Module sécurité13-140

download Module sécurité13-140

of 35

Transcript of Module sécurité13-140

  • 8/3/2019 Module scurit13-140

    1/35

    2006 Cisco Systems, Inc. All rights reserved.

    Objectives

    Describe the need for WLAN security.

    Describe the evolution of WLAN security methods.

    Identify common authentication and encryptiontechnologies used in WLANs.

    Explain the benefits and weaknesses of the commonsecurity methods used in WLANs.

  • 8/3/2019 Module scurit13-140

    2/35

    2006 Cisco Systems, Inc. All rights reserved.

    The Need for WLAN Security

    Vulnerabilities:

    War driving

    Non-secret SSID

    MAC filtering

    Automatic DHCP

    Man-in-the middle attacks

    Cracking WEP

    Initialization Vector attacks

    Password Cracking

    DoS attacks

    WLAN Security requires:

    Authentication: Proves the user belongs on the network

    Encryption: Protects the data traversing the network

  • 8/3/2019 Module scurit13-140

    3/35

    2006 Cisco Systems, Inc. All rights reserved.

    802.11 Security Basics

    Data privacy

    Authentication, authorization and accounting (AAA)

    Segmentation

    Monitoring

    Policy

  • 8/3/2019 Module scurit13-140

    4/35

    2006 Cisco Systems, Inc. All rights reserved.

    Evolution of WLAN Security

  • 8/3/2019 Module scurit13-140

    5/35

    2006 Cisco Systems, Inc. All rights reserved.

    Legacy 802.11 Security

    Legacy Authentication

    Static WEP encryption

    MAC Filters

    SSID Cloaking

  • 8/3/2019 Module scurit13-140

    6/35

    2006 Cisco Systems, Inc. All rights reserved.

    802.11 WEP

    WEP aims at providing Wired Equivalent Privacy

    WEP is an optional IEEE standard for encryption

    Keys can be static and shared among many clients

    Uses RC4 algorithmknown vulnerabilities

    Keys can be dynamic and unique for each client(as with 802.1x) per session

    0 1 0 1

    1 1 0 0

    1 0 0 1

    RC4

    Plain text

    Cipher text

    IV + key

    seed

    keystream

  • 8/3/2019 Module scurit13-140

    7/35 2006 Cisco Systems, Inc. All rights reserved.

    802.11 Open Authentication

    1. Client sends probe request.2. Access points (A/B) send probe response. Client

    evaluates access point response and selects thebest access point.

    3. Client sends authentication request to selectedaccess point (A).

    4. Access point A confirms authentication andregisters client.

    5. Client sends association request to selectedaccess point (A).

    6. Access point A confirms association and registersclient.

    AccessPoint A

    AccessPoint B

  • 8/3/2019 Module scurit13-140

    8/35 2006 Cisco Systems, Inc. All rights reserved.

    802.11 Shared Key Authentication

    4. Access point A sends authentication response containingthe unencrypted challenge text.

    5. Client encrypts the challenge text using one of its WEP keysand sends it to access point (A).

    6. Access point A compares the encrypted challenge text to itscopy of the encrypted challenge text. If the text is the same,access point A will allow the client onto the WLAN.

    AccessPoint A

    AccessPoint B

    Steps 1-3 are the same as with open authentication.

  • 8/3/2019 Module scurit13-140

    9/35 2006 Cisco Systems, Inc. All rights reserved.

    Cisco Enhanced 802.11 WEP Security

    Cisco prestandard enhancements

    Implemented in 2001 and 2002

    Authentication:

    802.1x and Extensible Authentication Protocol (EAP) protocols

    User, token, and machine credentials

    Dynamic encryption key generation

    Encryption:

    CKIP (Cisco Key Integrity Protocol )

    CMIC (Cisco Message Integrity Check )

  • 8/3/2019 Module scurit13-140

    10/35 2006 Cisco Systems, Inc. All rights reserved.

    Enhanced 802.11 Security

    Authentication:

    802.1x and Extensible Authentication Protocol (EAP) protocols

    User, token, and machine credentials

    Dynamic encryption key generation

    IEEE 802.11i

    Encryption:TKIP (Temporal Key Integrity Protocol) and MIC

    Wi-Fi Protected Access (WPA)TKIP encryption

    WPA2Advanced Encryption Standard (AES)

  • 8/3/2019 Module scurit13-140

    11/35 2006 Cisco Systems, Inc. All rights reserved.

