64
1 © 2001, Cisco Systems, Inc. All rights reserved. Presentation_ID

Presentation IDcs.uccs.edu/~gsc/pub/master/pjfong/UCCS Project/Cisco Presentatio… · © 2001, Cisco Systems, Inc. All rights reserved. 4 Session Number Presentation_ID An oxymoron

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Presentation IDcs.uccs.edu/~gsc/pub/master/pjfong/UCCS Project/Cisco Presentatio… · © 2001, Cisco Systems, Inc. All rights reserved. 4 Session Number Presentation_ID An oxymoron

111© 2001, Cisco Systems, Inc. All rights reserved.Presentation_ID

Page 2: Presentation IDcs.uccs.edu/~gsc/pub/master/pjfong/UCCS Project/Cisco Presentatio… · © 2001, Cisco Systems, Inc. All rights reserved. 4 Session Number Presentation_ID An oxymoron

2© 2001, Cisco Systems, Inc. All rights reserved.

Session NumberPresentation_ID

Denver Tech Days 2002WLAN Security

Mike Morrato

System Engineer

Cisco Systems

April 10, 2002

Page 3: Presentation IDcs.uccs.edu/~gsc/pub/master/pjfong/UCCS Project/Cisco Presentatio… · © 2001, Cisco Systems, Inc. All rights reserved. 4 Session Number Presentation_ID An oxymoron

333© 2001, Cisco Systems, Inc. All rights reserved.Presentation_ID

Agenda

• Past security methods in Wireless LANs

• The problem with 802.11 - Wireless Insecurity

• The standards based fix - 802.1x / EAP-TLS / LEAP

• Cisco security enhancements

• Bringing it all together

• Conclusion

Page 4: Presentation IDcs.uccs.edu/~gsc/pub/master/pjfong/UCCS Project/Cisco Presentatio… · © 2001, Cisco Systems, Inc. All rights reserved. 4 Session Number Presentation_ID An oxymoron

4© 2001, Cisco Systems, Inc. All rights reserved.

Session NumberPresentation_ID

An oxymoron by anyone’s standards

The original 802.11 security

Page 5: Presentation IDcs.uccs.edu/~gsc/pub/master/pjfong/UCCS Project/Cisco Presentatio… · © 2001, Cisco Systems, Inc. All rights reserved. 4 Session Number Presentation_ID An oxymoron

555© 2001, Cisco Systems, Inc. All rights reserved.Presentation_ID

Past Security Methods

• SSID (Service Set Identifier)Commonly used feature in Wireless LANs which provides a rudimentary level of security.

Serves to logically segment the users and Access Points that form part of a Wireless subsystem.

May be advertised or manually pre-configured at the station.

Page 6: Presentation IDcs.uccs.edu/~gsc/pub/master/pjfong/UCCS Project/Cisco Presentatio… · © 2001, Cisco Systems, Inc. All rights reserved. 4 Session Number Presentation_ID An oxymoron

666© 2001, Cisco Systems, Inc. All rights reserved.Presentation_ID

Wired Equivalent Privacy WEP

• Uses the RC4 stream cipher of RSA Data Security, Inc. (RSADSI) for encryption.

• RC4 Keystream = (24 bits IV , static WEP Key)

• Key must be shared by both the encrypting and decrypting endpoints.

• IEEE 802.11 has chosen to define how 40-bit keys work. Several vendors like Cisco support 128-bit WEP encryption with their WLAN solutions.

• Key distribution or key negotiation is not mentioned in the standard.

Page 7: Presentation IDcs.uccs.edu/~gsc/pub/master/pjfong/UCCS Project/Cisco Presentatio… · © 2001, Cisco Systems, Inc. All rights reserved. 4 Session Number Presentation_ID An oxymoron

777© 2001, Cisco Systems, Inc. All rights reserved.Presentation_ID

MAC Filtering

• A list of allowed or disallowed MAC addresses

• Same shortcomings as static WEP key management

Page 8: Presentation IDcs.uccs.edu/~gsc/pub/master/pjfong/UCCS Project/Cisco Presentatio… · © 2001, Cisco Systems, Inc. All rights reserved. 4 Session Number Presentation_ID An oxymoron

888© 2001, Cisco Systems, Inc. All rights reserved.Presentation_ID

IV Key Hashing

IV BASE KEY

STREAM CIPHER

PLAINTEXT DATA

CIPHERTEXT DATAXORRC4

Standard WEP Encryption

Page 9: Presentation IDcs.uccs.edu/~gsc/pub/master/pjfong/UCCS Project/Cisco Presentatio… · © 2001, Cisco Systems, Inc. All rights reserved. 4 Session Number Presentation_ID An oxymoron

999© 2001, Cisco Systems, Inc. All rights reserved.Presentation_ID

What is an IV?

