Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống
1
/ 62 trang
THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Định dạng
Số trang
62
Dung lượng
1,03 MB
Nội dung
NetworkSecurity Lecture Wireless LAN Security WLAN Security WLAN Security - Contents > Wireless LAN 802.11 > Technology > Security History > Vulnerabilities > Demonstration WLAN Security Wireless LANs > IEEE ratified 802.11 in 1997 > Also known as Wi-Fi > Wireless LAN at Mbps & Mbps > WECA (Wireless Ethernet Compatibility Alliance) promoted Interoperability > Now Wi-Fi Alliance > 802.11 focuses on Layer & Layer of OSI model > Physical layer > Data link layer WLAN Security 802.11 Components > Two pieces of equipment defined: > Wireless station > A desktop or laptop PC or PDA with a wireless NIC > Access point > A bridge between wireless and wired networks > Composed of > Radio > Wired network interface (usually 802.3) > Bridging software > Aggregates access for multiple wireless stations to wired network WLAN Security 802.11 modes > Infrastructure mode > Basic Service Set > One access point > Extended Service Set > Two or more BSSs forming a single subnet > Most corporate LANs in this mode > Ad-hoc mode > Also called peer-to-peer > Independent Basic Service Set > Set of 802.11 wireless stations that communicate directly without an access point > Useful for quick & easy wireless networks WLAN Security Infrastructure mode Access Point Basic Service Set (BSS) – Single cell Station Extended Service Set (ESS) – Multiple cells WLAN Security Ad-hoc mode Independent Basic Service Set (IBSS) WLAN Security 802.11 Physical Layer > Originally three alternative physical layers > Two incompatible spread-spectrum radio in 2.4Ghz ISM band > Frequency Hopping Spread Spectrum (FHSS) > 75 channels > Direct Sequence Spread Spectrum (DSSS) > 14 channels (11 channels in US) > One diffuse infrared layer > 802.11 speed > Mbps or Mbps WLAN Security 802.11 Data Link Layer > Layer split into: > Logical Link Control (LLC) > Media Access Control (MAC) > LLC - same 48-bit addresses as 802.3 > MAC - CSMA/CD not possible > Can’t listen for collision while transmitting > CSMA/CA – Collision Avoidance > Sender waits for clear air, waits random time, then sends data > Receiver sends explicit ACK when data arrives intact > Also handles interference > But adds overhead > 802.11 always slower than equivalent 802.3 WLAN Security Hidden nodes WLAN Security 10 Avoid the weak IVs > FMS described a simple method to find weak IVs > Many manufacturers avoid those IVs after 2002 > Therefore Airsnort and others may not work on recent hardware > However David Hulton aka h1kari > Properly implemented FMS attack which shows many more weak IVs > Identified IVs that leak into second byte of key stream > Second byte of SNAP header is also 0xAA > So attack still works on recent hardware > And is faster on older hardware > Dwepcrack, weplab, aircrack WLAN Security 48 Generating WEP traffic > Not capturing enough traffic? > Capture encrypted ARP request packets > Anecdotally lengths of 68, 118 and 368 bytes appear appropriate > Replay encrypted ARP packets to generate encrypted ARP replies > Aireplay implements this WLAN Security 49 802.11 safeguards > Security Policy & Architecture Design > Treat as untrusted LAN > Discover unauthorised use > Access point audits > Station protection > Access point location > Antenna design WLAN Security 50 Security Policy & Architecture > Define use of wireless network > What is allowed > What is not allowed > Holistic architecture and implementation > Consider all threats > Design entire architecture > To minimise risk WLAN Security 51 Wireless as untrusted LAN > Treat wireless as untrusted > Similar to Internet > Firewall between WLAN and Backbone > Extra authentication required > Intrusion Detection > at WLAN / Backbone junction > Vulnerability assessments WLAN Security 52 Discover unauthorised use > Search for unauthorised access points, ad-hoc networks or clients > Port scanning > For unknown SNMP agents > For unknown web or telnet interfaces > Warwalking! > Sniff 802.11 packets > Identify IP addresses > Detect signal strength > But may sniff your neighbours… > Wireless Intrusion Detection > AirMagnet, AirDefense, Trapeze, Aruba,… WLAN Security 53 Access point audits > Review security of access points > Are passwords and community strings secure? > Use Firewalls & router ACLs > Limit use of access point administration interfaces > Standard access point config: > SSID > WEP keys > Community string & password policy WLAN Security 54 Station protection > Personal firewalls > Protect the station from attackers > VPN from station into Intranet > End-to-end encryption into the trusted network > But consider roaming issues > Host intrusion detection > Provide early warning of intrusions onto a station > Configuration scanning > Check that stations are securely configured WLAN Security 55 Location of Access Points > Ideally locate access points > In centre of buildings > Try to avoid access points > By windows > On external walls > Line of sight to outside > Use directional antenna to “point” radio signal WLAN Security 56 WPA > Wi-Fi Protected Access > Works with 802.11b, a and g > “Fixes” WEP’s problems > Existing hardware can be used > 802.1x user-level authentication > TKIP > RC4 session-based dynamic encryption keys > Per-packet key derivation > Unicast and broadcast key management > New 48 bit IV with new sequencing method > Michael byte message integrity code (MIC) > Optional AES support to replace RC4 WLAN Security 57 WPA and 802.1x > 802.1x is a general purpose network access control mechanism > WPA has two modes > Pre-shared mode, uses pre-shared keys > Enterprise mode, uses Extensible Authentication Protocol (EAP) with a RADIUS server making the authentication decision > EAP is a transport for authentication, not authentication itself > EAP allows arbitrary authentication methods > For example, Windows supports > EAP-TLS requiring client and server certificates > PEAP-MS-CHAPv2 WLAN Security 58 Practical WPA attacks > Dictionary attack on pre-shared key mode > CoWPAtty, Joshua Wright > Denial of service attack > If WPA equipment sees two packets with invalid MICs in second > All clients are disassociated > All activity stopped for one minute > Two malicious packets a minute enough to stop a wireless network WLAN Security 59 802.11i > Robust SecurityNetwork extends WPA > Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) > Based on a mode of AES, with 128 bits keys and 48 bit IV > Also adds dynamic negotiation of authentication and encryption algorithms > Allows for future change > Does require new hardware > www.drizzle.com/~aboba/IEEE/ WLAN Security 60 Relevant RFCs > Radius Extensions: RFC 2869 > EAP: RFC 2284 > EAP-TLS: RFC 2716 WLAN Security 61 Demonstration > War driving > Packet sniffing > Faking Aps > Cracking WEP > brute force > Dictionary attack > FMS / H1kari attack > Airsnarf? > Packet injection? WLAN Security 62 ... unprotected WLANs WLAN Security 28 802.11b Security Services > Two security services provided: > Authentication > Shared Key Authentication > Encryption > Wired Equivalence Privacy WLAN Security 29 Wired... networks > Composed of > Radio > Wired network interface (usually 802.3) > Bridging software > Aggregates access for multiple wireless stations to wired network WLAN Security 802.11 modes > Infrastructure... quick & easy wireless networks WLAN Security Infrastructure mode Access Point Basic Service Set (BSS) – Single cell Station Extended Service Set (ESS) – Multiple cells WLAN Security Ad-hoc mode