SuxNet - Implementation of Secure Authentication for WLAN

Similar documents
Securing Wireless Networks by By Joe Klemencic Mon. Apr

Securing Wireless LANs with Certificate Services

Wireless LAN Security (RM12/2002)

Wireless Attacks and Countermeasures

Wireless LAN Security. Gabriel Clothier

FAQ on Cisco Aironet Wireless Security

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. June 18, 2015

Chapter 2. Switch Concepts and Configuration. Part II

Radius, LDAP, Radius, Kerberos used in Authenticating Users

IEEE 802.1x, RADIUS AND DYNAMIC VLAN ASSIGNMENT

Network Integration Guide Planning

Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536)

CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS

Standard For IIUM Wireless Networking

Wireless Network Security

Network Security and Cryptography. 2 September Marking Scheme

Children s Health System. Remote User Policy

How Insecure is Wireless LAN?

Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.

D. The bank s web server is using an X.509 certificate that is not signed by a root CA, causing the user ID and password to be sent unencrypted.

WPA SECURITY (Wi-Fi Protected Access) Presentation. Douglas Cheathem (csc Spring 2007)

Configuring Port-Based and Client-Based Access Control (802.1X)

CTS2134 Introduction to Networking. Module 08: Network Security

NETWORK SECURITY. Ch. 3: Network Attacks

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis

Wireless Network Security

Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks

Vendor: HP. Exam Code: HP2-Z32. Exam Name: Implementing HP MSM Wireless Networks. Version: Demo

A Framework for Optimizing IP over Ethernet Naming System

RADIUS Configuration Note WINS : Wireless Interoperability & Network Solutions

Security Setup CHAPTER

Linux Network Administration

The 8 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21st CENTURY Braşov, November 14 th 2013

Wireless Network Security Fundamentals and Technologies

Secure Initial Access Authentication in WLAN

Securing a Wireless LAN

Operation Manual Security. Table of Contents

EV CHARGING: MAPPING OUT THE CYBER SECURITY THREATS AND SOLUTIONS FOR GRIDS AND CHARGING INFRASTRUCTURE

PROTECTED EXTENSIBLE AUTHENTICATION PROTOCOL

CtrlS Datacenters Placement Questions And Answers

AN IPSWITCH WHITEPAPER. The Definitive Guide to Secure FTP

Security SSID Selection: Broadcast SSID:

Information Technology Policy Board Members. SUBJECT: Update to County WAN/LAN Wireless Standards

Cross-organisational roaming on wireless LANs based on the 802.1X framework Author:

Content 1 OVERVIEW HARDWARE DESCRIPTION HARDWARE INSTALLATION PC CONFIGURATION GUIDE... 5 WEB-BASED MANAGEMENT GUIDE...

WL-5420AP. User s Guide

Ethical Hacking and Countermeasures: Web Applications, Second Edition. Chapter 3 Web Application Vulnerabilities

IP806GA/GB Wireless ADSL Router

802.11a g Dual Band Wireless Access Point. User s Manual

firewalls perimeter firewall systems firewalls security gateways secure Internet gateways

Xceedium Xio Framework: Securing Remote Out-of-band Access

User Guide IP Connect CSD

WLAN Security Performance Study

Csci388. Wireless and Mobile Security Access Control: 802.1X, EAP, and RADIUS. Importance of Access Control. WEP Weakness. Wi-Fi and IEEE 802.

Step-by-Step Configuration

Drone /12/2018. Threat Model. Description. Threats. Threat Source Risk Status Date Created

Configuring Request Authentication and Authorization

Procedure: You can find the problem sheet on the Desktop of the lab PCs.

CENTRAL AUTHENTICATION USING RADIUS AND 802.1X

Detecting MAC Spoofing Using ForeScout CounterACT

Remote Desktop Security for the SMB

Today s challenge on Wireless Networking. David Leung, CISM Solution Consultant, Security Datacraft China/Hong Kong Ltd.

Light Mesh AP. User s Guide. 2009/2/20 v1.0 draft

Wireless technology Principles of Security

Agile Controller-Campus V100R002C10. Permission Control Technical White Paper. Issue 01. Date HUAWEI TECHNOLOGIES CO., LTD.

Frequently Asked Questions WPA2 Vulnerability (KRACK)

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials

Wireless# Guide to Wireless Communications. Objectives

Chapter 5 Local Area Networks. Computer Concepts 2013

CHAPTER 7 ADVANCED ADMINISTRATION PC

EAPeak - Wireless 802.1X EAP Identification and Foot Printing Tool. Matt Neely and Spencer McIntyre

Basic Wireless Settings on the CVR100W VPN Router

Exam : JK Title : CompTIA E2C Security+ (2008 Edition) Exam. Version : Demo

The following chart provides the breakdown of exam as to the weight of each section of the exam.