• IV is short for INITIALIZATION VECTOR

• 24 bits long (24 bits IV + 104 bits WEP key = 128 bits)

• Same plaintext packet should not generate same ciphertext packet

• Random, and changes per packet

Page 10: Presentation IDcs.uccs.edu/~gsc/pub/master/pjfong/UCCS Project/Cisco Presentatio… · © 2001, Cisco Systems, Inc. All rights reserved. 4 Session Number Presentation_ID An oxymoron

10© 2001, Cisco Systems, Inc. All rights reserved.

Session NumberPresentation_ID

Hacked in 180 seconds

Wireless Insecurity : What went wrong

Page 11: Presentation IDcs.uccs.edu/~gsc/pub/master/pjfong/UCCS Project/Cisco Presentatio… · © 2001, Cisco Systems, Inc. All rights reserved. 4 Session Number Presentation_ID An oxymoron

111111© 2001, Cisco Systems, Inc. All rights reserved.Presentation_ID

Wireless LAN

Client (user machine, pda ) Access Point

Wired Ethernet LAN

Easy to sniff with available wireless

sniffers !!

“Wireless is like having an RJ45 in my parking lot.”

Page 12: Presentation IDcs.uccs.edu/~gsc/pub/master/pjfong/UCCS Project/Cisco Presentatio… · © 2001, Cisco Systems, Inc. All rights reserved. 4 Session Number Presentation_ID An oxymoron

121212© 2001, Cisco Systems, Inc. All rights reserved.Presentation_ID

Authentication/ Association

• Association is the process of associating a client with a given access point in the WLAN.

• Authentication is the process of verifying the credentials of a client desiring to join a WLAN.

Page 13: Presentation IDcs.uccs.edu/~gsc/pub/master/pjfong/UCCS Project/Cisco Presentatio… · © 2001, Cisco Systems, Inc. All rights reserved. 4 Session Number Presentation_ID An oxymoron

131313© 2001, Cisco Systems, Inc. All rights reserved.Presentation_ID

SSID problem

• 32 ASCII character string

• Under 802.11, any client with a ‘NULL’ string will associate to any AP regardless of SSID setting on AP

• This is NOT a security feature!

Page 14: Presentation IDcs.uccs.edu/~gsc/pub/master/pjfong/UCCS Project/Cisco Presentatio… · © 2001, Cisco Systems, Inc. All rights reserved. 4 Session Number Presentation_ID An oxymoron

141414© 2001, Cisco Systems, Inc. All rights reserved.Presentation_ID

Issues with WEP/RC4

IV MSDU ICV

Encrypted

0-2304 4

Initialization Vector Pad Key ID

2624

Octets

Bits

- RC4 stream cipher poorly suited in environment with packet loss- Known plaintext attacks are easy against RC4

(Watch Shared-key authentication !!)- Bad use of the IV initialisation vector. Part of the key- ICV : CRC-32 linear, bad choice again ! Cryptographicly insecure.

Page 15: Presentation IDcs.uccs.edu/~gsc/pub/master/pjfong/UCCS Project/Cisco Presentatio… · © 2001, Cisco Systems, Inc. All rights reserved. 4 Session Number Presentation_ID An oxymoron

151515© 2001, Cisco Systems, Inc. All rights reserved.Presentation_ID

Classes of Attacks Against WEP v1.0

• IV (key) reuse Made possible by small IV space in WEPv1.0, lack of IV replay

protection

Enables statistical attack against ciphertexts w/reused IVs

• Known plaintext attackLots of known plaintext in IP traffic: ICMP, ARP, TCP ACK, etc.

Can send pings from Internet through AP to snooping attacker

Enables recovery of key stream of length N for a given IV

Can forge packets of size N by reusing IV in absence of a keyed MIC

Page 16: Presentation IDcs.uccs.edu/~gsc/pub/master/pjfong/UCCS Project/Cisco Presentatio… · © 2001, Cisco Systems, Inc. All rights reserved. 4 Session Number Presentation_ID An oxymoron

161616© 2001, Cisco Systems, Inc. All rights reserved.Presentation_ID

Classes of Attacks (cont’d)

• Partial known plaintextMay only know a portion of the plaintext (e.g. IP header)

Possible to recover M octets of the keystream, M < N

Via repeated probing, can extend keystream from M to N [Arbaugh]

Possible to flip bits in realtime, adjust CRC32, divert traffic to attacker

Enabled by linearity of CRC32, absence of keyed MIC

• Authentication forgingWEP v1.0 encrypts challenge using IV chosen by client

Recovery of key stream for a given IV enables re-use of that IV for forging WEP v1.0 authentication

