WLAN Technologies Wireless LAN Security

19
IY5511-08 WLAN Security 1 Wireless LAN Security Matthew Joyce Vodafone UK IY5511-08 WLAN Security 2 WLAN Security - Contents > WLAN Technologies > Wireless LAN 802.11 > Technology > Security History > Vulnerabilities > Demonstration IY5511-08 WLAN Security 3 WLAN Technologies Wireless LAN Technologies Wireless LAN Technologies Infrared Infrared Spread Spectrum Spread Spectrum Narrow Band Narrow Band Direct Sequence Direct Sequence Frequency Hopping Frequency Hopping IY5511-08 WLAN Security 4 The ISM Frequency Bands 1 2 34 6 810 20 3040 60 100 GHz 1 2 3 Selected regional licensing differences: 915 MHz only in the Americas (region 2) 2.4 GHz for global availability (region 1,2,3) Unlicensed spectrum is difficult to come by and usually contested

Transcript of WLAN Technologies Wireless LAN Security

Page 1: WLAN Technologies Wireless LAN Security

IY5511-08 WLAN Security 1

Wireless LAN Security

Matthew JoyceVodafone UK

IY5511-08 WLAN Security 2

WLAN Security - Contents

>WLAN Technologies>Wireless LAN 802.11>Technology>Security History>Vulnerabilities>Demonstration

IY5511-08 WLAN Security 3

WLAN Technologies

Wireless LAN TechnologiesWireless LAN Technologies

InfraredInfrared Spread SpectrumSpread

SpectrumNarrow BandNarrow Band

Direct SequenceDirect

Sequence FrequencyHopping

FrequencyHopping

IY5511-08 WLAN Security 4

The ISM Frequency Bands

1 2 3 4 6 810 20 30 40 60 100

GHz

123

Selected regional licensing differences:• 915 MHz only in the Americas (region 2)• 2.4 GHz for global availability (region 1,2,3)Unlicensed spectrum is • difficult to come by and • usually contested

Page 2: WLAN Technologies Wireless LAN Security

IY5511-08 WLAN Security 5

FREQUENCY

TIME

User 3User 2User 1

• Multiple users share the same frequency channel sequentially

• Time slot sequence repeats over and over

TDMA

TIME

FREQUENCY

CODE

CDMA(also referred to as “Spread Spectrum”)

User 3User 2User 1

• Channel is “spread” over wide frequency band

• Many users share the same frequency band at the same time

• Each user is assigned a unique “code” to identify and separate them

FREQUENCY

TIME

FDMA

1 2 3

Each user assigned a different frequency -like ordinary radio

Multiple Access Methods

IY5511-08 WLAN Security 6

Spread Spectrum Communication

> Spread spectrum signals have bandwidths much wider than that of the data they carry

> This provides the signal with substantial immunity to noise and interference, and to fading and multipath

> The use of different basis signals allows many users to exist simultaneously in the same band, hence CDMA

IY5511-08 WLAN Security 7

Spread Spectrum Properties

> Spread spectrum signals may be overlaid on existing services (this is the rule, rather than the exception in the 2.4 GHz ISM band)

> The distinctive signals allow each user to be automatically identified

> The wide bandwidth of the signals allows multipath diversity to be used

> The data rate may be varied to adapt gracefully to changing load conditions

IY5511-08 WLAN Security 8

DS and FH Spread Spectrum

>Frequency Hopping> Sequential use of multiple

frequencies> Hop sequence and rate

will vary

>Direct Sequence> Each symbol is transmitted

over multiple frequencies atthe same time

> Higher speed than FH atcomparable distances

> System capacity (multiplechannels) higher than FH

COMPLETE WAVEBAND ALLOCATED

Time

Time

Page 3: WLAN Technologies Wireless LAN Security

IY5511-08 WLAN Security 9

DSSS Transmitter Schema

> Spreading: Information signal (I.e. a “symbol”) is multiplied by a unique, high rate digital code which stretches (spreads) its bandwidth before transmission.

