Module sécurité13-140
Transcript of Module sécurité13-140
-
8/3/2019 Module scurit13-140
1/35
2006 Cisco Systems, Inc. All rights reserved.
Objectives
Describe the need for WLAN security.
Describe the evolution of WLAN security methods.
Identify common authentication and encryptiontechnologies used in WLANs.
Explain the benefits and weaknesses of the commonsecurity methods used in WLANs.
-
8/3/2019 Module scurit13-140
2/35
2006 Cisco Systems, Inc. All rights reserved.
The Need for WLAN Security
Vulnerabilities:
War driving
Non-secret SSID
MAC filtering
Automatic DHCP
Man-in-the middle attacks
Cracking WEP
Initialization Vector attacks
Password Cracking
DoS attacks
WLAN Security requires:
Authentication: Proves the user belongs on the network
Encryption: Protects the data traversing the network
-
8/3/2019 Module scurit13-140
3/35
2006 Cisco Systems, Inc. All rights reserved.
802.11 Security Basics
Data privacy
Authentication, authorization and accounting (AAA)
Segmentation
Monitoring
Policy
-
8/3/2019 Module scurit13-140
4/35
2006 Cisco Systems, Inc. All rights reserved.
Evolution of WLAN Security
-
8/3/2019 Module scurit13-140
5/35
2006 Cisco Systems, Inc. All rights reserved.
Legacy 802.11 Security
Legacy Authentication
Static WEP encryption
MAC Filters
SSID Cloaking
-
8/3/2019 Module scurit13-140
6/35
2006 Cisco Systems, Inc. All rights reserved.
802.11 WEP
WEP aims at providing Wired Equivalent Privacy
WEP is an optional IEEE standard for encryption
Keys can be static and shared among many clients
Uses RC4 algorithmknown vulnerabilities
Keys can be dynamic and unique for each client(as with 802.1x) per session
0 1 0 1
1 1 0 0
1 0 0 1
RC4
Plain text
Cipher text
IV + key
seed
keystream
-
8/3/2019 Module scurit13-140
7/35 2006 Cisco Systems, Inc. All rights reserved.
802.11 Open Authentication
1. Client sends probe request.2. Access points (A/B) send probe response. Client
evaluates access point response and selects thebest access point.
3. Client sends authentication request to selectedaccess point (A).
4. Access point A confirms authentication andregisters client.
5. Client sends association request to selectedaccess point (A).
6. Access point A confirms association and registersclient.
AccessPoint A
AccessPoint B
-
8/3/2019 Module scurit13-140
8/35 2006 Cisco Systems, Inc. All rights reserved.
802.11 Shared Key Authentication
4. Access point A sends authentication response containingthe unencrypted challenge text.
5. Client encrypts the challenge text using one of its WEP keysand sends it to access point (A).
6. Access point A compares the encrypted challenge text to itscopy of the encrypted challenge text. If the text is the same,access point A will allow the client onto the WLAN.
AccessPoint A
AccessPoint B
Steps 1-3 are the same as with open authentication.
-
8/3/2019 Module scurit13-140
9/35 2006 Cisco Systems, Inc. All rights reserved.
Cisco Enhanced 802.11 WEP Security
Cisco prestandard enhancements
Implemented in 2001 and 2002
Authentication:
802.1x and Extensible Authentication Protocol (EAP) protocols
User, token, and machine credentials
Dynamic encryption key generation
Encryption:
CKIP (Cisco Key Integrity Protocol )
CMIC (Cisco Message Integrity Check )
-
8/3/2019 Module scurit13-140
10/35 2006 Cisco Systems, Inc. All rights reserved.
Enhanced 802.11 Security
Authentication:
802.1x and Extensible Authentication Protocol (EAP) protocols
User, token, and machine credentials
Dynamic encryption key generation
IEEE 802.11i
Encryption:TKIP (Temporal Key Integrity Protocol) and MIC
Wi-Fi Protected Access (WPA)TKIP encryption
WPA2Advanced Encryption Standard (AES)
-
8/3/2019 Module scurit13-140
11/35 2006 Cisco Systems, Inc. All rights reserved.