Does not provide key, so can’t join LAN

Page 17: Presentation IDcs.uccs.edu/~gsc/pub/master/pjfong/UCCS Project/Cisco Presentatio… · © 2001, Cisco Systems, Inc. All rights reserved. 4 Session Number Presentation_ID An oxymoron

171717© 2001, Cisco Systems, Inc. All rights reserved.Presentation_ID

Classes of Attacks (cont’d)

• Denial of serviceDisassociate, reassociate messages not authenticated

• Dictionary attackPossible where WEP keys derived from passwords

• Realtime decryptionRepeated IV reuse, probing enables building of a dictionary of IVs, key

streams

Enables decryption of traffic in realtime

Possible to store dictionary due to small IV space

Need 1500 octets of key stream for each IV

2^24 * 1500 octets = 24 GB

Page 18: Presentation IDcs.uccs.edu/~gsc/pub/master/pjfong/UCCS Project/Cisco Presentatio… · © 2001, Cisco Systems, Inc. All rights reserved. 4 Session Number Presentation_ID An oxymoron

181818© 2001, Cisco Systems, Inc. All rights reserved.Presentation_ID

Issues of WEP/RC4

• Issue #1: Stateless Protocol

? Replay Attack

• Issue #2: Linear Checksum

? Packet Modification (bits flip)

• Issue #3: IV Reuse

Page 19: Presentation IDcs.uccs.edu/~gsc/pub/master/pjfong/UCCS Project/Cisco Presentatio… · © 2001, Cisco Systems, Inc. All rights reserved. 4 Session Number Presentation_ID An oxymoron

191919© 2001, Cisco Systems, Inc. All rights reserved.Presentation_ID

IV Reuse Problem

• RC4 keystream should not be reused

• Two packets P1 and P2 with same IV

• C1 = P1 XOR RC4(k||IV)

• C2 = P2 XOR RC4(k||IV)

• C1 XOR C2 = P1 XOR P2

• Known plaintext P1 gives P2, or usestatistical analysis to find P1 and P2

• How to get known plaintext?

IP traffic pretty predictable

Authentication challenge

Send packets from outside

Page 20: Presentation IDcs.uccs.edu/~gsc/pub/master/pjfong/UCCS Project/Cisco Presentatio… · © 2001, Cisco Systems, Inc. All rights reserved. 4 Session Number Presentation_ID An oxymoron

202020© 2001, Cisco Systems, Inc. All rights reserved.Presentation_ID

IV Collision: Can it happen?

• IV space – 2^24 possibilities ~ 16.7 Million

• Rough estimate: a busy AP sends 1000pps

• What if random IVs were used?

•Collision after 4000 packets? collision every 4s!

• Even with counting IV (best case)? rollover every few hours

Page 21: Presentation IDcs.uccs.edu/~gsc/pub/master/pjfong/UCCS Project/Cisco Presentatio… · © 2001, Cisco Systems, Inc. All rights reserved. 4 Session Number Presentation_ID An oxymoron

212121© 2001, Cisco Systems, Inc. All rights reserved.Presentation_ID

Papers on WLAN Security

University of California, Berkeley

University of Maryland

Scott Fluhrer, Itsik Mantin, and Adi Shamir

Feb. 2001 April 2001 July 2001

Focuses on static WEP; discusses need for key management

Focuses on authentication; identifies flaws in one vendor’s proprietary scheme

Focuses on inherent weaknesses in RC4; describes pragmatic attacks against RC4/WEP

* “In practice, most installations use a single key that is shared between all mobile stations and access points. More sophisticated key management techniques can be used to help defend from the attacks we describe…”? University of California, Berkeley report on WEP security, http://www.isaac.cs.berkeley.edu/isaac/wep-faq.html

Page 22: Presentation IDcs.uccs.edu/~gsc/pub/master/pjfong/UCCS Project/Cisco Presentatio… · © 2001, Cisco Systems, Inc. All rights reserved. 4 Session Number Presentation_ID An oxymoron

222222© 2001, Cisco Systems, Inc. All rights reserved.Presentation_ID

Recent Attacks

• Weak IV Attack

Key recovery possible due to statistical analysis of plaintext and ‘weak’ IV

• Berkeley Attack

DoS and key derivation via bit flipping and replay attacks

Page 23: Presentation IDcs.uccs.edu/~gsc/pub/master/pjfong/UCCS Project/Cisco Presentatio… · © 2001, Cisco Systems, Inc. All rights reserved. 4 Session Number Presentation_ID An oxymoron

232323© 2001, Cisco Systems, Inc. All rights reserved.Presentation_ID

Weak IV attack

• July, 25, 2001

• http://www.crypto.com/papers/rc4_ksaproc.ps

• Paper from S. Fluhrer (Cisco Systems), I. Mantin and A. Shamir (Weizmann Institute)

- WEP 40 bits cracked in 15-30 minutesWith modern tools, can be cracked in 3-5 minutes

