Wireless Network Security. Read Chapter 24.

Download Report

Transcript Wireless Network Security. Read Chapter 24.

Wireless Security
Chapter 24 Wireless Network
Security
Objectives
The student shall be able to:
• Define the main function of the IEEE standards: 802.11a, 802.11b,
802.11g, 802.11i, 802.11n
• Define Access Point, BSS, ESS, WEP, WPA2
• Describe how a man-in-the-middle attack could occur within a wireless
network, and how sniffing could be used by an attacker.
• Define 3 main protections for WLAN protocol configurations.
• Define 3 additional protections that will help safeguard an access point or
station.
• Define the purposes of the phases of WLAN connections: discovery,
authentication, key exchange, protected data transfer.
IEEE 802.11 - WIFI
802.11a - Wireless network bearer operating in the 5 GHz ISM band with data rate up to 54 Mbps
802.11b - Wireless network bearer operating in the 2.4 GHz ISM band with data rates up to 11 Mbps
802.11e - Quality of service and prioritisation
802.11f - Handover
802.11g - Wireless network bearer operating in 2.4 GHz ISM band with data rates up to 54 Mbps
802.11h - Power control
802.11i - Authentication and encryption
802.11j - Interworking
802.11k - Measurement reporting
802.11n - Wireless network bearer operating in the 2.4 and 5 GHz ISM bands with data rates up to
600 Mbps
802.11s - Mesh networking
802.11ac - Wireless network bearer operating below 6GHz to provide data rates of at least 1Gbps per
second for multi-station operation and 500 Mbps on a single link
802.11ad - Wireless network bearer providing very high throughput at frequencies up to 60GHz
802.11af - Wi-Fi in TV spectrum white spaces (often called White-Fi)
Typical Configuration
Security Issues:
Shared Medium
Offsite access: War Driving
WIFI Protocol Stack
Physical Layer: Transmits bits
MAC Layer: Discards packets
received with errors
LLC Layer: An optional layer
retransmits if necessary
IEEE 802.11 Extended
Service Set
Access Point (AP):
• Provides access to the distribution
system
• Can serve as the coordination
function, which controls when
stations are permitted to transmit.
Basic Service Set (BSS): Set of stations
controlled by a single coordination
function (AP)
Extended Service Set (ESS): A set of 1
or more interconnected BSSs/LANs
that appear to the LLC as a single BSS.
Distribution System: A system which
internconnects a set of BSSs/LANs into
an ESS
Man-in-the-Middle Attack
10.1.1.1
10.1.1.3
(2) Login
(1) Login
(4) Password
(3) Password
10.1.1.2
Wireless Attacks
Eavesdrop Attacks
• Accidental Association:
Connecting through the
wrong Access Point
• Malicious Association:
Connecting through a
Spoofed Access Point
• Ad hoc Network:
Connecting through another
Station
Active Attacks
• Nontraditional Networks:
Other protocols (Bluetooth,
PDAs) may be insecure
• Identity Theft: Impersonation
of MAC address
• Denial of Service:
Bombarding a WLAN with
messages
• Network Injection: Attacker
inject packets to affect
connection or network
configuration
Securing Wireless Transmissions
• Hide Service Set Identifier (SSID)
– Do not broadcast SSID
– Assign cryptic name
• Reduce External Signal Strength
– Reduce power level
– Position AP in innermost building
– Use directional antennas
– Use signal-shielding techniques
• Encrypt all transmissions (WPA2 best)
MAC: Broadcast SSID
Secure Wireless AP
• Use Firewall
• Use Anti-virus/Anti-spyware software
• Change Router Standard Configuration
– Change default password
– Change default router identifier
• Configure for Specific MAC Addresses
– Harder but not impossible to break in
Secure Station
• Stolen Device
– Encrypt disk
– Backup data
• Malware – Malicious App
– Antivirus – Antispyware software
• Firewall
• Secure other interfaces (e.g., Bluetooth)
• Secure authentication
Insecure WEP Protocol
Problems:
All devices in a network
share a secret key
No mutual authentication
Key is static
Key is limited in size and
scope
