CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis

Similar documents
Outline : Wireless Networks Lecture 10: Management. Management and Control Services : Infrastructure Reminder.

What is Eavedropping?

Wireless technology Principles of Security

Security in IEEE Networks

Wireless LAN Security. Gabriel Clothier

Wireless Network Security Spring 2015

CYBER ATTACKS EXPLAINED: WIRELESS ATTACKS

Lab Configure Enterprise Security on AP

Wireless Attacks and Countermeasures

05 - WLAN Encryption and Data Integrity Protocols

Wireless Network Security Spring 2016

How Insecure is Wireless LAN?

Appendix E Wireless Networking Basics

Securing Your Wireless LAN

FAQ on Cisco Aironet Wireless Security

Managing and Securing Computer Networks. Guy Leduc. Chapter 7: Securing LANs. Chapter goals: security in practice: Security in the data link layer

Wireless# Guide to Wireless Communications. Objectives

Frequently Asked Questions WPA2 Vulnerability (KRACK)

Security Setup CHAPTER

Wireless Security. Comp Sci 3600 Security. Attacks WEP WPA/WPA2. Authentication Encryption Vulnerabilities

Overview of Security

D. The bank s web server is using an X.509 certificate that is not signed by a root CA, causing the user ID and password to be sent unencrypted.

Securing a Wireless LAN

Security and Authentication for Wireless Networks

Presentation_ID. 2001, Cisco Systems, Inc. All rights reserved.

Configuring Cipher Suites and WEP

Configuring WEP and WEP Features

PROTECTED EXTENSIBLE AUTHENTICATION PROTOCOL

Configuring a VAP on the WAP351, WAP131, and WAP371

HW/Lab 4: IPSec and Wireless Security. CS 336/536: Computer Network Security DUE 11 am on 12/01/2014 (Monday)

Temporal Key Integrity Protocol: TKIP. Tim Fielder University of Tulsa Tulsa, Oklahoma

Wireless Security Security problems in Wireless Networks

Chapter 24 Wireless Network Security

Attacking Networks. Joshua Wright LightReading LIVE! October 1, 2003

The 8 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21st CENTURY Braşov, November 14 th 2013

Wireless Networking Basics. Ed Crowley

Wi-Fi Scanner. Glossary. LizardSystems

Wireless Security i. Lars Strand lars (at) unik no June 2004

Configuring Authentication Types

Configuring Layer2 Security

Interworking Evaluation of current security mechanisms and lacks in wireless and Bluetooth networks ...

TopGlobal MB8000 Hotspots Solution

Csci388. Wireless and Mobile Security Access Control: 802.1X, EAP, and RADIUS. Importance of Access Control. WEP Weakness. Wi-Fi and IEEE 802.

The following chart provides the breakdown of exam as to the weight of each section of the exam.

Princess Nora Bint Abdulrahman University College of computer and information sciences Networks department Networks Security (NET 536)

Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy

CITS3002 Networks and Security. The IEEE Wireless LAN protocol. 1 next CITS3002 help3002 CITS3002 schedule

Stream Ciphers. Stream Ciphers 1

WPA SECURITY (Wi-Fi Protected Access) Presentation. Douglas Cheathem (csc Spring 2007)

Summary on Crypto Primitives and Protocols

Wireless Network Security

LESSON 12: WI FI NETWORKS SECURITY

Lecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005

Physical and Link Layer Attacks

Wireless Security and Monitoring. Training materials for wireless trainers

CHAPTER SECURITY IN WIRELESS LOCAL AREA NETWORKS

Wireless Networks. Authors: Marius Popovici Daniel Crişan Zagham Abbas. Technical University of Cluj-Napoca Group Cluj-Napoca, 24 Nov.

Telecommunications 3 Module 6

CE Advanced Network Security Wireless Security

CSE 713: Wireless Networks Security Principles and Practices

Configuring the Client Adapter

Hacking Air Wireless State of the Nation. Presented By Adam Boileau

5 Tips to Fortify your Wireless Network

Network Security. Thierry Sans

COSC4377. Chapter 8 roadmap

Chapter 1 Describing Regulatory Compliance

CS 393/682 Network Security


Securing Wireless LANs with Certificate Services

Mobile Security Fall 2013

TestsDumps. Latest Test Dumps for IT Exam Certification

Configuring the Client Adapter through Windows CE.NET

A Configuration Protocol for Embedded Devices on Secure Wireless Networks

Network Encryption 3 4/20/17

Advanced Security and Mobile Networks

WPA Migration Mode: WEP is back to haunt you

Exam : PW Title : Certified wireless security professional(cwsp) Version : DEMO

Configuring Wireless Security Settings on the RV130W

WLAN Security. Dr. Siwaruk Siwamogsatham. ThaiCERT, NECTEC

Wireless LAN, WLAN Security, and VPN

How Secure is Wireless?