- Scales linearily with key length

Page 24: Presentation IDcs.uccs.edu/~gsc/pub/master/pjfong/UCCS Project/Cisco Presentatio… · © 2001, Cisco Systems, Inc. All rights reserved. 4 Session Number Presentation_ID An oxymoron

242424© 2001, Cisco Systems, Inc. All rights reserved.Presentation_ID

Weak IV attack

- August 6th, 2001

- Rice University

- http://www.cs.rice.edu/~astubble/wep/wep_attack.html

- Practical implementation of the attack

- Passive attack

- Mitigation by using discard on initial bytes of RC4 keystream

- Quicker Key rotation + discarding weak IV pairs

• Available “tool” based on the “Fluhrer” paper : Airsnort

• http://airsnort.sourceforge.net/

Page 25: Presentation IDcs.uccs.edu/~gsc/pub/master/pjfong/UCCS Project/Cisco Presentatio… · © 2001, Cisco Systems, Inc. All rights reserved. 4 Session Number Presentation_ID An oxymoron

252525© 2001, Cisco Systems, Inc. All rights reserved.Presentation_ID

Fluhrer/AirSnort Attack –Target Compromise

• Leverages ‘Weak’ IVs

large class of weak IVs that can be generated by RC4

Passive attack, but can be more effective if coupled with active attack.

• 2 Major Implementations

AirSnort v0.1.0

AT&T/Rice University (not released)

Page 26: Presentation IDcs.uccs.edu/~gsc/pub/master/pjfong/UCCS Project/Cisco Presentatio… · © 2001, Cisco Systems, Inc. All rights reserved. 4 Session Number Presentation_ID An oxymoron

262626© 2001, Cisco Systems, Inc. All rights reserved.Presentation_ID

UC Berkeley Attack

• Bit Flipping

Bits are flipped in WEP encrypted frames, and ICV CRC32 is recalculated.

• Replay

Bit flipped frames with known IVs resent.

AP accepts frame since CRC32 is correct

Layer 3 device will reject, and send predictable response

Response database built and used to derive key

Page 27: Presentation IDcs.uccs.edu/~gsc/pub/master/pjfong/UCCS Project/Cisco Presentatio… · © 2001, Cisco Systems, Inc. All rights reserved. 4 Session Number Presentation_ID An oxymoron

272727© 2001, Cisco Systems, Inc. All rights reserved.Presentation_ID

UC Berkeley Attack

PlainTextCisco WEP

CipherTextXXYYZZ

Stream Cipher

PredictedPlainText

Cisco

WEP

CipherTextXXYYZZ

Plaintext data is XORed with the WEPstream cipher to produce the encryptedCiphertext

If Ciphertext is XORed with guessedPlaintext, the stream cipher can bederived.

1234

Stream Cipher1234

Page 28: Presentation IDcs.uccs.edu/~gsc/pub/master/pjfong/UCCS Project/Cisco Presentatio… · © 2001, Cisco Systems, Inc. All rights reserved. 4 Session Number Presentation_ID An oxymoron

282828© 2001, Cisco Systems, Inc. All rights reserved.Presentation_ID

UC Berkeley Attack

Bit Flipped frame Sent

Frame passes ICVforwarded to DestMAC

Upper Layerprotocol fails CRCsends predictableerror message tosource MAC

AP WEP encryptsresponse andforwards to sourceMAC

Attacker anticipatesresponse from upperlayer device andattempts to derive key

Page 29: Presentation IDcs.uccs.edu/~gsc/pub/master/pjfong/UCCS Project/Cisco Presentatio… · © 2001, Cisco Systems, Inc. All rights reserved. 4 Session Number Presentation_ID An oxymoron

29© 2001, Cisco Systems, Inc. All rights reserved.

Session NumberPresentation_ID

LEAP & EAP-TLS overcome basic security issues

Knight in shining armor: 802.1x

Page 30: Presentation IDcs.uccs.edu/~gsc/pub/master/pjfong/UCCS Project/Cisco Presentatio… · © 2001, Cisco Systems, Inc. All rights reserved. 4 Session Number Presentation_ID An oxymoron

303030© 2001, Cisco Systems, Inc. All rights reserved.Presentation_ID

What Is 802.1X ?

