28
0 Issues in Wireless Security (WEP, WPA & 802.11i) Presented to the 18 th Annual Computer Security Applications Conference 11 December 2002 Brian R. Miller, Booz Allen Hamilton

Issues in Wireless Security (WEP, WPA & 802.11i)

  • Upload
    others

  • View
    4

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Issues in Wireless Security (WEP, WPA & 802.11i)

0

Issues in Wireless Security (WEP, WPA & 802.11i)Presented to the 18th Annual Computer Security Applications Conference11 December 2002

Brian R. Miller, Booz Allen Hamilton

Page 2: Issues in Wireless Security (WEP, WPA & 802.11i)

1

Overview4Examine current wireless security provided by

Wired Equivalent Privacy (WEP)

4Examine the wireless industry’s response to the issues of WEP and the Wi-Fi Alliance’s interim solution Wi-Fi Protected Access (WPA)

4Examine the security provided by the 802.11 Tgi standard

4Summary

Page 3: Issues in Wireless Security (WEP, WPA & 802.11i)

2

WEPWEP

Page 4: Issues in Wireless Security (WEP, WPA & 802.11i)

3

HubHub

APAP

Wired LANWired LAN

802.11 Security802.11 SecurityNo Security or provided through other meansNo Security or provided through other means

802.11 WEP Security is Inadequate

Security provided by 802.11a/b is ineffective.

Page 5: Issues in Wireless Security (WEP, WPA & 802.11i)

4

Key Problems With 802.11 Wireless LAN Security (WEP)4Repeat in key stream which allows easy decryption of data for a

moderately sophisticated adversary. (Short IV)

4Weak implementation of the RC4 algorithm leads to an efficient attack that allows key recovery

4Subject to brute force attacks (Short Keys)

4Easily compromised keys (Shared keys/No Key management)

4Message modification is possible

4No user authentication occurs

4Subject to Man in the Middle attacks

4Organizations are becoming hesitant to deploy 802.11 wireless technology due to weak security

Page 6: Issues in Wireless Security (WEP, WPA & 802.11i)

5

Short Term Solutions4Don’t use / Delay implementation of WLANS

– Federal Government and some commercial users are taking this approach

– Wait for Wi-Fi Protected Access (WPA)

4Use proprietary WEP security– WEP security with patches- Harder to break but still vulnerable– May force a vendor specific solution with poor interoperability

4 Robust Layer 2 Type-1– Harris SecNet 11 – NSA Approved for use in U.S government environments

with data classified up to secret– Provides robust security but prohibitively expensive (Approx $2500.00 per NIC)

4Implement VPN for access to the wired network4Security switch/gateway with “add-ons” to address other

security services

Page 7: Issues in Wireless Security (WEP, WPA & 802.11i)

6

Overview of the Evolution of WiFi Security Solutions/Stds (Illustrative only)

Time

1996 1997 1998 1999 2000 2001 2002 2003 2004 2005

Robust

Good

PoorWEP

WPA

802.11i

Sec

uri

ty

eap-TLS

LEAP

Secnet

eap-TTLS

WEP

LucentWEP

Bluesocket

Vernier

AirDefenseProxim

Reefedge

Clustering of solutions and partial solutions

TKIP

1Q03

4Q03

Page 8: Issues in Wireless Security (WEP, WPA & 802.11i)

7

Wi-Fi AllianceWi-Fi Alliance

Page 9: Issues in Wireless Security (WEP, WPA & 802.11i)

8

Wi-Fi Alliance4The Wi-Fi Alliance is a nonprofit international association

formed in 1999 to certify interoperability of wireless Local Area Network products based on IEEE 802.11 specification.

4In 2001 there were 100 Wi-Fi CertifiedProducts and today there are 500+ Wi-Ficertified products

4Industry is demanding a more secure wireless environment and can not wait for the 802.11i standard to be ratified next year.

4Wi-Fi Protected Access (WPA) is Wi-Fi Alliance’s response to the need for an immediate solution to the WEP problem and a recognition that the 802.11i standard is still too far off.

4Security Goal: Implement what is stable in 802.11i and bring it to market in WPA.

Page 10: Issues in Wireless Security (WEP, WPA & 802.11i)

9

WPAWPA

Page 11: Issues in Wireless Security (WEP, WPA & 802.11i)

10

Wi-Fi Protected Access (WPA)4WPA seeks to provide a standards based security

solution based 802.11i security features ahead of IEEE ratification

4Interim security solution that fixes all known WEP vulnerabilities

4Key features of WPA include:– Data Encryption -- TKIP (Temporal Key Integrity Protocol) using RC4

WEP

– User Authentication -- 802.1X EAP based authentication, PPK

– Message Integrity -- Michael Message Integrity Check

4WPA products certified by Wi-Fi alliance are expected to be available Q1 2003

Page 12: Issues in Wireless Security (WEP, WPA & 802.11i)

11

WPA: TKIP Design Requirements

4Designed so that only software or firmware upgrades are required to use WPA functionality on existing/legacy hardware

4Must be designed to be used on 33 or 25 MHz ARM7 or i486 already running at 90% CPU

4Result: TKIP designed to use existing WEP off-load hardware as a part of the encryption process

Page 13: Issues in Wireless Security (WEP, WPA & 802.11i)