EncryptionTKIP and MIC
TKIP (Temporal Key Integrity Protocol):
Key hashing for unique seed values per packet to protectagainst WEP initialization vector vulnerabilities
MIC from Michael algorithm
Broadcast key rotation
MIC (message integrity check ):
Provides more protection than Integrity Check Value (ICV) byprotecting the header and the payload
Protects against man-in-the-middle or replay attacks
-
8/3/2019 Module scurit13-140
12/35 2006 Cisco Systems, Inc. All rights reserved.
WPA2 and AES
WPA2 offers the following:Authenticated key management
Key validation mechanisms for unicast and broadcast keys
TKIP is used, which for WPA includes both per-packet keyingand MIC
Expanded IV (defeats AirSnort)
Broadcast key rotation
AES Encryption:
128-bit block ciphercryptographically more robustthan RC4
Requires new radio cards on clients and access points becausemore CPU power is required
-
8/3/2019 Module scurit13-140
13/35 2006 Cisco Systems, Inc. All rights reserved.
802.1x Authentication Overview
The wireless client must be authenticated before it
gains access to the network
Extensible and interoperable supports:
Different EAP authentication methods or types
May be used with multiple encryption algorithms
Depends on client capability
Supported by Cisco since December 2000
-
8/3/2019 Module scurit13-140
14/35 2006 Cisco Systems, Inc. All rights reserved.
802.1x Authentication Key Benefits
Mutual authentication between client and authentication
(RADIUS) server
Encryption keys derived after authentication
Centralized policy control
-
8/3/2019 Module scurit13-140
15/35 2006 Cisco Systems, Inc. All rights reserved.
802.1x and EAP Authentication Protocols
LEAPEAP Cisco Wireless
EAP-FAST (flexible authentication via secure tunnel)
EAP-TLS (Transport layer secure)
PEAP:
PEAP-GTC
PEAP-MSCHAPv2
-
8/3/2019 Module scurit13-140
16/35 2006 Cisco Systems, Inc. All rights reserved.
Components Required for 802.1xAuthentication
Authentication server is an EAP-capable RADIUS server:
Cisco Secure ACS, Microsoft IAS, Meetinghouse Aegis
Local authentication service on Cisco IOS access point
May use either local RADIUS database or an external database server such asMicrosoft Active Directory or RSA SecurID
Authenticator is an 802.1x-capable access point.
Supplicant is an EAP-capable client:Requires 802.1x-capable driver
Requires an EAP supplicanteither available with client card, native inoperating system, or from third-party software
-
8/3/2019 Module scurit13-140
17/35 2006 Cisco Systems, Inc. All rights reserved.
Comparaison chart on various types of EAP
-
8/3/2019 Module scurit13-140
18/35 2006 Cisco Systems, Inc. All rights reserved.
Comparaison chart on various types of EAP
-
8/3/2019 Module scurit13-140
19/35 2006 Cisco Systems, Inc. All rights reserved.
Cisco LEAP
Client support:
Windows 98-XP-Vista, Windows CE, Macintosh OS 9.X or 10.X,and Linux Kernel 2.2 or 2.4
Cisco Compatible Extensions Clients (CCXv1)
RADIUS server:
Cisco Secure ACS and Cisco Access RegistrarMeetinghouse Aegis
Interlink Merit
Microsoft domain or Active Directory (optional) for back-
end authentication (must be Microsoft format database) Device support:
Cisco autonomous access points and bridges
Cisco lightweight access points and WLAN controllers
Cisco Unified Wireless IP Phone 7920 (VoIP) handset
-
8/3/2019 Module scurit13-140
20/35 2006 Cisco Systems, Inc. All rights reserved.
Cisco LEAP Authentication
-
8/3/2019 Module scurit13-140
21/35 2006 Cisco Systems, Inc. All rights reserved.
EAP-FAST: Flexible Authentication via SecureTunneling
Considered in three phases:
Protected access credential is generated in Phase 0 (DynamicPAC provisioning):
Unique shared credential used to mutually authenticate clientand server
Associated with a specific user ID and an authority IDRemoves the need for PKI
A secure tunnel is established in Phase 1.
Client is authenticated via the secure tunnel in Phase 2.
-
8/3/2019 Module scurit13-140
22/35 2006 Cisco Systems, Inc. All rights reserved.