Robust Security Network
Five 802.11i Phases
Discovery:
• AP & STA negotiate cipher suite and
authentication method
Authentication:
• AP & STA mutually authenticate
• Authentication: Can you prove you
are who you say you are?
Key Management:
• Keys are generated and distributed to
AP/STA.
Protected Data Transfer:
• Encrypted transmissions
Connection Termination:
• Secure connection torn down
Discovery Phase
Discovery Phase: Negotiation of:
• Encryption & Integrity Cipher
Suite
•
•
•
•
WEP
TKIP
CCMP
Vendor Specific
• Authentication & Key Mgmt
•
•
•
IEEE 802.1X
Pre-shared Key
Vendor-Specific
• Key management approach
Discovery Phase: 3 Stages
Network & Security Capability
Discovery:
• What device and security
capabilities exist?
• AP broadcasts Beacons to advertise
network & security policies
(Optional)
• STA sends Probe <-> and gets Probe
Response back
Open System Authentication
• STA & AP exchange identifiers
• Simple for backward compatibility
Association
• Agree on set of security capabilities
• Association Request (STA)
• Association Response (AP)
MAC:MAC:
Probe
Beacon
Request
w. Security
(w. Security)
MAC:
MAC: Probe
Probe Request
Request
MAC:
Probe
Probe
Response,
Response
Cont’d
cont’d
Probe
MAC: Response,
Probe Response
cont’dw.
w.Security
security
MAC: Authentication
MAC: Association Response
MAC: Ack (Negotiation)
Authentication Phase
Mutual authentication between an
STA and Authentication Server
Before Authentication:
Uncontrolled
• All packets go to the
Authentication Server
After Authentication: Controlled
• STA packets can go to other BSS
or DS.
Authentication Phase Stages
Connect to AS (Authentication
Server)
• STA -> AS: Connection Request
• AP acknowledges & forwards
request
EAP Exchange
• Extensive Authentication
Protocol (EAP)
•
IEEE 802.1X Port-Based
Network Access Control
• The STA and AS authentication
each other
Secure Key Delivery
• AS -> STA: Master Session Key
• Relies on EAP for secure
exchange
MAC: QoS Data
Key Management Phase:
Two Types of Keys
Pairwise Keys: Unicast(AP<->STA)
• Unique per STA
• Pre-Shared Key: Pre-shared before
transmission
• PTK = HMAC-SHA-1(PMK+MAC
Addresses[STA,AP]+nonce)
• Confirmation Key: Integrity &
Authenticity of control frames
• Encryption: Confidentiality of key
exchange
• Temporal key: Used for data
exchange
Group Keys: Multicast (AP<->STAs)
GTK changed when STA leaves network
Nonce: Time-related number prevents
replay
Key Management Phase
Unicast 4-Way Handshake:
STA
AP
EAPOL-key(Anonce, Unicast))
EAPOL-key(Snonce, Unicast, MIC)
(Both sides generate PTK from Anonce,
Snonce, MAC addresses, PMK)
EAPOL-key(Install PTK, Unicast, MIC))
EAPOL-Key(Unicast, MIC)
Group Key Distribution
EAPOL-key(GTK,MIC)
EAPOL-Key(MIC)
Notes
Anonce, Snonce: Timed values & Local MAC
Addresses
MIC=Message Integrity Code (HMAC-MD5 or
HMAC-SHA-1-128)
Data Transfer Phase
IEEE 802.11i
Temporal Key Integrity Protocol (TKIP)
• WEP-Compatible
• Message Integrity Code (MIC) = 64
bits
•
•
•
Calculated from MAC addresses +
data + key material
Data Confidentiality: Uses RC4 to
encrypt MPDU+MIC
Sequence number prevents replay
Counter Mode CBC MAC Protocol
(CCMP)
• Integrity: Cipher-block-chaining
Message Auth. Code (CBC-MAC)
• Confidentiality: AES CTR block
cipher mode.
MAC: DeAuthentication
Pseudo-Random Function
Generator
Used for
• Nonces
• Expand Pairwise keys
Generate IEEE 802.11i PRF(K,A,B,Len)
• K=Secret key
• A=connection-specific text string
(nonce or key expansion)
• B=data specific to each case
• Len=desired # pseudorandom bits
for output
• Counter I, incrementing
Summary
Protocol Design
• A set of authentication
mechanisms from bad to
good
• Negotiated security
• Mutual authentication
before service
• Session keys
• Integrity (MAC), Nonce
(Replay), Encryption
• Multicast keys possible
Good Practices
• Hidden identity
• Low Signal Strength
• Firewall
• Avoid default configuration
(password, id)
• Encrypt transmissions
• Encrypt mobile devices
• Antivirus/Antispyware S/W