    EncryptionTKIP and MIC

    TKIP (Temporal Key Integrity Protocol):

    Key hashing for unique seed values per packet to protectagainst WEP initialization vector vulnerabilities

    MIC from Michael algorithm

    Broadcast key rotation

    MIC (message integrity check ):

    Provides more protection than Integrity Check Value (ICV) byprotecting the header and the payload

    Protects against man-in-the-middle or replay attacks

  • 8/3/2019 Module scurit13-140

    12/35 2006 Cisco Systems, Inc. All rights reserved.

    WPA2 and AES

    WPA2 offers the following:Authenticated key management

    Key validation mechanisms for unicast and broadcast keys

    TKIP is used, which for WPA includes both per-packet keyingand MIC

    Expanded IV (defeats AirSnort)

    Broadcast key rotation

    AES Encryption:

    128-bit block ciphercryptographically more robustthan RC4

    Requires new radio cards on clients and access points becausemore CPU power is required

  • 8/3/2019 Module scurit13-140

    13/35 2006 Cisco Systems, Inc. All rights reserved.

    802.1x Authentication Overview

    The wireless client must be authenticated before it

    gains access to the network

    Extensible and interoperable supports:

    Different EAP authentication methods or types

    May be used with multiple encryption algorithms

    Depends on client capability

    Supported by Cisco since December 2000

  • 8/3/2019 Module scurit13-140

    14/35 2006 Cisco Systems, Inc. All rights reserved.

    802.1x Authentication Key Benefits

    Mutual authentication between client and authentication

    (RADIUS) server

    Encryption keys derived after authentication

    Centralized policy control

  • 8/3/2019 Module scurit13-140

    15/35 2006 Cisco Systems, Inc. All rights reserved.

    802.1x and EAP Authentication Protocols

    LEAPEAP Cisco Wireless

    EAP-FAST (flexible authentication via secure tunnel)

    EAP-TLS (Transport layer secure)

    PEAP:

    PEAP-GTC

    PEAP-MSCHAPv2

  • 8/3/2019 Module scurit13-140

    16/35 2006 Cisco Systems, Inc. All rights reserved.

    Components Required for 802.1xAuthentication

    Authentication server is an EAP-capable RADIUS server:

    Cisco Secure ACS, Microsoft IAS, Meetinghouse Aegis

    Local authentication service on Cisco IOS access point

    May use either local RADIUS database or an external database server such asMicrosoft Active Directory or RSA SecurID

    Authenticator is an 802.1x-capable access point.

    Supplicant is an EAP-capable client:Requires 802.1x-capable driver

    Requires an EAP supplicanteither available with client card, native inoperating system, or from third-party software

  • 8/3/2019 Module scurit13-140

    17/35 2006 Cisco Systems, Inc. All rights reserved.

    Comparaison chart on various types of EAP

  • 8/3/2019 Module scurit13-140

    18/35 2006 Cisco Systems, Inc. All rights reserved.

    Comparaison chart on various types of EAP

  • 8/3/2019 Module scurit13-140

    19/35 2006 Cisco Systems, Inc. All rights reserved.

    Cisco LEAP

    Client support:

    Windows 98-XP-Vista, Windows CE, Macintosh OS 9.X or 10.X,and Linux Kernel 2.2 or 2.4

    Cisco Compatible Extensions Clients (CCXv1)

    RADIUS server:

    Cisco Secure ACS and Cisco Access RegistrarMeetinghouse Aegis

    Interlink Merit

    Microsoft domain or Active Directory (optional) for back-

    end authentication (must be Microsoft format database) Device support:

    Cisco autonomous access points and bridges

    Cisco lightweight access points and WLAN controllers

    Cisco Unified Wireless IP Phone 7920 (VoIP) handset

  • 8/3/2019 Module scurit13-140

    20/35 2006 Cisco Systems, Inc. All rights reserved.

    Cisco LEAP Authentication

  • 8/3/2019 Module scurit13-140

    21/35 2006 Cisco Systems, Inc. All rights reserved.

    EAP-FAST: Flexible Authentication via SecureTunneling

    Considered in three phases:

    Protected access credential is generated in Phase 0 (DynamicPAC provisioning):

    Unique shared credential used to mutually authenticate clientand server

    Associated with a specific user ID and an authority IDRemoves the need for PKI

    A secure tunnel is established in Phase 1.

    Client is authenticated via the secure tunnel in Phase 2.