Two-factor Authentication: A Tokenless Approach

TECHNICAL NOTE MSM & CLEARPASS HOW TO CONFIGURE HPE MSM CONTROLLERS WITH ARUBA CLEARPASS VERSION 3, JUNE 2016

BreezeACCESS VL Security

Step-by-Step Configuration

CISNTWK-440. Chapter 4 Network Vulnerabilities and Attacks

Indicate whether the statement is true or false.

01/02/2014 SECURITY ASSESSMENT METHODOLOGIES SENSEPOST 2014 ALL RIGHTS RESERVED

Why Firewalls? Firewall Characteristics

Step-by-Step Configuration

Chapter 24 Wireless Network Security

Man in the middle. Bởi: Hung Tran

Recommendations for Device Provisioning Security

Appendix E Wireless Networking Basics

Attacking Networks. Joshua Wright LightReading LIVE! October 1, 2003

Securing CS-MARS C H A P T E R

TopGlobal MB8000 Hotspots Solution

Chapter Three test. CompTIA Security+ SYO-401: Read each question carefully and select the best answer by circling it.

Achieving End-to-End Security in the Internet of Things (IoT)

Interworking Evaluation of current security mechanisms and lacks in wireless and Bluetooth networks ...

Wireless Security and Monitoring. Training materials for wireless trainers

Bank Infrastructure - Video - 1

Authentication Methods

Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy

Authentication Security

Global Information Assurance Certification Paper

Exam : Title : Security Solutions for Systems Engineers. Version : Demo

Transcription:

Blekinge Institute of Technology Research Report No 2003:03 SuxNet - Implementation of Secure Authentication for WLAN Björn Mårtensson Stefan Chevul Håkan Järnliden Henric Johnson Arne Nilsson Editor: Adrian Popescu Department of Telecommunications and Signal Processing Blekinge Institute of Technology

SuxNet Implementation of Secure Authentication for WLAN Björn Mårtensson 1, Stefan Chevul 2, Håkan Järnliden 1, Henric Johnson 2, Arne Nilsson 3 Blekinge Institute of Technology, SE-371 79, Karlskrona, Sweden 1 {td99bma, t99hja}@student.bth.se {stefan.chevul, henric.johnson, arne.nilsson}@bth.se 2 Abstract. Wireless network equipment offers great flexibility for mobile as well as stationary computers. Clients are no longer bound by the length of a network cable. Instead wireless connectivity increases the clients mobility. This paper describes an implementation for wireless clients to access a wired computer network through an efficient authentication mechanism. The implementation is called SuxNet, and is a contribution to IP-login [8] and Institute of Electrical and Electronics Engineers (IEEE) 802.1x [3]. The paper also explains and evaluates different security concepts such as Wired Equivalent Privacy (WEP) and IEEE 802.1x. 1 Introduction During the recent years, the market for wireless communication has enjoyed a tremendous growth. Wireless technology is now capable of reaching virtually every location on the face of the earth. The major motivation and benefits from wireless networks are increased mobility. There are however, a number of issues that anyone deploying a wireless network needs to be aware of. One such issue is security. The radio waves used in wireless networking typically penetrate outside the building, creating a genuine risk that the network can be hacked from the parking lot or street. Another aspect is to make the connectivity to the network as transparent as possible to the user. The connection and authentication phase should be a painless procedure, both for user and for administrator, without sacrificing security. The users should be able to connect to the wireless network and work as efficiently as they would at a wired workstation. The purpose of the paper is to develop a secure method of connecting wireless clients to a wired network. For this purpose a secure gateway was developed. Attack indication, trend analysis and performance analysis have also been considered in this context.

