1. Trang chủ
  2. » Giáo án - Bài giảng

Network security CIS534 l8

62 139 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 62
Dung lượng 1,03 MB

Nội dung

Network Security Lecture Wireless LAN Security WLAN Security WLAN Security - Contents > Wireless LAN 802.11 > Technology > Security History > Vulnerabilities > Demonstration WLAN Security Wireless LANs > IEEE ratified 802.11 in 1997 > Also known as Wi-Fi > Wireless LAN at Mbps & Mbps > WECA (Wireless Ethernet Compatibility Alliance) promoted Interoperability > Now Wi-Fi Alliance > 802.11 focuses on Layer & Layer of OSI model > Physical layer > Data link layer WLAN Security 802.11 Components > Two pieces of equipment defined: > Wireless station > A desktop or laptop PC or PDA with a wireless NIC > Access point > A bridge between wireless and wired networks > Composed of > Radio > Wired network interface (usually 802.3) > Bridging software > Aggregates access for multiple wireless stations to wired network WLAN Security 802.11 modes > Infrastructure mode > Basic Service Set > One access point > Extended Service Set > Two or more BSSs forming a single subnet > Most corporate LANs in this mode > Ad-hoc mode > Also called peer-to-peer > Independent Basic Service Set > Set of 802.11 wireless stations that communicate directly without an access point > Useful for quick & easy wireless networks WLAN Security Infrastructure mode Access Point Basic Service Set (BSS) – Single cell Station Extended Service Set (ESS) – Multiple cells WLAN Security Ad-hoc mode Independent Basic Service Set (IBSS) WLAN Security 802.11 Physical Layer > Originally three alternative physical layers > Two incompatible spread-spectrum radio in 2.4Ghz ISM band > Frequency Hopping Spread Spectrum (FHSS) > 75 channels > Direct Sequence Spread Spectrum (DSSS) > 14 channels (11 channels in US) > One diffuse infrared layer > 802.11 speed > Mbps or Mbps WLAN Security 802.11 Data Link Layer > Layer split into: > Logical Link Control (LLC) > Media Access Control (MAC) > LLC - same 48-bit addresses as 802.3 > MAC - CSMA/CD not possible > Can’t listen for collision while transmitting > CSMA/CA – Collision Avoidance > Sender waits for clear air, waits random time, then sends data > Receiver sends explicit ACK when data arrives intact > Also handles interference > But adds overhead > 802.11 always slower than equivalent 802.3 WLAN Security Hidden nodes WLAN Security 10 Avoid the weak IVs > FMS described a simple method to find weak IVs > Many manufacturers avoid those IVs after 2002 > Therefore Airsnort and others may not work on recent hardware > However David Hulton aka h1kari > Properly implemented FMS attack which shows many more weak IVs > Identified IVs that leak into second byte of key stream > Second byte of SNAP header is also 0xAA > So attack still works on recent hardware > And is faster on older hardware > Dwepcrack, weplab, aircrack WLAN Security 48 Generating WEP traffic > Not capturing enough traffic? > Capture encrypted ARP request packets > Anecdotally lengths of 68, 118 and 368 bytes appear appropriate > Replay encrypted ARP packets to generate encrypted ARP replies > Aireplay implements this WLAN Security 49 802.11 safeguards > Security Policy & Architecture Design > Treat as untrusted LAN > Discover unauthorised use > Access point audits > Station protection > Access point location > Antenna design WLAN Security 50 Security Policy & Architecture > Define use of wireless network > What is allowed > What is not allowed > Holistic architecture and implementation > Consider all threats > Design entire architecture > To minimise risk WLAN Security 51 Wireless as untrusted LAN > Treat wireless as untrusted > Similar to Internet > Firewall between WLAN and Backbone > Extra authentication required > Intrusion Detection > at WLAN / Backbone junction > Vulnerability assessments WLAN Security 52 Discover unauthorised use > Search for unauthorised access points, ad-hoc networks or clients > Port scanning > For unknown SNMP agents > For unknown web or telnet interfaces > Warwalking! > Sniff 802.11 packets > Identify IP addresses > Detect signal strength > But may sniff your neighbours… > Wireless Intrusion Detection > AirMagnet, AirDefense, Trapeze, Aruba,… WLAN Security 53 Access point audits > Review security of access points > Are passwords and community strings secure? > Use Firewalls & router ACLs > Limit use of access point administration interfaces > Standard access point config: > SSID > WEP keys > Community string & password policy WLAN Security 54 Station protection > Personal firewalls > Protect the station from attackers > VPN from station into Intranet > End-to-end encryption into the trusted network > But consider roaming issues > Host intrusion detection > Provide early warning of intrusions onto a station > Configuration scanning > Check that stations are securely configured WLAN Security 55 Location of Access Points > Ideally locate access points > In centre of buildings > Try to avoid access points > By windows > On external walls > Line of sight to outside > Use directional antenna to “point” radio signal WLAN Security 56 WPA > Wi-Fi Protected Access > Works with 802.11b, a and g > “Fixes” WEP’s problems > Existing hardware can be used > 802.1x user-level authentication > TKIP > RC4 session-based dynamic encryption keys > Per-packet key derivation > Unicast and broadcast key management > New 48 bit IV with new sequencing method > Michael byte message integrity code (MIC) > Optional AES support to replace RC4 WLAN Security 57 WPA and 802.1x > 802.1x is a general purpose network access control mechanism > WPA has two modes > Pre-shared mode, uses pre-shared keys > Enterprise mode, uses Extensible Authentication Protocol (EAP) with a RADIUS server making the authentication decision > EAP is a transport for authentication, not authentication itself > EAP allows arbitrary authentication methods > For example, Windows supports > EAP-TLS requiring client and server certificates > PEAP-MS-CHAPv2 WLAN Security 58 Practical WPA attacks > Dictionary attack on pre-shared key mode > CoWPAtty, Joshua Wright > Denial of service attack > If WPA equipment sees two packets with invalid MICs in second > All clients are disassociated > All activity stopped for one minute > Two malicious packets a minute enough to stop a wireless network WLAN Security 59 802.11i > Robust Security Network extends WPA > Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) > Based on a mode of AES, with 128 bits keys and 48 bit IV > Also adds dynamic negotiation of authentication and encryption algorithms > Allows for future change > Does require new hardware > www.drizzle.com/~aboba/IEEE/ WLAN Security 60 Relevant RFCs > Radius Extensions: RFC 2869 > EAP: RFC 2284 > EAP-TLS: RFC 2716 WLAN Security 61 Demonstration > War driving > Packet sniffing > Faking Aps > Cracking WEP > brute force > Dictionary attack > FMS / H1kari attack > Airsnarf? > Packet injection? WLAN Security 62 ... unprotected WLANs WLAN Security 28 802.11b Security Services > Two security services provided: > Authentication > Shared Key Authentication > Encryption > Wired Equivalence Privacy WLAN Security 29 Wired... networks > Composed of > Radio > Wired network interface (usually 802.3) > Bridging software > Aggregates access for multiple wireless stations to wired network WLAN Security 802.11 modes > Infrastructure... quick & easy wireless networks WLAN Security Infrastructure mode Access Point Basic Service Set (BSS) – Single cell Station Extended Service Set (ESS) – Multiple cells WLAN Security Ad-hoc mode

Ngày đăng: 09/01/2018, 11:51

TỪ KHÓA LIÊN QUAN

TÀI LIỆU CÙNG NGƯỜI DÙNG

  • Đang cập nhật ...

TÀI LIỆU LIÊN QUAN