Security in Data Link Protocols

The Final Nail in WEP s Coffin

Procedure: You can find the problem sheet on the Desktop of the lab PCs.

Configuring the Client Adapter through the Windows XP Operating System

Chapter 5 Local Area Networks. Computer Concepts 2013

Burglarproof WEP Protocol on Wireless Infrastructure

Basic Wireless Settings on the CVR100W VPN Router

Multi-Layered Security Framework for Metro-Scale Wi-Fi Networks

WLAN Security. รศ. ดร. อน นต ผลเพ ม Asso. Prof. Anan Phonphoem, Ph.D.

CSNT 180 Wireless Networking. Chapter 7 WLAN Terminology and Technology

Wireless Network Security

CSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L

Cisco Exam Questions and Answers (PDF) Cisco Exam Questions BrainDumps

Vendor: HP. Exam Code: HP2-Z32. Exam Name: Implementing HP MSM Wireless Networks. Version: Demo

WarDriving. related fixed line attacks war dialing port scanning

Viewing Status and Statistics

Analyzing Wireless Security in Columbia, Missouri

Configuring a WLAN for Static WEP

Distributed Systems. Lecture 14: Security. Distributed Systems 1

Transcription:

CS-435 spring semester 2016 Network Technology & Programming Laboratory University of Crete Computer Science Department Stefanos Papadakis & Manolis Spanakis

CS-435 Lecture preview 802.11 Security IEEE 802.1X WEP, WPA

802.11 standards 802.11a 54 Mbps@5 Ghz Not interoperable with 802.11b Limited distance 802.11b 11 Mbps@2.4 Ghz Full speed up to 300 feet Coverage up to 1750 feet 802.11g 54 Mbps@2.4 Ghz Same range as 802.11b Backward-compatible with 802.11b Speeds slower in dual-mode

802.11 standards (cont.) 802.11e QoS Dubbed Wireless Multi-Media (WMM) by WiFi Alliance 802.11n 100Mbps+ 802.11i Security Adds AES encryption Requires high cpu, new chips required TKIP is interim solution Wi-Fi Protected Access (WPA) Subset of 802.11i, forward-compatible with 802.11i (WPA2) Encryption: Version one uses TKIP AuthC: 802.1x & EAP allows auth via RADIUS, also allows auth via PSK

Types of Attacks Wireless medium Physical Theft of hardware Impersonation Attacker masquerades as another person Integrity Undetected modification of data Disclosure Unintended exposure of data Denial of service Keep valid users from access

Summary of 802.11 Vulnerabilities

WLAN Threats Threats Malicious hacking attempts Rogue Access Points Denial-of-Service attacks (DoS) malicious or accidental Mobile devices Hacking Attempts War driving/walking/flying Disgruntled employee Industrial espionage Electronic warfare

Hacking methods Traffic generation Flood network w/captured traffic to break WEP more quickly Break 40-bit WEP in 1 hour (in lab) Defense: Filter weak IVs in AP Man-in-the-middle Can be used w/one-way authentication (open, shared, 802.1x) Must know WEP key if WEP-protected Requires signal that overpowers AP s signal Can be used to collect credentials or deny service

Rogue Access Points Probably the most serious security threat to your network No such thing as a non-wireless company Mitigate by: (1) Strong and documented WLAN security policy (2) Detection: Radio based, client based & network based (3) Provide approved WLAN services: No longer any need for rogue deployments

802.11 security Shared media like a network hub Requires data privacy - encryption Authentication necessary Can access network without physical presence in building Once you connect to wireless, you are an insider on the network

802.11 security approaches Closed network SSID can be captured with passive monitoring MAC filtering MACs can be sniffed/spoofed WEP Can be cracked online/offline given enough traffic & time Change keys frequently Traffic can still be decrypted offline Place APs on DMZ Requires VPN access to get back into network Use VPN Doesn t handle roaming Authentication portal More stuff to configure WPA and/or EAP

Authentication methods [Open systems authentication] Required by 802.11 Just requires SSID from client Only identification required is MAC address of client WEP key not verified, but device will drop packets it can t decrypt

Authentication methods [Shared key authentication] Utilizes challenge/response Requires & matches key Steps Client requests association to AP AP issues challenge to client Client responds with challenge encrypted by WEP key AP decrypts clients & verifies WEAK! Attacker sniffs plaintext AND cipher-text!

