13
Wireless Security Wireless Security Issues Issues David E. Hudak, Ph.D. David E. Hudak, Ph.D. Senior Software Architect Senior Software Architect Karlnet, Inc. Karlnet, Inc.

Wireless Security Issues David E. Hudak, Ph.D. Senior Software Architect Karlnet, Inc

Embed Size (px)

Citation preview

Page 1: Wireless Security Issues David E. Hudak, Ph.D. Senior Software Architect Karlnet, Inc

Wireless Security IssuesWireless Security Issues

David E. Hudak, Ph.D.David E. Hudak, Ph.D.

Senior Software ArchitectSenior Software Architect

Karlnet, Inc.Karlnet, Inc.

Page 2: Wireless Security Issues David E. Hudak, Ph.D. Senior Software Architect Karlnet, Inc

OutlineOutline

Security definitionsSecurity definitions Current 802.11 securityCurrent 802.11 security

Weak IV problemWeak IV problem Wi-Fi Protected WPA securityWi-Fi Protected WPA security 802.11i802.11i

Page 3: Wireless Security Issues David E. Hudak, Ph.D. Senior Software Architect Karlnet, Inc

Security DefinitionsSecurity Definitions

Security context between two (network) Security context between two (network) entities should provideentities should provide Authentication - to prove identityAuthentication - to prove identity Integrity - to detect altered packetsIntegrity - to detect altered packets Privacy - to prevent eavesdroppingPrivacy - to prevent eavesdropping

Page 4: Wireless Security Issues David E. Hudak, Ph.D. Senior Software Architect Karlnet, Inc

Current 802.11 SecurityCurrent 802.11 Security

(as per the 1999 spec)(as per the 1999 spec) AuthenticationAuthentication

Tied to association (session between station Tied to association (session between station and AP)and AP)

Open system - all stations may associateOpen system - all stations may associate Shared key - stations must know secretShared key - stations must know secret

IntegrityIntegrity PrivacyPrivacy

Page 5: Wireless Security Issues David E. Hudak, Ph.D. Senior Software Architect Karlnet, Inc

Current 802.11 SecurityCurrent 802.11 Security

(as per the 1999 spec)(as per the 1999 spec) AuthenticationAuthentication Integrity - Integrity Check (IC) fieldIntegrity - Integrity Check (IC) field

32 bit CRC in encrypted payload32 bit CRC in encrypted payload Not separately keyedNot separately keyed Vulnerable to bit-flipping attacksVulnerable to bit-flipping attacks

PrivacyPrivacy

Page 6: Wireless Security Issues David E. Hudak, Ph.D. Senior Software Architect Karlnet, Inc

Current 802.11 SecurityCurrent 802.11 Security

(as per the 1999 spec)(as per the 1999 spec) AuthenticationAuthentication IntegrityIntegrity Privacy - Wired Equivalent Privacy (WEP)Privacy - Wired Equivalent Privacy (WEP)

RC4 cipher (relies on XOR)RC4 cipher (relies on XOR) Up to 4 keys per station (40 bit or 104 bit)Up to 4 keys per station (40 bit or 104 bit) Initialization Vector (IV)Initialization Vector (IV)

24 bit extension to key24 bit extension to key Provides some randomization to keyProvides some randomization to key Unfortunately, keyspace is small!Unfortunately, keyspace is small!

Page 7: Wireless Security Issues David E. Hudak, Ph.D. Senior Software Architect Karlnet, Inc

Big WEP Attack - Weak IVBig WEP Attack - Weak IV

Say an AP constantly sends 1500 byte frames at Say an AP constantly sends 1500 byte frames at 11 Mbps11 Mbps Keyspace is exhausted in 5 hoursKeyspace is exhausted in 5 hours Will be quicker if packets are smallerWill be quicker if packets are smaller

Original IV algorithms made things much worseOriginal IV algorithms made things much worse Some cards used same IV for multiple packets Some Some cards used same IV for multiple packets Some

cards reset IV to 0 after initializationcards reset IV to 0 after initialization Some cards increment IV by 1 after each packetSome cards increment IV by 1 after each packet

