Emory Network Communications Wireless Security In an Education Environment Stan Brooks CWNA, CWSP Emory University Network Communications Division [email protected] AIM-Y!-MSN: WLANstan Copyright Stan Brooks 2007.
Download
Report
Transcript Emory Network Communications Wireless Security In an Education Environment Stan Brooks CWNA, CWSP Emory University Network Communications Division [email protected] AIM-Y!-MSN: WLANstan Copyright Stan Brooks 2007.
Emory
Network Communications
Wireless
Security
In an Education
Environment
Stan Brooks CWNA, CWSP
Emory University
Network Communications Division
[email protected]
AIM-Y!-MSN: WLANstan
Copyright Stan Brooks 2007. This work is the intellectual property of the author. Permission is granted for this
material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on
the reproduced materials and notice is given that the copying is by permission of the author. To disseminate
otherwise or to republish requires written permission from the author.
Emory
Network Communications
Outline
What this presentation will not cover
Not a how-to hacking/cracking course
Not a wireless basics discussion
Not a deep dive on WLAN protocols
Wireless Security
Why do we need security on wireless networks?
Wireless Security Basics
Wireless Security History
Choosing a Wireless Security Model
Implementing Wireless Security
Migrating Security Models – A real-life story
Protecting yourself – Safe Wireless Computing
At Wi-Fi Hotspots and at Home
Emory
Network Communications
Why Do We Need Security on WLANs?
Internet
Internal Network
“Real” Access Point
Rogue Access Point
X
“Real” Wireless User
Evil Twin/MitM
Access Point
Easy to eavesdrop (sniff)
Easy to spoof MAC addresses
Easy to hack/crack Pre-Shared
Keys (WEP, WPA-PSK)
Rogue APs
Evil Twin & Man-in-the-Middle
(MitM) Attacks
Last 100 feet is the worst of all
Much less secure than even wired
Internet access
There is good news – Wireless
CAN be more secure than the
wired network (if implemented
properly)
Emory
Network Communications
Wireless Security – What do we Protect?
There 3 areas that need protection:
1) Protect data as it travels from
source to destination
Network
Eavesdropping
Integrity (tampering)
Denial of Service (DoS)
2) Protect the network from
unauthorized/compromised users
Rogue APs
Stolen/hacked credentials
Client remediation (NAC/NAP/etc.)
Access Point
3) Protect the client from
unauthorized access
MitM/Evil Twin and Ad Hoc attacks
Hacking open hard drive shares
Wireless User
Emory
Network Communications
Security
Security is a PROCESS
Apply Security in Layers
There is NO single security silver bullet
Different data require different levels of security
A Term Paper vs. Student Grades vs. Financial Aid Data vs.
Health Records
Different users need different levels of access
Student vs. Faculty vs. Guest Users
A Business Risk Assessment helps to define
requirements
Emory
Network Communications
Security Policy
Wireless Security SHOULD be part of your Overall
Security Policy
Acceptable Use Policy, Terms of Service (AUP/ToS)
Policy should address the 3 areas to protect outlined on a
previous slide
Role-based Access Control
All users are NOT created equal
Student vs. Faculty vs. Staff vs. Guest
All data are NOT created equal
Term papers vs. grade reports vs. medical records
Security Policy also defines how the network is accessed
Type of Hardware and what type of support
Supported OS’s
Access methods
Emory
Network Communications
AAA (or AAAA)
Originated with dial-up Internet and VPN access
RADIUS = Remote Dial-In User Service
Authentication (Username/Password)
Who are you?
Authorization (Are you a valid user/subscriber)
Are you allowed to log on the network?
Access Control (Added for RBAC & Wireless)
Where can you go once you are on the network?
