* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Document
Wake-on-LAN wikipedia , lookup
TV Everywhere wikipedia , lookup
Remote Desktop Services wikipedia , lookup
Deep packet inspection wikipedia , lookup
Computer security wikipedia , lookup
Distributed firewall wikipedia , lookup
Policies promoting wireless broadband in the United States wikipedia , lookup
IEEE 802.11 wikipedia , lookup
Authentication wikipedia , lookup
Extensible Authentication Protocol wikipedia , lookup
Piggybacking (Internet access) wikipedia , lookup
Wireless (802.11) Security Douglas Reeves NC State University Southeast Wireless Symposium December 02, 2003 What’s New?  Anybody (in range) can listen or transmit!  Security problems not specific to wireless… • • • • Spam Viruses Worms “Insider” attacks (e.g., corrupt employees) Characteristics of 802.11 Service  Wireless LAN standard, introduced 1997  802.11b • most widely used version, up to 11 Mb/s • 2.4GHz (unlicensed) frequency band • range   several hundred feet with omnidirectional antenna up to 25 miles with directional antenna Modes  Infrastructure mode • clients connect to base stations • multiple base stations may cover larger area, allow client roaming • identified by SSID  Ad Hoc mode • clients communicate directly with each other Scanning for Access Points    Access points periodically transmit beacon frames (SSID, data rate, etc.) Client scans frequencies and picks an access point based on SSID, signal strength, ... Client switches to assigned channel and establishes an association Sending Data  Sender waits until no one transmitting  Then waits random interval and transmits  Optional slot reservation • Client first sends request-to-send (RTS) frame • Access point sends clear-to-send (CTS) frame when ready to receive • Requesting client sends data, all other clients must wait Reliability   Receiving station checks CRC code in frame to detect errors Acknowledges fault-free frame, lack of acknowledgment means “resend data” Energy Conservation    Client can turn off radio interface when nothing to send or receive Access Point periodically transmits a special frame clients have packets waiting Each client wakes up periodically to receive the special frame • if a node has a packet waiting, requests packet after waiting random interval Security Problems of 802.11 1. Unauthorized or “rogue” access points on trusted networks 2. Access to network by unauthorized clients (theft of service, "war driving") 3. Interception and monitoring of wireless traffic • range can be hundreds of feet • packet analyzer software freely available 4. Jamming is easy, unlicensed frequency Security Problems (cont'd) 5. Client-to-client attacks (in ad hoc mode) 6. Denial or degradation of service • flood with bogus packets, association/authentication requests, … 7. Misconfiguration possibilities • no encryption used • weak (guessable) password used to generate key • weak protection of encryption key on client machine • weak protection of management interface for access point Attacks on Control Messages    Ex.: Attacker issues spoofed "deauthenticate" or "disassociate" frames Ex.: Attacker continually sends RTS frames to reserve slots Ex.: Power-saving attacks • attacker causes access point to discard packets while client is still sleeping • attacker convinces client there is no data waiting  Trivial to implement (e.g., on PDA)  May require changes to the standard  (In)Security in 802.11b  Authentication is the process of proving identity • open: just supply correct SSID • shared key: relies on WEP  WEP: Wired Equivalent Privacy WEP    Without WEP, no confidentiality, integrity, or authentication of user data The cipher used in WEP is RC4, keylength from 40 up to 128 bits Key is shared by all clients and the base station • compromising one node compromises network  Manual key distribution among clients makes changing the key difficult WEP Encryption Weakness   Initialization Vector (IV) used during encryption is only 24 bits long Key to cracking: find packets with duplicate public IVs • repetition of IV guaranteed on busy networks due to small IV space  Tools: WEPCrack, AirSnort • 15 minutes to 24 hours to collect enough packets Improvement (to WEP) #1: 802.1x   Port-based user authentication and key distribution Currently supported by most access points and client OSes Improvement #2: WPA (Wi-Fi Protected Access)  Incorporates 802.1X  Advantages • stronger, centralized user authentication • automatically negotiated per-user keys with frequent key updates • stronger encryption algorithm choices  Hardware support may be needed for adequate performance TKIP (Temporal Key Integrity Protocol)    Extension of IV to 48 bits Includes IV sequencing (rotates keys more often) Adds a frame integrity-check function that is much stronger than CRC Extensible Authentication Protocol (EAP) 1. During association, client must provide “credentials” 2. Access point requests authentication of user from RADIUS server 3. If successful, access point will accept traffic from client, encryption keys derived for the session 4. When client logs off, the access point will disable the client's ports EAP Authentication Types  5 contenders, no clear consensus (wait for the dust to settle?) • PEAP has support from Microsoft+Cisco+RSA, being standardized by IETF • EAP-TTLS also being standardized • LEAP is Cisco-proprietary • interoperability problems  User credentials = name/password, or digital certificate • use of certificates requires certificate server infrastructure Improvement #3: 802.11i  WPA + dynamic negotiation of authentication and encryption algorithms  AES is the primary encryption algorithm  Requires hardware support • newer access points + wireless cards will be firmware upgradeable • older access points + wireless cards will have to be replaced  Still under development; ratified and available mid-2004? Security Through Other Means     Use firewalls to isolate wireless traffic from wired network Use intrusion detection to detect attacks on wireless networks Use IPSec / VPNs to protect traffic at IP layer Use TLS (SSL) to protect traffic at application layer Recommendations: General 1. Get informed about risks! 2. Regular security audits and penetration assessments 3. Require "strong" passwords, limit number of login attempts 4. Disable ad hoc mode • invites access by unauthorized nodes to your computer Recommendations: Access Points 5. Enforce standard security settings for each 802.11b access point 6. Regularly search to identify unknown access points 7. Require centralized user authentication (RADIUS) to configure the access point 8. Encrypt all access point management traffic Recommendations: Other 9. Use distributed personal firewall on each client 10.Use VPNs to supplement encryption and authentication for 802.11b 11.Maintain an intrusion detection system on the wireless network 12.Use firewalls to separate wireless networks from internal networks Recommendations: WLAN Security  WEP (fair) • enable wireless frame encryption • use longest key • change the WEP key regularly (manually)  802.1X and WPA (user authentication + dynamic keys) (better) • use as soon as practical and stable • set rekeying to occur every few hours  802.11i (best) • upgrade / use when available and supported