> Code bits are called Chips. > Sequence is sometimes called a Barker Code

Source andChannelCoding

RFModulator

CodeGenerator

XMultiplier

Code Bits (Chips)

Digital Signal (Bits)

FrequencySpectrum

f“Spread” Frequency

Spectrumf

IY5511-08 WLAN Security 10

DSSS Signal Convolution

X

=

“symbol”

“Barker” sequence

Result of multiplication

Symbol time ts“1” “0”

Chip time tc

> Due to the multiplication of a symbol with Barker code, the rate-of-change increases with a factor 11 in this example

> This means that cycle rate increases from 1 MHz to 11 MHz

> In terms of spectrum this means that after RF modulation the signal is spread from 2 MHz bandwidth to 22 MHz bandwidth

2 Mhz 22 Mhz

IY5511-08 WLAN Security 11

Data and Spread Signal Spectra

Information signal

Spread signal

Chip Rate = 32

IY5511-08 WLAN Security 12

DSSS Receiver Schema

RFDemodulator

Channeland

SourceDecoding

CodeGenerator

X

Multiplied

Code Bits (Chips)

De-SpreadSignal

f

“Spread” FrequencySpectrum

f

Digital Signal (Bits)

> At the receiver, the spread signal is multiplied again by a synchronized replica of the same code, and is de-spread and recovered

> The outcome of the process is the original symbol

Page 4: WLAN Technologies Wireless LAN Security

IY5511-08 WLAN Security 13

De-Spreading

Data

:11 chip code

Direct SequenceSpread Spectrum

Signal

+11

-11

+1

-1

Symbol time

> When the incoming signal is de-spread, it results in either a positive (+) or a negative (-) “spike”

> These “spikes” arrive at intervals equal to the symbol time

> A positive spike represents a “1” symbol, a negative spike represents a “0” symbol

IY5511-08 WLAN Security 14

Effects of Reflections/Echoes

echo

echo

peak

Symbol time

> Echoes may arrive at the receiver, fluctuations can be noticed at positions other than at the symbol time boundaries

> These fluctuations are (largely) ignored as the receiver will only interpret the spike at the synchronization points (separated from each other by the symbol time)

IY5511-08 WLAN Security 15

IEEE 802 – The WiFi Context

> IEEE 802 is a collection of standards by IEEE that typically get promulgated to ANSI and ISO standards> E.g. IEEE 802.3 specifies the physical and data link layer

properties of Ethernet (in its various incarnations)> IEEE 802.11 is a family of standards for wireless local

area networks> Baseline IEEE Std 802.11-1997 was approved in June

1997> Current standard is IEEE Std 802.11-1999, which is

supplemented by amendment documents (in the sequence a,b,d,g,h,i, j, and e) and one corrigendum document

> IEEE Std 802.11-1999 was reaffirmed by the 802.11 working group in 2003 without changes

> A recommended practices document for inter-access-point communication (802.11f) was ratified in 2003 but withdrawn in March 2006

IY5511-08 WLAN Security 16

Wireless LANs

>IEEE ratified 802.11 in 1997.>Also known as Wi-Fi.

>Wireless LAN at 1 Mbps & 2 Mbps.>WECA (Wireless Ethernet Compatibility

Alliance) promoted Interoperability.>Now Wi-Fi Alliance

>802.11 provides protocols at Layer 1 & Layer 2 of OSI model.>Physical layer>Data link layer

Page 5: WLAN Technologies Wireless LAN Security

IY5511-08 WLAN Security 17

802.11 Components

>Two pieces of equipment defined:>Wireless station

>A desktop or laptop PC or PDA with a wireless NIC.

>Access point>A bridge between wireless and wired networks>Composed of

> Radio> Wired network interface (usually 802.3)> Bridging software

>Aggregates access for multiple wireless stations to wired network.

IY5511-08 WLAN Security 18

802.11 modes

> Infrastructure mode> Basic Service Set

> One access point

> Extended Service Set> Two or more BSSs forming a single subnet.

> Corporate WLANs operate in this mode.

> Ad-hoc mode> Also called peer-to-peer.> Independent Basic Service Set> Set of 802.11 wireless stations that communicate

directly without an access point.> Useful for quick & easy wireless networks.

IY5511-08 WLAN Security 19

Infrastructure mode

Basic Service Set (BSS) –Single cell

Extended Service Set (ESS) –Multiple cells

Access Point

Station

IY5511-08 WLAN Security 20

Ad-hoc mode

Independent Basic Service Set (IBSS)

Page 6: WLAN Technologies Wireless LAN Security

IY5511-08 WLAN Security 21

802.11 Physical Layer

>Originally three alternative physical layers>Two incompatible spread-spectrum radio in

2.4Ghz ISM band>Frequency Hopping Spread Spectrum (FHSS)

> 75 channels>Direct Sequence Spread Spectrum (DSSS)

> 14 channels (11 channels in US)

>One diffuse infrared layer>802.11 speed

>1 Mbps or 2 Mbps.