12

TKIP Design

Phase 2Mixer

Phase 1Mixer

Intermediate key

Per-packet keyTransmit Address: 00-A0-C9-BA-4D-5F

Base key

Packet Sequence #

4 msb

2 lsb

Plain Text Cipher Text+

RC4Hardware

Software

4TKIP is designed as a wrapper around WEP to accommodate existing hardware so upgrades can be made

Page 14: Issues in Wireless Security (WEP, WPA & 802.11i)

13

WPA Benefits4Improved Cryptography

4Strong Network access control

4Will Support 802.1x, EAP, EAP-TLS, Radius, and Pre-Placed Keys

4Key Management

4Replay Protection

4Provides for data and header integrity

4Is expected to provides forward compatibility with full 802.11i standard when it is ratified.

Page 15: Issues in Wireless Security (WEP, WPA & 802.11i)

14

Issues: WPA4While TKIP & Michael significantly improve WEP

security, design limitations result in cryptographic weaknesses

4While components have been designed and scrutinized by well-known cryptographers, a pragmatic sacrifice of bullet-proof security to minimize performance degradation on existing hardware.

4Note: TKIP designers do not expect a potential successful attack on WPA is not expected to be simple or cheap

4How strong is WPA really?

Page 16: Issues in Wireless Security (WEP, WPA & 802.11i)

15

Recommendation: WPA4Migrate existing wireless infrastructure to WPA

through software and firmware upgrades when available. (Q1/Q2 2003)

4Evaluate the sensitivity of data to be transmitted wirelessly and implement wireless networks using WPA accordingly.

4Look to future products that will support the full 802.11i standard.

Page 17: Issues in Wireless Security (WEP, WPA & 802.11i)

16

802.11i, WPA v2802.11i, WPA v2

Page 18: Issues in Wireless Security (WEP, WPA & 802.11i)

17

IEEE 802.11i4Long-term security solution for 802.11 wireless

LANs

4Key features include:– (WPA) Encryption: TKIP using RC4 – Legacy Device Support– (WPA) Message Integrity -- Michael Message Integrity Check– Encryption/Message Integrity: AES-CCMP Using Advanced

Encryption Standard (AES) – New hardware– User Authentication -- 802.1X EAP based authentication, PPK– PPK– Roaming/Pre Authentication– Ad Hoc Networking

4802.11i products certified by Wi-Fi alliance are expected to be available Q1 2004

Page 19: Issues in Wireless Security (WEP, WPA & 802.11i)

18

802.11i Benefits4Strong Cryptography

4Support for Legacy Equipment

4Strong Network Access Control

4Will Support 802.1x, EAP, EAP-TLS, Radius, and Pre-Placed Keys

4Key Management

4Replay Protection

4Provides for data and Header Integrity

4Roaming Support

Page 20: Issues in Wireless Security (WEP, WPA & 802.11i)

19

Issues: 802.11i4May require hardware upgrade due to the

processing requirements of AES.– Note: Some implementations may take advantage of host

processing power and only require a software and/or a firmware upgrade.

4Consumers may not effectively plan for migration to 802.11i resulting in reliance on WPA longer than advisable.

Page 21: Issues in Wireless Security (WEP, WPA & 802.11i)

20

Recommendations: 802.11i4After final ratification of the 802.11i standard,

migrate to the standard as soon as feasible. (approximately Q1 2004)

4Organizations should look to 802.11i for roaming requirements of mobile VoIP and mobile devices.

Page 22: Issues in Wireless Security (WEP, WPA & 802.11i)

21

SummarySummary

Page 23: Issues in Wireless Security (WEP, WPA & 802.11i)

22

Evolution of WiFi Security (Illustrative only)

WEP

WPA

802.11i

(WPA v2)

1997 - 2002 2004 – X years2003 - 2003

Sec

uri

ty

Time

Additional Security

Wi-Fi Alliance

Poor Security

Improved Security

Robust Security

Page 24: Issues in Wireless Security (WEP, WPA & 802.11i)

23

Conclusion4WEP is Broken

4WPA Provides an interim solution to the WEP problem and long term support for legacy wireless infrastructure. (Q1/Q2 2003)

4The full 802.11i standard is expected to provide the robust security needed for wireless environments in the future.

Page 25: Issues in Wireless Security (WEP, WPA & 802.11i)

24

Thank You

Page 26: Issues in Wireless Security (WEP, WPA & 802.11i)

25

Presenter Information

Brian R. Miller

Booz Allen Hamilton, Wireless Security

703/902-5189 (office)

703/328-2719 (cellular)

Miller_Brian_R@ bah.com (email)

Page 27: Issues in Wireless Security (WEP, WPA & 802.11i)

26

Questions?

Page 28: Issues in Wireless Security (WEP, WPA & 802.11i)

27

WEP TKIP AES-CCMPCipher RC4 RC4 AESKey Size 40 or 104 bits 128 bits 128 bits

encryption,64 bit auth

Key Life 24-bit IV, wrap 48-bit IV 48-bit IVPacket Key Concat. Mixing Fnc Not NeededIntegrity

Data CRC-32 Michael CCMHeader None Michael CCM

Replay None Use IV Use IVKey Mgmt. None EAP-based EAP-based

802.11iWPA