  • 8/3/2019 Module scurit13-140

    22/35 2006 Cisco Systems, Inc. All rights reserved.

    EAP-FAST Authentication

  • 8/3/2019 Module scurit13-140

    23/35 2006 Cisco Systems, Inc. All rights reserved.

    EAP-TLS

    Client support:

    Windows 2000, XP, and Windows CE (natively supported)

    Non-Windows platforms: Third-party supplicants(Meetinghouse)

    User certificate required for each client

    Infrastructure requirements:

    EAP-TLS-supported RADIUS server

    Cisco Secure ACS, Cisco Access Registrar, Microsoft IAS,Aegis, Interlink

    RADIUS server requires a server certificate

    Certificate authority server (PKI)

    Certificate management:

    Both client and RADIUS server certificates to be managed

  • 8/3/2019 Module scurit13-140

    24/35 2006 Cisco Systems, Inc. All rights reserved.

    EAP-TLS Authentication

  • 8/3/2019 Module scurit13-140

    25/35

    2006 Cisco Systems, Inc. All rights reserved.

    EAP-PEAP

    Hybrid authentication method:

    Server-side authentication with TLS

    Client-side authentication with EAP authentication types

    EAP-GTC

    EAP-MSCHAPv2

    Clients do not require certificates.

    RADIUS server requires a server certificate:

    RADIUS server has self-issuing certificate capability.

    Purchase a server certificate per server from PKI entity.

    Set up a simple PKI server to issue server certificates.

    Allows for one-way authentication types to be used:

    One-time passwords

    Proxy to LDAP, Unix, Microsoft Windows NT and Active Directory,Kerberos

  • 8/3/2019 Module scurit13-140

    26/35

    2006 Cisco Systems, Inc. All rights reserved.

    EAP-PEAP Authentication

  • 8/3/2019 Module scurit13-140

    27/35

    2006 Cisco Systems, Inc. All rights reserved.

    Wi-Fi Protected Access

    WPA introduced in late 2003

    Prestandard implementation of IEEE 802.11i WLAN security

    Addresses currently known security problems with WEP

    Allows software upgrade on deployed 802.11 equipment toimprove security

    Components of WPA:

    Authenticated key management using 802.1x: EAP authentication andpreshared key authentication

    Unicast and broadcast key management

    Standardized TKIP per-packet keying and MIC protocol

    Initialization vector space expansion: 48-bit initialization vectors

    Migration modecoexistence of WPA and non-WPA devices (optionalimplementation that is not required for WPA certification)

  • 8/3/2019 Module scurit13-140

    28/35

    2006 Cisco Systems, Inc. All rights reserved.

    802.11i and WPA Authentication and KeyManagement Overview

  • 8/3/2019 Module scurit13-140

    29/35

    2006 Cisco Systems, Inc. All rights reserved.

    WPA Issues

    WPA uses TKIP, which uses the same base encryption

    algorithm, RC4, as WEP.

    WPA cannot entirely avoid the design flaws of WEP.

    WPA is a compromise solution.

    Software upgrade is required for clients and accesspoints, which gives no guarantee that all vendors willsupport the solution.

    Operating system support or a supplicant client is

    required.

    WPA is susceptible to a new type of DoS attack.

    WPA is susceptible to a recently discovered weaknesswhen preshared keys are used.

  • 8/3/2019 Module scurit13-140

    30/35

    2006 Cisco Systems, Inc. All rights reserved.

    IEEE 802.11iWPA2

    802.11i:

    Ratified in June 2004

    Standardizes:

    802.1x for authentication

    AES encryptionFacilitates U.S. government FIPS 140-2

    complianceKey management

    WPA2:

    Supplement to WPA version 1Wi-Fi Alliance interoperable

    implementation of 802.11iProvides for AES encryption to be used

    Proactive Key Caching

    Third-party testing and certification for WLAN device

    compatibility

  • 8/3/2019 Module scurit13-140

    31/35

    2006 Cisco Systems, Inc. All rights reserved.

    Wireless Intrusion Detection Systems

    Address RF-related vulnerabilities:

    Detect, locate, and mitigate rogue devices

    Detect and manage RF interference

    Detect reconnaissance if possible

    Address standards-based vulnerabilities:

    Detect management frame and hijacking-style attacks

    Enforce security configuration policies

    Complementary functionality:

    Forensic analysisCompliance reporting

  • 8/3/2019 Module scurit13-140

    32/35

    2006 Cisco Systems, Inc. All rights reserved.

    WPA and WPA2 Modes

    WPA WPA2

    Enterprise mode

    (business,

    education,government)