• IEEE Standard in progress

• Port Based Network Access Control

Page 31: Presentation IDcs.uccs.edu/~gsc/pub/master/pjfong/UCCS Project/Cisco Presentatio… · © 2001, Cisco Systems, Inc. All rights reserved. 4 Session Number Presentation_ID An oxymoron

313131© 2001, Cisco Systems, Inc. All rights reserved.Presentation_ID

Advantages of 802.1x forWireless LAN Security

• Improved user authentication: username and password

• Dynamic, session-based encryption keys

• Centralized user administration

RADIUS support (RFC 2138, 2139) for centralized authentication, authorization, and accounting

RADIUS/EAP (draft-ietf-radius-ext-07.txt) for forwarding of EAP packets within RADIUS

Page 32: Presentation IDcs.uccs.edu/~gsc/pub/master/pjfong/UCCS Project/Cisco Presentatio… · © 2001, Cisco Systems, Inc. All rights reserved. 4 Session Number Presentation_ID An oxymoron

323232© 2001, Cisco Systems, Inc. All rights reserved.Presentation_ID

General Description ofIEEE 802.1x Terminology

Supplicant Authentication ServerAuthenticator

Operates on client EAP plug-in goes in RADIUS server

Operates on devices at network edge, like

APs and switches

semisemi--public networkpublic network enterprise networkenterprise networkenterprise edgeenterprise edge

EAP over wirelessEAP over wireless EAP over RADIUSEAP over RADIUSRADIUS server

Controlled port:Data traffic

Open port: Authentication traffic

Page 33: Presentation IDcs.uccs.edu/~gsc/pub/master/pjfong/UCCS Project/Cisco Presentatio… · © 2001, Cisco Systems, Inc. All rights reserved. 4 Session Number Presentation_ID An oxymoron

333333© 2001, Cisco Systems, Inc. All rights reserved.Presentation_ID

Before EAP Start

normal data

authentication traffic

802.1X traffic RADIUS traffic

802.11 association complete; data blocked by AP

AP “encapsulates” 802.1x traffic into RADIUS traffic, and visa versa

AP blocks everything but 802.1x-to-RADIUS authentication traffic

EAP over wirelessEAP over wireless EAP over RADIUSEAP over RADIUSRADIUS server

Page 34: Presentation IDcs.uccs.edu/~gsc/pub/master/pjfong/UCCS Project/Cisco Presentatio… · © 2001, Cisco Systems, Inc. All rights reserved. 4 Session Number Presentation_ID An oxymoron

343434© 2001, Cisco Systems, Inc. All rights reserved.Presentation_ID

EAP Steps

RADIUS server

EAPOL Start

Identity request

Identity response

EAP request

EAP response

EAP success

EAPOW key

Access request

Access challenge

Access request

Access success

Start process

Ask client for identity

Provide identity

Start using WEP

Deliver broadcast key, encrypted with session key

Pass request to RADIUS

Perform sequence defined by authentication method (e.g. EAP-TLS, LEAP)

Pass session key to AP

AP

Client receives or derives session key

Page 35: Presentation IDcs.uccs.edu/~gsc/pub/master/pjfong/UCCS Project/Cisco Presentatio… · © 2001, Cisco Systems, Inc. All rights reserved. 4 Session Number Presentation_ID An oxymoron

353535© 2001, Cisco Systems, Inc. All rights reserved.Presentation_ID

Why LEAP ?

• Cisco Lightweight EAP (LEAP) Authentication type• No native EAP support currently available on legacy

operating systems

• EAP-MD5 does not do mutual authentication

• EAP-TLS (certificates/PKI) too intense for security baseline feature-set

• Quick support on multitude of host systems

• Lightweight implementation reduces support requirements on host systems

• Need support in backend for delivery of session key to access points to speak WEP with client

Page 36: Presentation IDcs.uccs.edu/~gsc/pub/master/pjfong/UCCS Project/Cisco Presentatio… · © 2001, Cisco Systems, Inc. All rights reserved. 4 Session Number Presentation_ID An oxymoron

363636© 2001, Cisco Systems, Inc. All rights reserved.Presentation_ID

Cisco LEAP Overview

• Provides centralized, scalable, user based authentication

• Algorithm requires mutual authenticationNetwork authenticates client, client authenticates network

• Uses 802.1X for 802.11 authentication messagingAPs will support WinXP’s EAP-TLS also

• Dynamic WEP key support with WEP key session timeouts

Page 37: Presentation IDcs.uccs.edu/~gsc/pub/master/pjfong/UCCS Project/Cisco Presentatio… · © 2001, Cisco Systems, Inc. All rights reserved. 4 Session Number Presentation_ID An oxymoron

373737© 2001, Cisco Systems, Inc. All rights reserved.Presentation_ID

Why Cisco LEAP?