WEP+ fixed these “Weak IV” issuesWEP+ fixed these “Weak IV” issues

Page 8: Wireless Security Issues David E. Hudak, Ph.D. Senior Software Architect Karlnet, Inc

Improving SecurityImproving Security

Improve authenticationImprove authentication System wide common loginSystem wide common login

Improve integrityImprove integrity Separate integrity keySeparate integrity key Stronger integrity algorithmStronger integrity algorithm

Improve privacyImprove privacy Increase keyspace size (make cracker analyze more Increase keyspace size (make cracker analyze more

data in order to recover key)data in order to recover key) Per -user keysPer -user keys Key rolloverKey rollover

Stronger privacy algorithmStronger privacy algorithm

Page 9: Wireless Security Issues David E. Hudak, Ph.D. Senior Software Architect Karlnet, Inc

802.11i and WPA802.11i and WPA

IEEE 802.11i - IEEE 802.11 task group IEEE 802.11i - IEEE 802.11 task group “MAC enhancement for wireless security”“MAC enhancement for wireless security”

Wi-Fi Alliance WPA - subset of 802.11iWi-Fi Alliance WPA - subset of 802.11i Compatible with earlier draftCompatible with earlier draft Defined for BSS onlyDefined for BSS only Defined for current hardwareDefined for current hardware

WPA has two major componentsWPA has two major components AuthenticationAuthentication TKIP encryptionTKIP encryption

Page 10: Wireless Security Issues David E. Hudak, Ph.D. Senior Software Architect Karlnet, Inc

WPAWPA

AuthenticationAuthentication 802.1x (not 802.11x) - defined for both wired 802.1x (not 802.11x) - defined for both wired

and wireless session establishmentand wireless session establishment EAP (Extensible Authentication Protocol) - generic EAP (Extensible Authentication Protocol) - generic

wrapper for authentication trafficwrapper for authentication traffic EAP impactEAP impact

Authentication is between laptop and server - AP is pretty Authentication is between laptop and server - AP is pretty cluelessclueless

Different auth methods, updating auth methods do not Different auth methods, updating auth methods do not require upgrades on APrequire upgrades on AP

Pre-Shared Key (PSK) - for SOHO networksPre-Shared Key (PSK) - for SOHO networks

Page 11: Wireless Security Issues David E. Hudak, Ph.D. Senior Software Architect Karlnet, Inc

WPAWPA

Temporal Key Integrity Protocol (TKIP)Temporal Key Integrity Protocol (TKIP) Stronger privacyStronger privacy

Still uses RC-4 encryptionStill uses RC-4 encryption Key rollover (temporal key)Key rollover (temporal key)

Stronger integrityStronger integrity Message Integrity Code (MIC) - computed with own integrity Message Integrity Code (MIC) - computed with own integrity

algorithm (MICHAEL)algorithm (MICHAEL) Separate integrity keySeparate integrity key Integrity counter measuresIntegrity counter measures

Page 12: Wireless Security Issues David E. Hudak, Ph.D. Senior Software Architect Karlnet, Inc

802.11i802.11i

Additions over WPAAdditions over WPA IBSS (ad-hoc mode) authentication - what does IBSS (ad-hoc mode) authentication - what does

a security context mean without a trusted third a security context mean without a trusted third party? Is PSK enough?party? Is PSK enough?

Counter-Mode/CBC-MAC Protocol (CCMP)Counter-Mode/CBC-MAC Protocol (CCMP) Privacy: AES-CCM (128 bit key)Privacy: AES-CCM (128 bit key) Integrity: CBC-MACIntegrity: CBC-MAC

Page 13: Wireless Security Issues David E. Hudak, Ph.D. Senior Software Architect Karlnet, Inc

802.11i criticisms802.11i criticisms

Does not secure 802.11 management Does not secure 802.11 management control and action framescontrol and action frames Disassociate, output power, etc.Disassociate, output power, etc.

Fundamental dilemma: does 802.11i secureFundamental dilemma: does 802.11i secure 1. Traffic carried by the network?1. Traffic carried by the network? 2. Network elements themselves?2. Network elements themselves?