’s firmware; cannot be changed by host • In case of freeloading, sequence numbers of packets using the same MAC and IP addresses form two (or more) trend lines Jose' Carlos Brustoloni
Blocking freeloading Jose' Carlos Brustoloni MAC sequence number tracking: Access point tracks MAC sequence numbers of packets from each associated client In case MAC sequence number returns from a trend line to the previous trend line, access point notifies captive portal for deauthorizing client’s MAC and IP addresses
Virtual prepaid tokens (VPTs) • Like a physical prepaid token, but bought online, using 3rd-party online payment server (OPS) • Much easier to: • sell: no need to provide physical outlet, staff • buy: no need to find and go to outlet; always open • Compared to aggregator accounts: • for seller, OPS much cheaper than Wi-Fi aggregator • PayPal (OPS): $0.30 + 2.9% • Boingo (aggregator): 25% or anything in excess of $1 per connect day • for buyer, can use OPS account for many other purposes (auctions, e-commerce, both send and receive payments) Jose' Carlos Brustoloni
VPT protocol Jose' Carlos Brustoloni
Experimental results • Access point with: • support for both members and visitors • prisonwall blocking visitor/intranet communication and supporting VPTs • traffic control • MAC sequence number tracking based on Linux + HostAP + 32 KB new code + 1 KB state for 50 visitors • Captive portal with: • session id checking • VPT support • Clients: • IBM, Dell, Sony notebook computers, Sharp Zaurus PDAs • Intel, Orinoco, Cisco, Linksys, Netgear, D-Link adapters • Verified: • AP and CP interoperation with all clients • simultaneous support for members and visitors Jose' Carlos Brustoloni
Limiting the impact of visitors on network performance experienced by members Jose' Carlos Brustoloni
Overhead of session id checking – throughput very little overhead @ 8 s 4% @ 1 s, 15 clients Jose' Carlos Brustoloni
Session id checking – CPU utilization For 1 s refresh 5% @ 1 s, 15 clients Jose' Carlos Brustoloni
MAC sequence number tracking - throughput Jose' Carlos Brustoloni
Access latency for paying visitors (in the above experiment, OPS = PayPal) Jose' Carlos Brustoloni
Related work • SPINACH project (Stanford) first proposed captive portals • Aboba’s characterization of access point virtualization techniques • Single SSID/beacon, single beacon (only for visitors), single BSSID vs. • Single SSID/beacon, multiple beacon, multiple BSSIDs (commercial hotspots) • Roaming agreements vs. direct payment to visited networks • Patel and Crowcroft • Peirce and O’Mahony: micropayments for prepaid roaming • Blaze et al.: TAPI micropayments (does not address freeloading) • Mann: US regulations for OPS user guarantees and liabilities • same as for credit card if OPS account funded only via credit card • P2PWNC: peer-to-peer arch. for ubiquitous access • does not deal with “trade imbalances” Jose' Carlos Brustoloni
Other related work • Commercial hotspots • surprisingly tricky to find viable business model • many failed: MobileStar, AirZone, HereUAre, Joltage, Comet • unlike SOHs, do not tolerate low utilization or poor availability • Promotional hotspots • unlike SOHs, do not support members or paying visitors – all users are invited • Many informally open networks, community networks • suggest visitors’ impact on security and performance tolerable by many owning organizations + many users interested in using such networks • argue for viability of SOHs • 3G wireless • Wi-Max Jose' Carlos Brustoloni
Conclusions • Wi-Fi’s potential for ubiquitous access not well supported by existing architectures • Secure Opportunistic Hotspots: enterprise and home Wi-Fi networks provide also Internet access to invited and paying visitors • Simple new scheme for simultaneously supporting members and visitors • interoperates well, low implementation cost, low overhead • limited visitor impact on members’ performance, no impact on security • New defenses against unauthorized visitor access: session id checking and MAC sequence number tracking • effective, low implementation cost, low overhead • New billing method: virtual prepaid tokens • lower costs for provider, more convenient for occasional visitor • low access latency (< 15 sec) • SOHs could significantly benefit the availability of ubiquitous Internet access Jose' Carlos Brustoloni