• EAP was intended for PPP, not WLAN

• IEEE 802.1x EAP over LAN (EAPOL) defines EAP encapsulation for Ethernet and Token Ring

• Need for mutual authentication between WLAN client and AAA server

• In 802.1X mutual authentication provided by

EAP TLS (Certificates)

EAP GSS_API (Kerberos)

Page 38: Presentation IDcs.uccs.edu/~gsc/pub/master/pjfong/UCCS Project/Cisco Presentatio… · © 2001, Cisco Systems, Inc. All rights reserved. 4 Session Number Presentation_ID An oxymoron

383838© 2001, Cisco Systems, Inc. All rights reserved.Presentation_ID

LEAP Steps

Start

challenge

response

broadcast key

username

challenge

response

AP sends client broadcast key, encrypted with session key

AP blocks all requests until LEAP completes

username

RADIUS server

authenticates client

Request identity

success success

challenge challenge

response response, key

Client authenti-cates RADIUS

server

key length

clientAP

RADIUS server

key

key

Page 39: Presentation IDcs.uccs.edu/~gsc/pub/master/pjfong/UCCS Project/Cisco Presentatio… · © 2001, Cisco Systems, Inc. All rights reserved. 4 Session Number Presentation_ID An oxymoron

393939© 2001, Cisco Systems, Inc. All rights reserved.Presentation_ID

Deriving the Session Key

hash (hash (password))

client challenge to RADIUS RADIUS challenge to client

RADIUS response to client client response to RADIUS

MD5

128-bit key

Page 40: Presentation IDcs.uccs.edu/~gsc/pub/master/pjfong/UCCS Project/Cisco Presentatio… · © 2001, Cisco Systems, Inc. All rights reserved. 4 Session Number Presentation_ID An oxymoron

404040© 2001, Cisco Systems, Inc. All rights reserved.Presentation_ID

How Often Does the Key Change?

• Every time a client roams to a new AP, it will go through the same authentication and session WEP key exercise

• The radius server will also require a new authentication/key at a timed interval (programmable).

• IETF Radius attribute #27 : “Session timeout”

• This provides different WEP keys often, and totally unique keys to each client

• NOTE: This is a global setting in ACS, and may adversely impact VPN or Dial-In users, if same group is used for LEAP

Page 41: Presentation IDcs.uccs.edu/~gsc/pub/master/pjfong/UCCS Project/Cisco Presentatio… · © 2001, Cisco Systems, Inc. All rights reserved. 4 Session Number Presentation_ID An oxymoron

414141© 2001, Cisco Systems, Inc. All rights reserved.Presentation_ID

Calculating WEP Timeout

• Best known implementation of Fluhrer attack can derive WEP key in 1,000,000 packets (AT&T/Rice University)

• To be conservative, assume 500,000 packets

• Max observable packet rate for client is 1,000pps @ 64 Byte packets

• 500,000 packets / 1000 pps = 8 min 20secs

• This is a WORST CASE value!

Page 42: Presentation IDcs.uccs.edu/~gsc/pub/master/pjfong/UCCS Project/Cisco Presentatio… · © 2001, Cisco Systems, Inc. All rights reserved. 4 Session Number Presentation_ID An oxymoron

42© 2001, Cisco Systems, Inc. All rights reserved.

Session NumberPresentation_ID

Message Integrity Check

WEP Key Hashing

Broadcast Key Rotation

Locking down intra-client communication

Cisco takes it one step further

Page 43: Presentation IDcs.uccs.edu/~gsc/pub/master/pjfong/UCCS Project/Cisco Presentatio… · © 2001, Cisco Systems, Inc. All rights reserved. 4 Session Number Presentation_ID An oxymoron

434343© 2001, Cisco Systems, Inc. All rights reserved.Presentation_ID

Message Integrity Check

• The MIC will protect WEP frames from being tampered with.

• The MIC is based on Seed value, Destination MAC, Source MAC, and payload.

Any change to these will change MIC value

• The MIC is included in the WEP encrypted payload

Page 44: Presentation IDcs.uccs.edu/~gsc/pub/master/pjfong/UCCS Project/Cisco Presentatio… · © 2001, Cisco Systems, Inc. All rights reserved. 4 Session Number Presentation_ID An oxymoron

444444© 2001, Cisco Systems, Inc. All rights reserved.Presentation_ID

Message Integrity Check

• Unlike CRC32, MIC uses a hashing algorithm to stamp frame.

• The MIC is still pre-standards, so this is currently Cisco Proprietary.

Page 45: Presentation IDcs.uccs.edu/~gsc/pub/master/pjfong/UCCS Project/Cisco Presentatio… · © 2001, Cisco Systems, Inc. All rights reserved. 4 Session Number Presentation_ID An oxymoron

454545© 2001, Cisco Systems, Inc. All rights reserved.Presentation_ID

Message Integrity Check

DA SA IV Data SEQ ICV

WEP Encrypted

MIC

DA SA IV Data ICV

WEP Encrypted

WEP Frame - No MIC

WEP Frame - MIC

Page 46: Presentation IDcs.uccs.edu/~gsc/pub/master/pjfong/UCCS Project/Cisco Presentatio… · © 2001, Cisco Systems, Inc. All rights reserved. 4 Session Number Presentation_ID An oxymoron

464646© 2001, Cisco Systems, Inc. All rights reserved.Presentation_ID

WEP Key Hashing

• Base key and IV hashed

Transmit WEP Key changes as IV changes

• Cisco Proprietary (for now…)

Page 47: Presentation IDcs.uccs.edu/~gsc/pub/master/pjfong/UCCS Project/Cisco Presentatio… · © 2001, Cisco Systems, Inc. All rights reserved. 4 Session Number Presentation_ID An oxymoron

474747© 2001, Cisco Systems, Inc. All rights reserved.Presentation_ID

WEP Key Hashing

• Hash function includes the AID (association ID) in the generation of the hash key.