    Authentication:IEEE 802.1x/EAP

    Encryption:TKIP/MIC

    Authentication:IEEE 802.1x/EAP

    Encryption:AES-CCMP

    Personal mode

    (SOHO, home,personal)

    Authentication:PSK

    Encryption:

    TKIP/MIC

    Authentication:PSK

    Encryption:

    AES-CCMP

  • 8/3/2019 Module scurit13-140

    33/35

    2006 Cisco Systems, Inc. All rights reserved.

    WPA2 Issues

    Client (supplicant) must have a WPA2 driver that

    supports EAP.

    RADIUS server must understand EAP.

    PEAP carries EAP types within a channel secured by

    TLS and so requires a server certificate. WPA2 is more computationally intensive with optional

    AES encryption.

    WPA2 may require new WLAN hardware to support

    AES encryption.

  • 8/3/2019 Module scurit13-140

    34/35

    2006 Cisco Systems, Inc. All rights reserved.

    Summary

    With increased reliance on WLANs, businesses are

    becoming more concerned about network security.Network managers need to provide end users withfreedom and mobility without offering intruders accessto the WLAN or the information sent and received onthe wireless network.

    Authentication and encryption are the two primaryfacilities for securing the WLAN. While encryption usingstatic WEP keys is very vulnerable, WLANs can now beconfigured to support EAP and the 802.1x standardsincluding LEAP, EAP-FAST, EAP-TLS, PEAP, WPA,and WPA2.

  • 8/3/2019 Module scurit13-140

    35/35

    Resources

    Addressing Wireless Threats with Integrated Wireless

    IDS and IPShttp://www.cisco.com/en/US/products/hw/modules/ps2706/products_white_paper0900aecd804f155b.shtml

    Five Steps to Securing Your Wireless LAN and

    Preventing Wireless Threatshttp://www.cisco.com/en/US/netsol/ns340/ns394/ns348/ns386/networking_solutions_white_paper0900aecd8042e23b.shtml

    Wireless LAN Security White Paper

    http://www.cisco.com/en/US/netsol/ns340/ns394/ns348/ns386/networking_solutions_white_paper09186a00800b469f.shtml

    Security of the WEP algorithm

    http://www.isaac.cs.berkeley.edu/isaac/wep-faq.html

    http://www.cisco.com/en/US/products/hw/modules/ps2706/products_white_paper0900aecd804f155b.shtmlhttp://www.cisco.com/en/US/products/hw/modules/ps2706/products_white_paper0900aecd804f155b.shtmlhttp://www.cisco.com/en/US/netsol/ns340/ns394/ns348/ns386/networking_solutions_white_paper0900aecd8042e23b.shtmlhttp://www.cisco.com/en/US/netsol/ns340/ns394/ns348/ns386/networking_solutions_white_paper0900aecd8042e23b.shtmlhttp://www.cisco.com/en/US/netsol/ns340/ns394/ns348/ns386/networking_solutions_white_paper09186a00800b469f.shtmlhttp://www.cisco.com/en/US/netsol/ns340/ns394/ns348/ns386/networking_solutions_white_paper09186a00800b469f.shtmlhttp://www.isaac.cs.berkeley.edu/isaac/wep-faq.htmlhttp://www.isaac.cs.berkeley.edu/isaac/wep-faq.htmlhttp://www.isaac.cs.berkeley.edu/isaac/wep-faq.htmlhttp://www.isaac.cs.berkeley.edu/isaac/wep-faq.htmlhttp://www.cisco.com/en/US/netsol/ns340/ns394/ns348/ns386/networking_solutions_white_paper09186a00800b469f.shtmlhttp://www.cisco.com/en/US/netsol/ns340/ns394/ns348/ns386/networking_solutions_white_paper09186a00800b469f.shtmlhttp://www.cisco.com/en/US/netsol/ns340/ns394/ns348/ns386/networking_solutions_white_paper0900aecd8042e23b.shtmlhttp://www.cisco.com/en/US/netsol/ns340/ns394/ns348/ns386/networking_solutions_white_paper0900aecd8042e23b.shtmlhttp://www.cisco.com/en/US/products/hw/modules/ps2706/products_white_paper0900aecd804f155b.shtmlhttp://www.cisco.com/en/US/products/hw/modules/ps2706/products_white_paper0900aecd804f155b.shtml