EAP-FAST Authentication
-
8/3/2019 Module scurit13-140
23/35 2006 Cisco Systems, Inc. All rights reserved.
EAP-TLS
Client support:
Windows 2000, XP, and Windows CE (natively supported)
Non-Windows platforms: Third-party supplicants(Meetinghouse)
User certificate required for each client
Infrastructure requirements:
EAP-TLS-supported RADIUS server
Cisco Secure ACS, Cisco Access Registrar, Microsoft IAS,Aegis, Interlink
RADIUS server requires a server certificate
Certificate authority server (PKI)
Certificate management:
Both client and RADIUS server certificates to be managed
-
8/3/2019 Module scurit13-140
24/35 2006 Cisco Systems, Inc. All rights reserved.
EAP-TLS Authentication
-
8/3/2019 Module scurit13-140
25/35
2006 Cisco Systems, Inc. All rights reserved.
EAP-PEAP
Hybrid authentication method:
Server-side authentication with TLS
Client-side authentication with EAP authentication types
EAP-GTC
EAP-MSCHAPv2
Clients do not require certificates.
RADIUS server requires a server certificate:
RADIUS server has self-issuing certificate capability.
Purchase a server certificate per server from PKI entity.
Set up a simple PKI server to issue server certificates.
Allows for one-way authentication types to be used:
One-time passwords
Proxy to LDAP, Unix, Microsoft Windows NT and Active Directory,Kerberos
-
8/3/2019 Module scurit13-140
26/35
2006 Cisco Systems, Inc. All rights reserved.
EAP-PEAP Authentication
-
8/3/2019 Module scurit13-140
27/35
2006 Cisco Systems, Inc. All rights reserved.
Wi-Fi Protected Access
WPA introduced in late 2003
Prestandard implementation of IEEE 802.11i WLAN security
Addresses currently known security problems with WEP
Allows software upgrade on deployed 802.11 equipment toimprove security
Components of WPA:
Authenticated key management using 802.1x: EAP authentication andpreshared key authentication
Unicast and broadcast key management
Standardized TKIP per-packet keying and MIC protocol
Initialization vector space expansion: 48-bit initialization vectors
Migration modecoexistence of WPA and non-WPA devices (optionalimplementation that is not required for WPA certification)
-
8/3/2019 Module scurit13-140
28/35
2006 Cisco Systems, Inc. All rights reserved.
802.11i and WPA Authentication and KeyManagement Overview
-
8/3/2019 Module scurit13-140
29/35
2006 Cisco Systems, Inc. All rights reserved.
WPA Issues
WPA uses TKIP, which uses the same base encryption
algorithm, RC4, as WEP.
WPA cannot entirely avoid the design flaws of WEP.
WPA is a compromise solution.
Software upgrade is required for clients and accesspoints, which gives no guarantee that all vendors willsupport the solution.
Operating system support or a supplicant client is
required.
WPA is susceptible to a new type of DoS attack.
WPA is susceptible to a recently discovered weaknesswhen preshared keys are used.
-
8/3/2019 Module scurit13-140
30/35
2006 Cisco Systems, Inc. All rights reserved.
IEEE 802.11iWPA2
802.11i:
Ratified in June 2004
Standardizes:
802.1x for authentication
AES encryptionFacilitates U.S. government FIPS 140-2
complianceKey management
WPA2:
Supplement to WPA version 1Wi-Fi Alliance interoperable
implementation of 802.11iProvides for AES encryption to be used
Proactive Key Caching
Third-party testing and certification for WLAN device
compatibility
-
8/3/2019 Module scurit13-140
31/35
2006 Cisco Systems, Inc. All rights reserved.
Wireless Intrusion Detection Systems
Address RF-related vulnerabilities:
Detect, locate, and mitigate rogue devices
Detect and manage RF interference
Detect reconnaissance if possible
Address standards-based vulnerabilities:
Detect management frame and hijacking-style attacks
Enforce security configuration policies
Complementary functionality:
Forensic analysisCompliance reporting
-
8/3/2019 Module scurit13-140
32/35
2006 Cisco Systems, Inc. All rights reserved.
WPA and WPA2 Modes
WPA WPA2
Enterprise mode
(business,
education,government)
Authentication:IEEE 802.1x/EAP
Encryption:TKIP/MIC
Authentication:IEEE 802.1x/EAP
Encryption:AES-CCMP
Personal mode
(SOHO, home,personal)
Authentication:PSK
Encryption:
TKIP/MIC
Authentication:PSK
Encryption:
AES-CCMP
-
8/3/2019 Module scurit13-140
33/35
2006 Cisco Systems, Inc. All rights reserved.
WPA2 Issues
Client (supplicant) must have a WPA2 driver that
supports EAP.