• Ensures that the key generated is different for each connection to avoid IV collisions.

• The uplink (packets to AP) will use even IV and downlink (packets from AP) will use odd IV.

• IV will increment on transmits. An anti-replay measure will verify that any receive packets with an old IV will be dropped

Page 48: Presentation IDcs.uccs.edu/~gsc/pub/master/pjfong/UCCS Project/Cisco Presentatio… · © 2001, Cisco Systems, Inc. All rights reserved. 4 Session Number Presentation_ID An oxymoron

484848© 2001, Cisco Systems, Inc. All rights reserved.Presentation_ID

WEP Key Hashing

IV BASE KEY

STREAM CIPHER

PLAINTEXT DATA

CIPHERTEXT DATAXORRC4

WEP Encryption Of Old

Page 49: Presentation IDcs.uccs.edu/~gsc/pub/master/pjfong/UCCS Project/Cisco Presentatio… · © 2001, Cisco Systems, Inc. All rights reserved. 4 Session Number Presentation_ID An oxymoron

494949© 2001, Cisco Systems, Inc. All rights reserved.Presentation_ID

WEP Key Hashing

IV BASE KEY

STREAM CIPHER

PLAINTEXT DATA

CIPHERTEXT DATAXOR

RC4

IV PACKET KEY

MMHHASH

Page 50: Presentation IDcs.uccs.edu/~gsc/pub/master/pjfong/UCCS Project/Cisco Presentatio… · © 2001, Cisco Systems, Inc. All rights reserved. 4 Session Number Presentation_ID An oxymoron

505050© 2001, Cisco Systems, Inc. All rights reserved.Presentation_ID

Broadcast Key Rotation

• Prior to 11.10T, Broadcast Key is static

• Static Broadcast Key is vulnerable to the Weak IV attack over time

Similar to Pre-11.10T WEP Keys

• BK = Hash ( seed, ap_mac_addr, nboots)

Page 51: Presentation IDcs.uccs.edu/~gsc/pub/master/pjfong/UCCS Project/Cisco Presentatio… · © 2001, Cisco Systems, Inc. All rights reserved. 4 Session Number Presentation_ID An oxymoron

515151© 2001, Cisco Systems, Inc. All rights reserved.Presentation_ID

PSPF - Blocking Inter-client Communication

• PSPF - Publicly Secure Packet Forwarding

• Prevents WLAN inter-client communication

Page 52: Presentation IDcs.uccs.edu/~gsc/pub/master/pjfong/UCCS Project/Cisco Presentatio… · © 2001, Cisco Systems, Inc. All rights reserved. 4 Session Number Presentation_ID An oxymoron

525252© 2001, Cisco Systems, Inc. All rights reserved.Presentation_ID

PSPF – Blocking Inter-client communication

Wired Network

Page 53: Presentation IDcs.uccs.edu/~gsc/pub/master/pjfong/UCCS Project/Cisco Presentatio… · © 2001, Cisco Systems, Inc. All rights reserved. 4 Session Number Presentation_ID An oxymoron

53© 2001, Cisco Systems, Inc. All rights reserved.

Session NumberPresentation_ID

Add a drop of IPSec, mix and let stand

Not secure enough?

Page 54: Presentation IDcs.uccs.edu/~gsc/pub/master/pjfong/UCCS Project/Cisco Presentatio… · © 2001, Cisco Systems, Inc. All rights reserved. 4 Session Number Presentation_ID An oxymoron

545454© 2001, Cisco Systems, Inc. All rights reserved.Presentation_ID

VPN 3000VPN 3000AironetAironet

Still not enough ?

ClientUser Interface

AssociationRequire VPN

Start VPNAdministrator

Secured NetworkSecured Network Unsecured NetworkUnsecured Network

Authentication2 3

4

5

1Configuration

Page 55: Presentation IDcs.uccs.edu/~gsc/pub/master/pjfong/UCCS Project/Cisco Presentatio… · © 2001, Cisco Systems, Inc. All rights reserved. 4 Session Number Presentation_ID An oxymoron

555555© 2001, Cisco Systems, Inc. All rights reserved.Presentation_ID

When should I use VPN?