2 Network Security We define Network Security as: The protection of networks and their services from unauthorized modification, destruction or disclosure. Network security provides assurance that the network performs its critical functions correctly and there are no harmful side-effects. 2.1 Security Concepts Wireless and Wired network security consists of primarily two aspects, encryption and authentication/authorization. Encryption is the process of scrambling a message so that only the intended recipients can understand it. Authentication/authorization is the process of ensuring that a user and his device have authorized access to the network. 2.1.1 Encryption techniques During the past years, wireless communication has become very popular. The inherent broadcast natures of wireless transmission means that new security methods must be introduced to counter the relative ease of eavesdrop on wireless data. Many companies have become increasingly concerned about the vulnerabilities of the Wired Equivalent Privacy (WEP); therefore more secure and reliable protocols such as Extensible Authentication Protocol (EAP) [1] have been developed. 2.1.1.1 WEP and its vulnerabilities A short time after the WEP was developed, its cryptographic weaknesses were revealed [7]. A sequence of independent studies from various places found out that even when WEP was enabled, it was still easy to breach Wireless Local Area Network (WLAN) security. A person that has access to the right equipment and tools can collect and analyze enough data to pick up the encryption key [9]. Although such security breaches may take much longer on a home or small business WLAN, where traffic is low, it can be done in a few hours on a busy business network. Despite its imperfection, WEP can provide some small margin of security compared with no protection at all and remains valuable for the ordinary home user for the purpose of deflecting eavesdroppers. For huge enterprise users, the WEP security can be improved when deploying it in conjunction with other security technologies such as Virtual Private Networks (VPN) [2] or 802.1x [3] authentication with the use of dynamic WEP keys.

2.1.1.2 The Extensible Authentication Protocol - EAP When the IEEE Task Group I learned about the flaws of WEP, they had to come up with a new solution and that would come to be based on 802.1x and EAP. A standard for Port Based Access Control for both wired and wireless networking, however 802.1x will not in itself make wireless networking secure. If one combines 802.1x with the EAP standard, then the problem with WEP re-keying is solved. EAP is a general protocol for authentication which has support for multiple authentication mechanisms. EAP is used on dedicated links, switched circuits, wired and wireless links. The advantage of the EAP protocol is that it offers great flexibility. It is used to choose a particular authentication method; normally this is done after the authenticator (i.e. a client to an authentication server) has requested more information so that he can determine the specific authentication mechanism that should be used. EAP allows the use of a backend server to implement just a few or all authentications methods. The authenticator will act as a pass-through mechanism for some or all methods and users. When the client wants to make a connection to the access point, it is in unauthorized state and does not have an IP address. This way it is impossible for it to get access to the network. The client will only be able to send 802.1x messages. Between the client and the Access Point (AP), user credentials are transmitted with EAP, the AP will now forward this information to the RADIUS server for approval. If the client fulfills the qualifications, then the client will ask for identification information from the authenticator with 802.1x and EAP. When this is done, the authentication server will hand out a temporary WEP key and the AP will allow the WEP session to be established for the client. Because this key is only temporary, it will have to be renewed and the procedure will have to start over again. After this process, the keys can be managed and delivered in a secure way. The keys will be unique for every user and sessions. Because an intruder needs to collect a certain amount of data to break the WEP, fast re-keying is needed to prevent the intruder to collect enough data. Advantages The EAP protocol can support multiple authentication mechanism without having pre-negotiated a particular one. Devices such as a Network Access Server (NAS), switch or access point do not have to understand each authentication method, they will instead act as a pass-through manager for a backend authentication server. Disadvantages Older devices in the field do not include support for EAP. To be able to use EAP fully, it is necessary for every device to support 802.1x. The replacement and reconfiguration of networks could be costly.

2.1.2 Authentication Servers An Authentication server allows users to be validated for the use of network resources. 2.1.2.1 Radius RADIUS [4] is a distributed client/server system and stands for Remote Authentication Dial-in User Service (RADIUS). It acts as a security mechanism so that only authorized clients may access the network. Figure 1 shows a stylistic view of client authentication using RADIUS. A server that has support for the RADIUS protocol is usually called a RADIUS Server. The NAS, in this case, acts like a client to the RADIUS server. It will send information about the user to the RADIUS server and it will act on the answer it gets back from the RADIUS server. The request that the NAS does, is called an authentication request. Figure 1: Authentication using RADIUS If the user is authenticated, the server will send back information to the NAS so that it may provide the proper service for the user. Information gathering is part of the RADIUS protocol, and it will be sent back to the NAS so that it can be used for accounting and providing a picture of the network activity. The RADIUS client also sends information to the RADIUS server when the user logs on and logs off. A procedure called accounting-request takes place when the client makes requests to the server that it should record logon/logoff and other user information. Another function that the RADIUS server can perform is authorization on such items as the user s telephone number.