RADIUS server must understand EAP.
PEAP carries EAP types within a channel secured by
TLS and so requires a server certificate. WPA2 is more computationally intensive with optional
AES encryption.
WPA2 may require new WLAN hardware to support
AES encryption.
-
8/3/2019 Module scurit13-140
34/35
2006 Cisco Systems, Inc. All rights reserved.
Summary
With increased reliance on WLANs, businesses are
becoming more concerned about network security.Network managers need to provide end users withfreedom and mobility without offering intruders accessto the WLAN or the information sent and received onthe wireless network.
Authentication and encryption are the two primaryfacilities for securing the WLAN. While encryption usingstatic WEP keys is very vulnerable, WLANs can now beconfigured to support EAP and the 802.1x standardsincluding LEAP, EAP-FAST, EAP-TLS, PEAP, WPA,and WPA2.
-
8/3/2019 Module scurit13-140
35/35
Resources
Addressing Wireless Threats with Integrated Wireless
IDS and IPShttp://www.cisco.com/en/US/products/hw/modules/ps2706/products_white_paper0900aecd804f155b.shtml
Five Steps to Securing Your Wireless LAN and
Preventing Wireless Threatshttp://www.cisco.com/en/US/netsol/ns340/ns394/ns348/ns386/networking_solutions_white_paper0900aecd8042e23b.shtml
Wireless LAN Security White Paper
http://www.cisco.com/en/US/netsol/ns340/ns394/ns348/ns386/networking_solutions_white_paper09186a00800b469f.shtml
Security of the WEP algorithm
http://www.isaac.cs.berkeley.edu/isaac/wep-faq.html
http://www.cisco.com/en/US/products/hw/modules/ps2706/products_white_paper0900aecd804f155b.shtmlhttp://www.cisco.com/en/US/products/hw/modules/ps2706/products_white_paper0900aecd804f155b.shtmlhttp://www.cisco.com/en/US/netsol/ns340/ns394/ns348/ns386/networking_solutions_white_paper0900aecd8042e23b.shtmlhttp://www.cisco.com/en/US/netsol/ns340/ns394/ns348/ns386/networking_solutions_white_paper0900aecd8042e23b.shtmlhttp://www.cisco.com/en/US/netsol/ns340/ns394/ns348/ns386/networking_solutions_white_paper09186a00800b469f.shtmlhttp://www.cisco.com/en/US/netsol/ns340/ns394/ns348/ns386/networking_solutions_white_paper09186a00800b469f.shtmlhttp://www.isaac.cs.berkeley.edu/isaac/wep-faq.htmlhttp://www.isaac.cs.berkeley.edu/isaac/wep-faq.htmlhttp://www.isaac.cs.berkeley.edu/isaac/wep-faq.htmlhttp://www.isaac.cs.berkeley.edu/isaac/wep-faq.htmlhttp://www.cisco.com/en/US/netsol/ns340/ns394/ns348/ns386/networking_solutions_white_paper09186a00800b469f.shtmlhttp://www.cisco.com/en/US/netsol/ns340/ns394/ns348/ns386/networking_solutions_white_paper09186a00800b469f.shtmlhttp://www.cisco.com/en/US/netsol/ns340/ns394/ns348/ns386/networking_solutions_white_paper0900aecd8042e23b.shtmlhttp://www.cisco.com/en/US/netsol/ns340/ns394/ns348/ns386/networking_solutions_white_paper0900aecd8042e23b.shtmlhttp://www.cisco.com/en/US/products/hw/modules/ps2706/products_white_paper0900aecd804f155b.shtmlhttp://www.cisco.com/en/US/products/hw/modules/ps2706/products_white_paper0900aecd804f155b.shtml