(Accounting) – Originally the 3rd “A”
Logs
Billing
Tracking usage
For when the RIAA or MPAA comes around
Emory
Network Communications
Authentication in a Wireless Environment
Types of Wireless Security Models
Open System
Shared Key for Encryption & Authentication
Static Key (WEP, WPA / WPA2-PSK)
Dynamic Key (Dynamic WEP, WPA / WPA2-Enterprise)
Authentication Models
Open System
VPN
802.1x (WPA / WPA2 or wired) – Needs a RADIUS Server
Guest Access
Captive Portal, Walled Garden, Other
Emory
Network Communications
Wi-Fi Security Evolution
Authentication
SSID
Captive Portal
Requires a Webserver and
Easily hacked by
may compromise
children, no real security,
username/pw.
just a no-trespassing
Data encryption at the
sign
expense of authentication and
may requires client software
Encryption
WEP
VPN
802.1x
Uses EAP (EAP-TLS, EAPTTLS, PEAP, LEAP, etc.).
Requires a RADIUS Server.
Dynamic WEP is fairly secure,
TKIP is much better,
addressing all known issues
w/WEP
Dynamic WEP
TKIP
802.11i
(also called WPA2)
Combines 802.1x
Authentication (EAP-TLS,
EAP-TTLS, PEAP, LEAP,
etc.) with AES encryption
AES
Emory
Network Communications
WEP / WPA / WPA2 Basics
WEP
WPA-Personal
WPA-Enterprise
WPA2-Personal
WPA2-Enterprise
Encryption
RC4 w/WEP
24-bit IV
40/104-bit Key
RC4 w/TKIP
48-bit IV
128-bit Key
RC4 w/TKIP
48-bit IV
128-bit Key
AES-CCMP
48bit-IV
128bit Key
AES-CCMP
48bit-IV
128bit Key
Integrity
CRC
Michael
64-bit Key
Michael
64-bit Key
CBC-MAC
128-bit Key
CBC-MAC
128-bit Key
Authentication
Optional Shared
Key
PSK –
Pre-Shared Key
802.1x
Various EAP-Types
PSK –
Pre-Shared Key
802.1x
Various
EAP-Types
Ad-Hoc Support
Yes
No
No
Yes
No
Standard
Part of 802.11b
1999
Snapshot of 802.11i
As of 10/2002
Snapshot of 802.11i
As of 10/2002
Specified in 802.11i
Ratified 06/2004
Specified in 802.11i
Ratified 06/2004
Emory
Network Communications
WPA / WPA2 Enterprise (8021.x) Elements
Supplicant (the client)
Authentication Server (RADIUS server)
Authenticator (the AP or WLAN Controller)
Passes authentication transaction between the Supplicant and the
Authentication Server
Network
Authenticator
(Access Point)
Supplicant
(Client)
Authentication
Server (RADIUS)
Emory
Network Communications
WPA / WPA2-Enterprise EAP-Types
Source
Client
Server Auth
Client Auth
Vulnerability
Level
Vulnerability
Examples
EAP-MD5
Open – NOT Wi-Fi
Certified
Aegis, Odyssey
Shared Key Challenge NO KEY DERIVATION
None
Extremely High
Offline Dictionary
Attacks
LEAP
Cisco Proprietary,
NOT Wi-Fi Certified
Cisco (CCX), Aegis,
Odyssey
Password Hash
Password Hash
High
ASLEAP – Identity
Exposure & Offline
Dictionary PW
Attacks
EAP-FAST
Cisco Proprietary,
NOT Wi-Fi Certified
Odyssey
PAC (Shared Key)
MSCHAPv2
Medium
PAC Exposure
TLS
Open, Wi-Fi Certified
Aegis, Odyssey
Certificate (PKI)
Certificate (PKI)
Low
Lost or Stolen
Devices
TTLS (PAP,
CHAP,
MSCHAPv2,
or GTC)
Open, Wi-Fi Certified
Aegis, Odyssey, TMobile Conn Mgr
(PCTEL)
Certificate
PAP, CHAP,
MSCHAPv2, GTC
Medium
Possible Identity
Exposure, MitM
Risks
PEAPv0 (TLS
or
MSCHAPv2)
Microsoft – Wi-Fi
Certified
Microsoft WZC,
Apple, Aegis,
Odyssey
Certificate
EAP-TLS
(SmartCard),
MSCHAPv2
Medium
Possible Identity
Exposure, MitM
Risks
Cisco, Aegis,
Odyssey
Certificate
EAP-GTC (Generic
Token Card)
Medium
Possible Identity
Exposure, MitM
Risks
SmartCard
SmartCard
Medium
GSM/GPRS Attacks
PEAPv1 (EAP- Cisco – Wi-Fi Certified
GTC)
EAP-SIM
GSM Wireless Carriers Odyssey
– Wi-Fi Certified
Note: Aegis Client by Meetinghouse, Odyssey Client by Funk/Juniper Networks
Emory
Network Communications
Choosing the Right EAP-type
What EAP-types does your client base support?
