Preview only show first 10 pages with watermark. For full document please download

Wireless Robust Security Networks: Keeping The Bad Guys Out With

   EMBED


Share

Transcript

Wireless Robust Security Networks: Keeping the Bad Guys Out with 802.11i (WPA2) SUNY Technology Conference June 21, 2011 Bill Kramp – FLCC Network Administrator Copyright © 2011 William D. Kramp All Rights Reserved What is a robust security network (RSN)?  What is involved in deploying WPA2?  What are the support issues with WPA2?  Wireless Security Questions Enforce authorized access to network  Protect against downgrade attacks  Data protection  ◦ ◦ ◦ ◦ Confidentiality Data integrity Data origin authentication Replay protection Hardjono & Dondeti (2005) RSN (802.11i) Security Goals        Basic Wireless Terms Description of EAP and EAP-Methods 802.1x 802.11 Phases Deploying WPA2 Support issues Best practices for deployment Agenda          WEP - Wired Encryption Protocol WPA - WiFi Protected Access WPA2 - WiFi Protected Access 2 TKIP - Temporal Key Integrity Protocol AES - Advanced Encryption Standard CCMP - Counter Mode with Cipher Block Chaining MAC Protocol EAP EAPOL EAP-Methods Terms Remote Authentication Dial In User Service  Developed for MODEM pools back in the day.  RADIUS Extensible Authentication Protocol (EAP)  A Point to Point Protocol (PPP)  RFC 2284 added authentication to PPP  EAP          Must be supported by Radius server 40+ methods available TLS MS-CHAPv2 PEAP LEAP FAST SIM 802.11i requires mutual authentication EAP-Methods      Developed by IEEE EAP over LAN (EAPOL) Allowed EAP and Radius to be used Point-to-Point communication only Encapsulates EAP packets for 802.1 802.1x protocol Blocks all inbound and outbound traffic until after authentication is passed  Exceptions to rule:  ◦ Outbound to wireless device:  Wake-on-LAN “magic” packets ◦ Inbound from wireless device:  EAPOL packet type 4  SNMP notification (Encapsulated ASF Alert)  Uses IEEE 802.1D to accomplish this Network aspects of 802.1x RSN Phases Robust Security Network (802.11i) Phases: 1. Discovery 2. Authentication 3. Key Generation and Distribution 4. Protected Data Transfer 5. Connection Termination Authentication and Association AP Beacons  AP Probe Responses  Beacon and Probe Responses provide:  ◦ Cipher suites:  WEP  TKIP  CCMP (AES) ◦ Authentication mechanisms:  802.1x Phase 1 - Discovery      STA (laptop) and AS (Authentication Server) prove identities using EAP. AP blocks network traffic (802.1x) AP forwards traffic between STA and AS Master Session Key (MSK) established MSK key used to generate subsequent keys Phase 2: Authentication Cryptographic keys generated  Keys placed on STA and AP  Frames exchanged only between AP and STA  Phase 3: Key Generation and Distribution Frames with encapsulated traffic between STA and AP  Only frame traffic encrypted  Traffic forwarded between AP and wired network  Wired traffic not encrypted  Phase 4: Protected Data Transfer Secure connection torn down  802.1x port blocking enabled  Phase 5: Connection Termination RSN Phases of Operation  Easiest: ◦ iTouch, iPad, iPhone  Moderate effort: ◦ Microsoft, especially Vista ◦ A lot of people don’t update OS  Most difficult: ◦ Apple Laptops  Impossible: ◦ Windows 95 laptops Difficulty Deploying WPA2 Enterprise by Platform/OS Deploying WPA2 With Machine Authentication Wireless device must have been joined to the Windows domain over physical network first.  Keys for Radius certificates installed on wireless devices.  Configuring WPA2 Step 1    SSID has been added. Select “Connect automatically when network is in range”. Click the Security tab Configuring WPA2 Step 2      Set security type to WPA2-Enterprise Set encryption type to AES Select network authentication based on your authentication server Click “Settings” button “Remember my credentials” is dependent on policies. Configuring WPA2 Step 3       Select “Validate server certificate” “Connect to these servers” should be checked, and the radius servers listed. Select only the Trusted Root Cert’ Authorities needed. Select “Do not prompt user to authorize new servers”. Select inner “Auth’ Method” Click “Configure” button Configuring WPA2 Step 4    Select to use the Windows domain credentials. Click OK Then click OK for the Protected EAP Properties window. Configuring WPA2 Step 5  Click the Advanced settings button Configuring WPA2 Step 6    Select “Specify authentication mode” Select proper mode Click OK buttons Configuring WPA2 Step 7  Device should first join to the domain with Machine credentials, then use the Windows domain credentials to authenticate. WPA2 Machine Authentication  Possible causes: ◦ No DHCP address:  Out of leases  DHCP forwarding failure ◦ User exceeded failed logins attempts ◦ Radius Failure:  Server “spacing” out  Bad radius shared key ◦ AD problem ◦ Machine Auth’ password expired Curse of “Domain Not Found” With WPA2 Machine Authentication Update Operating System  Latest wireless drivers:  ◦ Windows, Linux, OS X      Use Windows to manage wireless adapter Place wireless network at top of stack Use ”good” passwords Notify users about change in advance Make people available to help convert Best Practices Deploying WPA2 Enterprise       Vulnerability found on the last line of page 196 for the IEEE 802.11 (2007) Standard AES not compromised Wireless device has to be authenticated Uses shared Group Temporal Key (GTK) GTK intended for use by AP only ARP spoofing for MITM could occur WPA2 Hole 196 Vulnerability Removing IT Staff cred’s from user laptops 1. Click Start, and then click Run. 2. In the Open box, type regedit, and then click OK. 3. Locate and then click the following registry key: HKEY_CURRENT_USER\Software\Mi crosoft\EAPOL\UserEapInfo 4. On the Edit menu, click Delete. Clearing Cached Credentials Beaver, K., Davis, P.T., (2005). Hacking Wireless Networks for Dummies. Wiley Publishing, Inc.: Hoboken, NJ. Hardjono, T., Dondeti, L.R. (2005). Security in Wireless LANs and MANs. Artech House, Inc: Norwood, MA. Resources