240 likes | 381 Views
Lecture 3. Objectives. WEP protocol Access control Dynamic WEP WEP2. Basic IEEE 802.11 Security Protections. Data transmitted by a WLAN could be intercepted and viewed by an attacker Important that basic wireless security protections be built into WLANs
E N D
Objectives • WEP protocol • Access control • Dynamic WEP • WEP2
Basic IEEE 802.11 Security Protections • Data transmitted by a WLAN could be intercepted and viewed by an attacker • Important that basic wireless security protections be built into WLANs • Three categories of WLAN protections: • Access control • Wired equivalent privacy (WEP) • Authentication • Some protections specified by IEEE, while others left to vendors
Access Control • Intended to guard availability of information • Wireless access control: Limit user’s admission to AP • Filtering • Media Access Control (MAC) address filtering: Based on a node’s unique MAC address Figure 8-2: MAC address
Access Control (continued) Figure 8-4: MAC address filtering
Access Control (continued) • MAC address filtering considered to be a basic means of controlling access • Requires pre-approved authentication • Difficult to provide temporary access for “guest” devices
Wired Equivalent Privacy (WEP) • Guard the confidentiality of information • Ensure only authorized parties can view it • Used in IEEE 802.11 to encrypt wireless transmissions • “Scrambling”
WEP: Implementation (continued) Figure 8-6: Symmetric encryption
WEP: Implementation (continued) • WEP shared secret keys must be at least 40 bits • Most vendors use 104 bits • Options for creating WEP keys: • 40-bit WEP shared secret key (5 ASCII characters or 10 hexadecimal characters) • 104-bit WEP shared secret key (13 ASCII characters or 16 hexadecimal characters) • Passphrase (16 ASCII characters) • APs and wireless devices can store up to four shared secret keys • Default key used for all encryption
WEP: Implementation (continued) Figure 8-8: Default WEP keys
WEP: Implementation (continued) Figure 8-9: WEP encryption process
WEP: Implementation (continued) • When encrypted frame arrives at destination: • Receiving device separates IV from ciphertext • Combines IV with appropriate secret key • Create a keystream • Keystream used to extract text and ICV • Text run through CRC • Ensure ICVs match and nothing lost in transmission • Generating keystream using the PRNG is based on the RC4 cipher algorithm • Stream Cipher
Dynamic WEP • Solves weak IV problem by rotating keys frequently • More difficult to crack encrypted packet • Uses different keys for unicast and broadcast traffic • Unicast WEP key unique to each user’s session • Dynamically generated and changed frequently • Broadcast WEP key must be same for all users on a particular subnet and AP
Dynamic WEP (continued) Figure 9-1: Dynamic WEP
Dynamic WEP (continued) • Can be implemented without upgrading device drivers or AP firmware • No-cost and minimal effort to deploy • Does not protect against man-in-the-middle attacks • Susceptible to DoS attacks
Wireless Security Solutions • IEEE 802.11a and 802.11b standards included WEP specification • Vulnerabilities quickly realized • Organizations implemented “quick fixes” • Did not adequately address encryption and authentication • IEEE and Wi-Fi Alliance started working on comprehensive solutions • IEEE 802.11i and Wi-Fi Protected Access (WPA) • Foundations of today’s wireless security
WEP2 • Attempted to overcome WEP limitations by adding two new security enhancements • WEP key increased to 128 bits • Kerberos authentication • User issued “ticket” by Kerberos server • Presents ticket to network for a service • Used to authenticate user • No more secure than WEP • Collisions still occur • New dictionary-based attacks available
WEP2 Security Analysis • IV (key) reuse • Larger IV, re-key support makes unintentional reuse much less likely • Without IV replay protection, intentional reuse still possible • Dictionary attack • New vulnerabilities introduced by mandatory KerberosV authentication • Realtime decryption • Much more difficult due to larger IV • 2^128 * 1500 octets = 5.1E32 GB
WEP Cracking • To crack the WEP key for an access point, we need to gather lots of initialization vectors (IVs). • Normal network traffic does not typically generate these IVs very quickly. Theoretically, if you are patient, you can gather sufficient IVs to crack the WEP key by simply listening to the network traffic and saving them. • Since none of us are patient, we use a technique called injection to speed up the process. Injection involves having the access point (AP) resend selected packets over and over very rapidly. This allows us to capture a large number of IVs in a short period of time.
Labs • 8-1,8-2 and 8-3 of the text book