Homogeneous or heterogeneous environment
Machine or user authentication – or both?
Do you control the clients?
Do you support PKI?
What clients are you willing to support, and at what level?
What EAP-Types does your authentication server(s) support?
RADIUS server supported EAP-types
RADIUS proxy capabilities to your back-end credential base
Back-end directory/database capabilities
How are passwords stored?
Proxy capabilities
Back-end directory rights
Emory
Network Communications
Wireless Clients
PCs
Microsoft Windows XP WZC
Wireless chip manufacturers’ clients
Atheros
Intel
Broadcom
Prism
Open Source
SecureW2
wEAP
Funk/Juniper Odyssey
Meetinghouse/Cisco Aegis
VPN Clients
Microsoft
PPTP, IPSec
Checkpoint
Others
MACs
Linux
PDAs
wpa_supplicant
Xsupplicant
Native OS support
Funk/Juniper Odyssey
Meetinghouse/Cisco Aegis
Wi-Fi & Dual Mode Phones
Other Devices
Game Consoles
TiVo
Appliances
Nabaztag Wi-Fi Rabbit
Emory
Network Communications
Implementing a Secure Wireless
Infrastructure
Basic Tenet: Wireless network should be
considered UNTRUSTED
Wireless traffic should be scrutinized and controlled just like
Internet traffic, perhaps more so.
Difficult to build & scale an effective secure architecture
with stand-alone APs
Expanding VLANs across the campus
Backhauling wireless traffic to a firewall or wireless gateway
Managing APs, switches, & routers
I’m an unabashed WLAN Switch/Controller proponent
Much easier to implement security model(s)
Easier to deploy, manage, & troubleshoot
Emory
Network Communications
Aruba WLAN Switch/Controller-based Implementation
The AP attaches to network infrastructure and gets its configuration from the Aruba WLAN
switch/controller
The AP builds tunnel to the Aruba WLAN switch/controller
An Authenticated user associates to AP; all traffic is tunneled to controller where it is scrutinized and
passed or blocked to various destinations including the Internet
A Guest user associates to AP; all traffic is tunneled to controller, scrutinized and forwarded to the
Internet as policy dictates
Using a centralized controller gives a single point of ingress and control for wireless traffic on the
wired network
Emory’s Internal Network
Authenticated User
SSID: EmoryUnplugged
“Thin” Access Point
Guest User
SSID: EmoryGuest
Aruba WLAN Switch/Controller
w/ Built in Firewall and
Per User Access Control
Internet
Emory
Network Communications
Migrating to “New” Security Models
Some History
Emory originally settled on an Open System/VPN
authentication/access Model in 2004
As we grew, VPN was OK, but not great
The user experience with the VPN was sub-optimal
Directive to move to WPA-Enterprise given Spring
2006
Directive for completion by January 1, 2007
Emory
Network Communications
Changing Security Models
Least impact on clients
Clients DO have to change
Plan a transition period
Longer (with in reason) is better
A natural calendar break is ideal for cut-over
Emory used Winter Break ‘06 as the cut-over
Run both models for the transition period
Market, market, market the change and why it’s
better
Emory
Network Communications
Poster Example
Emory
Network Communications
Poster/Ad Example
Emory
Network Communications
Emory’s Transition Timeline
Fall 2005 – Started piloting new model
Developed configuration handouts and tools
January 2006 – Started officially supporting new model
Spring Semester 2006 (Jan-May)
Marketed change (posters, student newspaper ads)