2.1.2.2 Internet Authentication Service and Active Directory Active Directory (AD) [6] provides a single point of management for Windowsbased user accounts, clients, servers, and applications. AD also helps organizations integrate non Windows systems with Windows-based applications, and Windows-compatible devices. The AD server does not have the mechanics to communicate using the RADIUS protocol, but the Internet Authentication Service (IAS) acts as a bridge, processing authentication requests and verifying the users against the AD server. 3 Contribution - SuxNet In 1997 the IEEE 802.11 wireless standard specified both an authentication service and encryption protocol. This standard has proven [7] to be flawed, leaving wireless communication insecure and vulnerable to attack. The new IEEE 802.1x was supposed to remedy these flaws, but even this standard has shown to be susceptive to both active and passive attacks. SuxNet, in its current state, does not provide encryption, just an efficient authentication and accounting service. 3.1 The 802.1x standard The IEEE 802.1x standard is a port based authentication protocol. It provides an authentication framework for wireless LANs, allowing a user to be authenticated by a central authority. The actual algorithm that is used to determine whether a user is authentic is left open and multiple algorithms are possible. Figure 2 describes the components of the 802.1x mechanism. IEEE 802.1x comprises of three entities: 1. Supplicant/Port Access Entity Client 2. Authenticator - Access Point 3. Authentication Server Access Database

Figure 2: Description of 802.1x Initial 802.1X communications begins with an unauthenticated supplicant attempting to connect with an authenticator. The AP responds by enabling a port forwarding only EAP packets from the client to an authentication server located on the wired side of the access point. The access point blocks all other traffic, such as Hyper Text Transfer Protocol (HTTP), Dynamic Host Configuration Protocol (DHCP), and Post Office Protocol 3 (POP3) packets, until the access point can verify the client's identity using an authentication server. Once authenticated, the access point opens the client's port for other types of traffic. 3.2 SuxNet SuxNet is based on the Swedish Nomad [8] project developed at Statens Lantbruksuniversitet (SLU). How does 802.1x apply to SuxNet? SuxNet also utilizes the same three entities, and the added Accounting service. This keeps track of failed login attempts, creating a buffer against brute-force or Denial of Service (DoS) type attacks against the authentication server. Before sending a request to the Authentication server, the Accounting service verifies that the user has not failed to log-on too many times. If so, the authentication service will be denied to that specific user. Figure 3 shows the components of the SuxNet mechanism. The authenticator uses RADIUS EAP in communicating with the Authentication server. This results in the user-name being sent in clear-text while the password is encrypted. SuxNet implementation of the 802.1x s three entities: 1. Supplicant Client 2. Authenticator/Accounting Server - Access Point 3. Authentication Server RADIUS(IAS) / AD

Figure 3: 802.1x and SuxNet SuxNet communications begins with an unauthenticated supplicant attempting connection to an authenticator. The access point responds by verifying that the user is not locked out, and then resumes normal 802.1x authentication mode. 3.2.1 A SuxNet transaction The following section describes the traffic flow of a sucessful SuxNet transaction. See Figure 4. 1. A mobile client connects to the wireless LAN and starts a web browser. The client has already negotiated an IP address with the DHCP server on the gateway. The IPTABLES rules on the gateway redirects any web request to an SSL enabled login page on the gateway. This makes remembering the address of the login page obsolete and eliminates the need to inform the wireless clients of address changes. 2. The login page prompts the client for the user name and password to use with this session. Meanwhile, the MAC and IP address of the client is collected, using the ARP table, for later use in the process. 3. When the IP-login-cgi script receives the reply, it then verifies that the request came in the right form, a web POST, and contained all the variables needed to complete the transaction. 4. The script then contacts the Account server to validate that the user specified is not locked-out of the authentication service. The user can be locked-out in two ways; either by submitting the wrong username/password combination three times, or by the lock-out command issued by the administrator. The first lock-out is reset after one minute, but the second can only be revoked by the administrator.

5. If the user is not locked-out, the user is validated to use the authentication service. 6. The script then contacts the authentication server with the username/password combination. 7. The authentication server checks the submitted username/password combination against the systems user database. If the combination correlates to a post in the database, the server returns a message verifying that the user is indeed who he claims to be and that he is allowed to use the SuxNet service. 8. The script then contacts the Account server again asking it to record a login for the specified user. 9. The Account server records the username, MAC address and time/date of the login and returns a confirmation that the record has been made. 10. The script then starts the IP-login daemon for the specified IP address, and the daemon monitors it with ARP requests. The firewall is then instructed to MASQUERADE the specified IP address through the gateway. The client is now able, under the restrictions of the firewall, to communicate with the wired network. 11. When the client disconnects from the network, the IP-login daemon detects this when the ARP request does generate a correct response. 12. The Account server is contacted, and asked to record a logout for that specified user. 13. The Account server records the time/date of the logout and returns a confirmation that the record has been made. 14. The firewall rules are reset for the specified IP address. It will also stop the ARP monitor for that IP address.