• In mixed client environments

• Where security is more important that performance or usability

• For home office or remote telecommuters

Page 56: Presentation IDcs.uccs.edu/~gsc/pub/master/pjfong/UCCS Project/Cisco Presentatio… · © 2001, Cisco Systems, Inc. All rights reserved. 4 Session Number Presentation_ID An oxymoron

565656© 2001, Cisco Systems, Inc. All rights reserved.Presentation_ID

VPN over WLAN Infrastructure

WLAN DMZ

Corporate Network

SiSi SiSi

VPN Concentrator

Corporate Resources

Page 57: Presentation IDcs.uccs.edu/~gsc/pub/master/pjfong/UCCS Project/Cisco Presentatio… · © 2001, Cisco Systems, Inc. All rights reserved. 4 Session Number Presentation_ID An oxymoron

57© 2001, Cisco Systems, Inc. All rights reserved.

Session NumberPresentation_ID

Recap and integration of all these features

Bringing it all together

Page 58: Presentation IDcs.uccs.edu/~gsc/pub/master/pjfong/UCCS Project/Cisco Presentatio… · © 2001, Cisco Systems, Inc. All rights reserved. 4 Session Number Presentation_ID An oxymoron

585858© 2001, Cisco Systems, Inc. All rights reserved.Presentation_ID

Quick Summary – Vulnerabilities Thwarted

Attacks WEPv1.0WEPv1.0 + WEP v1.0 WEP v1.0 + WEPv1.0LEAP LEAP LEAP LEAP

B'cast Rot IV Hash MIC+ReplayUnintentional IV reuse X X X XIntentional IV reuse XFluhrer x x XBit flipping attack XStatic Broadcast key XBrk B'cst+replay-n-brk'ucast X XKnown plaintext XPartial known plaintext XAuthentication forging XDenial of ServiceDictionary attack

Page 59: Presentation IDcs.uccs.edu/~gsc/pub/master/pjfong/UCCS Project/Cisco Presentatio… · © 2001, Cisco Systems, Inc. All rights reserved. 4 Session Number Presentation_ID An oxymoron

595959© 2001, Cisco Systems, Inc. All rights reserved.Presentation_ID

Other features to help secure the WLAN

• Turn off SSID Broadcast

• Use LEAP to authenticate MAC address

• Block telnet / web access to the AP

• Use VPN over wireless connections

• http://www.cisco.com/go/safe

Page 60: Presentation IDcs.uccs.edu/~gsc/pub/master/pjfong/UCCS Project/Cisco Presentatio… · © 2001, Cisco Systems, Inc. All rights reserved. 4 Session Number Presentation_ID An oxymoron

60© 2001, Cisco Systems, Inc. All rights reserved.

Session NumberPresentation_ID

Any questions?

Conclusion

Page 61: Presentation IDcs.uccs.edu/~gsc/pub/master/pjfong/UCCS Project/Cisco Presentatio… · © 2001, Cisco Systems, Inc. All rights reserved. 4 Session Number Presentation_ID An oxymoron

616161© 2001, Cisco Systems, Inc. All rights reserved.Presentation_ID

Summary

• Standard 802.11 security is insufficient for large WLAN deployment

• 802.1X for 802.11 provides scalable and solid solution

• Only two authentication types, LEAP and EAP-TLS are really deployed in today’s implementations (Kerberos ? OTP ?)

• LEAP is available on nearly every client platform and with an increasing number of backend Radius servers

Page 62: Presentation IDcs.uccs.edu/~gsc/pub/master/pjfong/UCCS Project/Cisco Presentatio… · © 2001, Cisco Systems, Inc. All rights reserved. 4 Session Number Presentation_ID An oxymoron

62© 2001, Cisco Systems, Inc. All rights reserved.

Session NumberPresentation_ID

Please Complete Your Please Complete Your Evaluation Form:Evaluation Form:

Wireless LAN SecurityWireless LAN Security

Page 63: Presentation IDcs.uccs.edu/~gsc/pub/master/pjfong/UCCS Project/Cisco Presentatio… · © 2001, Cisco Systems, Inc. All rights reserved. 4 Session Number Presentation_ID An oxymoron

636363© 2001, Cisco Systems, Inc. All rights reserved.Presentation_ID

• San Diego, CA - June 24-28

• Orlando, FL - July 8-12

Make your plans to attend Cisco Networkers 2002!

Page 64: Presentation IDcs.uccs.edu/~gsc/pub/master/pjfong/UCCS Project/Cisco Presentatio… · © 2001, Cisco Systems, Inc. All rights reserved. 4 Session Number Presentation_ID An oxymoron

646464© 2001, Cisco Systems, Inc. All rights reserved.Presentation_ID