Held clinics to get users transitioned
End of semester – Email blast informing students of impending change in Fall
2006
Fall Semester 2006 (Sept-Dec)
Removed old security model from ResNet areas
Move in weekend required lots of hands on configuration help for students
Held additional configuration clinics in high use areas
Mid & Late Semester – Email blasts to know users of old security model informing
them of model “sunset”
Winter Break 2006 – Removed old security model access globally
Result: No logged complaints
Emory
Network Communications
VPN Usage Graph
Oct 2005 to Feb 2007
Thanksgiving 2005
Winter Break 2005
Spring Break 2006
Summer Break 2006
Move-in Weekend 2006
Thanksgiving 2006
Winter Break 2006
Emory
Network Communications
Wireless Security – Protecting Yourself
Internet
“Real” Access Point
“Real” Wireless User
There 3 main areas to
address:
1) Protect data as it travels
from source to destination
2) Protect the client from
unauthorized access
3) Protect the network from
unauthorized/compromised
users
Emory
Network Communications
Safe HotSpot Wireless Computing
Assume the network connection is HOSTILE - practice safe computing!
Enable/use Personal Firewalls
Configure your Wireless Client
Properly configured for “Internet” or untrusted connection
Do NOT connect to non-preferred wireless networks
Do NOT automatically connect to an open wireless network – Set client to ask you (On
Demand/Manual)
No Ad-Hoc Networks (Ad-Hoc networks are REALLY BAD)
Encrypt your traffic
WPA / WPA2-Enterprise (probably not available at hotspots)
VPNs
Your organization’s VPN – PPTP, IPSec, or SSL VPNs
Public VPN Gateways such as
Hotspotvpn.com
Publicvpn.com
JiWire.com
SpotLock
Remember: HTTP, POP3, IMAP, FTP, Telnet and other protocols send credentials and data as
clear text, so encrypt to be safe!
Emory
Network Communications
Safe SOHO Wireless Computing
On your clients:
Do NOT connect to non-preferred wireless networks
No Ad-Hoc Networks (Ad-Hoc networks are REALLY BAD)
On your router:
Please. Please, Please - Change your router’s default configuration
CHANGE THE PASSWORD FROM THE DEFAULT
Change the SSID from the default
Choose an SSID that does not identify you or your geographic location
Set the channel to 1, 6, or 11 to reduce interference
Read the directions and set up WPA-PSK or WPA2-PSK
Choose a difficult to guess and long (32+ character) passphrase that has
upper/lower case, numbers, and punctuation.
Example: “Emory\University/Rox*My<2>smallW0RLD!!!Yeah!”
WPA-PSK can be subject to dictionary attacks, so misspelled words,
added punctuation and longer keys will help mitigate this type of attack –
just make it easy for YOU to remember
Emory
Network Communications
Recap
Why we need security for wireless networks
Different security models
Strengths & weaknesses
Implementation
Migrating to a New Security Model
Basic wireless security methods for home and
hotspots
Emory
Network Communications
Wireless Security
In an Education Environment
Presentation Evaluation URL: http://resnetsymposium.org/resnet2007/
Questions
& Discussion
Emory
Network Communications
Bibliography & Resources
CWNP –Certified Wireless Network Professional Program
Best program for learning ALL about WLANs
Books
Real 802.11 Security, Wi-Foo, CWNA/CWSP/CWAP Study
Guides, Hacking Wireless Networks for Dummies
Websites
cwnp.com, wi-fiplanet.com and others (hit the forums for good
information)
Manufacturers
Cisco, Aruba, Meru, Trapeze