Figur 4: A complete SuxNet transaction 3.3 Proposed network The same level of service and access as the wired network cannot be expected of the wireless. It is under greater threat of exposure to the outside world and must thereby be kept under stricter surveillance. The users will be masqueraded through the wireless-to-wired gateway, meaning that they can not host any activity that requires users outside the wireless network to connect to them, i.e. running different servers such as FTP. All access will be regulated by IPTABLES rules on the gateway, making it easy for the administrator to manage access for all or for individual users.

Suggested ports and services for outgoing traffic from the wireless network are as follows: 21 FTP 22 SSH 25 SMTP 53 DNS 80 HTTP 110 POP3 137-139 SAMBA 143 IMAP 443 HTTPS 993 IMAPS Connecting to services considered unproductive or non-standard are usually done on higher value ports, above 1024. Among these are ICQ on port 4000, multimedia services, non-standard HTTP sometimes on port 8000/8080, and FTP servers running on any given port. Special consideration can be made to accommodate users needing to access these services. Figure 5 shows the proposed network. With an internal network for wireless clients, that connects to the external, wired, network through a Network Access Server (NAS). The external network connects to the Internet via a gateway. Figur 5: Proposed network layout 3.4 Implemented network Compact Linux distributions are well suited with regard to both security and performance. The CRUX [5] distribution was chosen for the implementation of the secure gateway. CRUX is an optimized Linux distribution. It contains a small collection of trimmed packages. A secure high performance server should not contain any unnecessary packages.

3.4.1 The Secure gateway The following services are used on the gateway to provide a SuxNet transaction: DHCP server Secure Socket Layer (SSL) enabled Apache Web server MySql database server RADIUS Accounting IPTABLES 3.4.2 Accounting server A simple accounting program is required to keep track of failed authentication attempts and the timestamps of logins/logouts. The program works in conjunction with the authentication system to relieve the authentication server of multiple failed requests from a certain user. It tells the authentication system whether or not a user is locked out of the authentication process. It also uses own lock-out principle based on the username. However, this does not block a machine from trying multiple usernames. 4 Conclusion and future work In this paper an efficient authentication mechanism for WLAN is presented. SuxNet delivers a secure way of connecting wireless clients to a wired network through a user based authentication process. While reviewing SuxNet, a couple of potential concerns that will be addressed in future work, were discovered. The main thing to consider is the possibility of session high jacking as a result of the session handling scheme of SuxNet. After the authentication process, a host might be disassociated from the network and another host spoofing the other hosts identity without SuxNet realizing it. As long as the new host stays on the network it will be able to use the resources allocated to the authenticated user. A method for mutual authentication is also needed to ensure confidence that data such as user credentials and requests are not intercepted or manipulated by a foreign host. It is possible that a man-in-the-middle attack might compromise the entire authentication system by impersonating the authentication server. A framework for attack indication, trend and performance analysis will be developed as part of future work. This will provide an important tool and information for WLAN deployers.

References 1. L. Blunk, J. Vollbrecht: Extensible Autentication Protocol, RFC 2284, March 1998 2. B. Gleeson, A. Lin, J. Heinanen, G. Armitage, A. Malis: A Framework for IP Based Virtual Private Networks, RFC 2764, February 2000 3. IEEE 802.1x: http://standards.ieee.org/getieee802/download/802.1x-2001.pdf 4. C. Rigney, A. Rubens, W. Simpson, S. Willens: Remote Autentication Dial In User Service, RFC 2058, January 1997 5. Crux Project: http://www.crux.nu 6. Active Directory http://www.microsoft.com/windows2000/technologies/directory/ad/default.asp 7. Nikita Borisov, Ian Goldberg, and David Wagner: Intercepting mobile communications: The insecurity of 802.11, In Conference on Mobile Computing and Networking (MOBICOM'01), July16-21, 2001 8. Robert Olsson, Olof Welin-Berger, Tom Karlsson and Carl-Erik Lundgren: Nomad Project, SLU http://robur.slu.se/ip-login/ 9. W. A. Arbaugh. An inductive chosen plaintext attack against WETP/WEP2. IEEE Document 802.11-01/230, May 2001

SuxNet - Implementation of Secure Authentication for WLAN Björn Mårtensson, Stefan Chevul, Håkan Järnliden, Henric Johnson, Arne Nilsson. Editor: Adrian Popescu ISSN 1103-1581 ISRN BTH-RES--03/03--SE Copyright 2003 by the individual authors All rights reserved Printed by Kaserntryckeriet, Karlskrona 2003