Wireless Security Standards Wired Equivalent Privacy (WEP) Part of 802.11 specification Shared key 40/104 bits Initialization vector (IV) = 24 bits Uses RC4 for encryption Weaknesses/attacks Fluhrer-Mantin-Shamir (FMS) key recovery attack weak IVs Filter weak IVs to mitigate IV too short, gets reused after 5 hours IP redirection, MITM attacks Traffic injection attacks Bit-flip attacks WEP2 added, increases key length to 128 bits

WEP? WEP relies on a secret key which is shared between the sender and the receiver. SENDER: Mobile station RECEIVER: Access Point Secret Key is used to encrypt packets before they are transmitted Integrity Check is used to ensure packets are not modified in transit. The standard does not discuss how shared key is established In practice, most installations use a single key which is shared between all mobile stations and access points

WEP? To send a message M: Compute a checksum c(m) (not depend on secret key k) Pick an IV v and generate a keystream RC4(v,k) XOR <M,c(M)> with the keystream to get the ciphertext Transmit v and ciphertext over a radio link When received a message M Use transmitted v and the shared key k to generate the Keystream RC4(v,k) XOR the ciphertext with RC4(v,k) to get <M,c > Check is c =c(m ) If it is, accept M as the message transmitted

RC4 WEP uses the RC4 encryption algorithm known as stream cipher to protect the confidentiality of its data. Stream cipher operates by expanding a short key into an infinite pseudo-random key stream. Sender XORs the key stream with plaintext to produce the ciphertext. Receiver has the copy of the same key, and uses it to generate an identical key stream. XORing the key stream with the ciphertext yields the original message.

WEP In a Nutshell 40 bits of security == 64 bits of marketing spam. 104 bits of security == 128 bits of marketing spam

Thoughts on WEP Key management beyond a handful of people is impossible Too much trust Difficult administration Key lifetime can get very short in an enterprise No authentication for management frames No per packet auth False Advertising!!!

What is Lacking? Scalability Many clients Large networks Protection for all parties Eliminate invalid trust assumptions

Two simple flaws If an attacker flips a bit in ciphertext, then after decryption, that bit in the plaintext will be flipped. If an eavesdropper intercepts two ciphertexts encrypted with the same key stream, it is possible to obtain the XOR of the two plaintexts.

802.1X Security Philosophy A flexible security framework Implement security framework in upper layers Enable plug-in of new authentication, key management methods without changing NIC or Access Point Leverage main CPU resources for cryptographic calculations How it works Security conversation carried out between supplicant and authentication server NIC, Access Point acts as a pass through devices Advantages Decreases hardware cost and complexity Enables customers to choose their own security solution Can implement the latest, most sophisticated authentication and key management techniques with modest hardware Enables rapid response to security issues

Authentication methods [802.1x authentication] Encapsulates EAP traffic over LAN EAP: Standard for securely transporting data Supports a variety of authentication methods LEAP, EAP-TLS, etc. Port-based only access is to authentication server until authentication succeeds Similar to what s used on Ethernet switches Originally designed for campus-wired networks Requires little overhead by access point

Authentication methods [802.1x authentication] (cont.) 3 entities Supplicant (e.g., laptop w/wireless card) Authenticator (e.g., access point) Authentication server (e.g., RADIUS) Keys Unique session key for each client New WEP key each time client reauthenticates Broadcast key Shared by all clients Mixed with IV to generate session keys Rotated (Broadcast Key Rotation BKR) regularly to generate new key space

802.1x authentication source: nwfusion.com

802.1x Port based authentication for all IEEE 802 networks (layer 2 authentication) Originally for Campus networks Extended for wireless Allows for unified AAA services Provides means for key transport

Pre-Authentication State

Post-Authentication State

Wireless Security Standards [TKIP/MIC] Fixes key reuse in WEP Same encryption as WEP (RC4) TKIP Temporal Key Integrity Protocol Protects by removing predictability Broadcast WEP key rotation is a good alternative if you can t support TKIP

Wireless Security Standards [TKIP/MIC] (cont.) MIC Message Integrity Code Protects against bit-flip attacks by adding tamper-proof hash to messages Must be implemented on clients & AP Hash of random num + MAC header + sequence number + payload Sequence number must be in order or packet rejected Part of firmware, not O/S TKIP Steps Start with shared key Add MAC address to get phase 1 key Mix WEP key with IV to derive per-packet keys Each packet encrypted separately, fights weaknesses in RC4 key scheduling algorithm

Wireless Security Standards [WiFi Protected Access (WPA)] Developed to replace WEP, improve authentication Software upgrade to existing hardware Forward-compatible with 802.11i Encryption key management: TKIP Doubled IV to 48-bits Better protection from replay & IV collision attacks Per-packet keying (PPK) Protects against key-recovery attacks Broadcast key rotation

Wireless Security Standards [WiFi Protected Access (WPA)] Message integrity Protects against forgery attacks Authentication: 802.1x and EAP Mutual authentication So you don t join rogue networks and give up your credentials

WEP vs. WPA vs. WPA2 WEP WPA WPA2 Encryption RC4 RC4 AES Key rotation None Dynamic session keys Dynamic session keys Key distribution Manually typed into each device Automatic distribution available Automatic distribution available Authentication Uses WEP key as AuthC Can use 802.1x & EAP Can use 802.1x & EAP