IY5511-08 WLAN Security 22

802.11 Data Link Layer

> Layer 2 split into:> Logical Link Control (LLC).> Media Access Control (MAC).

> LLC - same 48-bit addresses as 802.3.> MAC - CSMA/CD not possible.

> Can’t listen for collision while transmitting.

> CSMA/CA – Collision Avoidance.> Sender waits for clear air, waits random time, then

sends data.> Receiver sends explicit ACK when data arrives intact.> Also handles interference.> But adds overhead.

> 802.11 always slower than equivalent 802.3.

IY5511-08 WLAN Security 23

Hidden nodes

IY5511-08 WLAN Security 24

RTS / CTS

>To handle hidden nodes>Sending station sends

>“Request to Send”

>Access point responds with >“Clear to Send”>All other stations hear this and delay any

transmissions.

>Only used for larger pieces of data.>When retransmission may waste significant

time.

Page 7: WLAN Technologies Wireless LAN Security

IY5511-08 WLAN Security 25

802.11b

> 802.11b ratified in 1999 adding 5.5 Mbps and 11 Mbps.

> DSSS as physical layer.> 11 channels (3 non-overlapping)

> Dynamic rate shifting.> Transparent to higher layers> Ideally 11 Mbps.> Shifts down through 5.5 Mbps, 2 Mbps to 1 Mbps.

> Higher ranges.> Interference.

> Shifts back up when possible.

> Maximum specified range 100 metres> Average throughput of 4Mbps

IY5511-08 WLAN Security 26

Joining a BSS

>When 802.11 client enters range of one or more APs>APs send beacons.>AP beacon can include SSID.>AP chosen on signal strength and observed

error rates.>After AP accepts client.

>Client tunes to AP channel.

>Periodically, all channels surveyed.>To check for stronger or more reliable APs.>If found, reassociates with new AP.

IY5511-08 WLAN Security 27

Access Point Roaming

Channel 4

Channel 7

Channel 9

Channel 1

IY5511-08 WLAN Security 28

Roaming and Channels

>Reassociation with APs>Moving out of range.>High error rates.>High network traffic.

>Allows load balancing.

>Each AP has a channel.>14 partially overlapping channels.>Only three channels that have no overlap.

>Best for multicell coverage.

Page 8: WLAN Technologies Wireless LAN Security

IY5511-08 WLAN Security 29

802.11a

>802.11a ratified in 2001 >Supports up to 54Mbps in 5 Ghz range.

>Higher frequency limits the range>Regulated frequency reduces interference

from other devices

>12 non-overlapping channels>Usable range of 30 metres>Average throughput of 30 Mbps>Not backwards compatible

IY5511-08 WLAN Security 30

802.11g

>802.11g ratified in 2002 >Supports up to 54Mbps in 2.4Ghz

range.>Backwards compatible with 802.11b

>3 non-overlapping channels>Range similar to 802.11b>Average throughput of 30 Mbps>802.11n due for November 2006

>Aiming for maximum 200Mbps with average 100Mbps

IY5511-08 WLAN Security 31

Open System Authentication

>Service Set Identifier (SSID)>Station must specify SSID to Access

Point when requesting association.>Multiple APs with same SSID form

Extended Service Set.>APs can broadcast their SSID.>Some clients allow * as SSID.

>Associates with strongest AP regardless of SSID.

IY5511-08 WLAN Security 32

MAC ACLs and SSID hiding

> Access points have Access Control Lists (ACL).> ACL is list of allowed MAC addresses.

> E.g. Allow access to:> 00:01:42:0E:12:1F> 00:01:42:F1:72:AE> 00:01:42:4F:E2:01

> But MAC addresses are sniffable and spoofable.

> AP Beacons without SSID> Essid_jack

> sends deauthenticate frames to client > SSID then displayed when client sends reauthenticate

frames

Page 9: WLAN Technologies Wireless LAN Security

IY5511-08 WLAN Security 33

Interception Range

Basic Service Set (BSS) –Single cell

Station outsidebuilding perimeter.

100 metres

IY5511-08 WLAN Security 34

Interception

>Wireless LAN uses radio signal.>Not limited to physical building.>Signal is weakened by:

>Walls>Floors>Interference

>Directional antenna allows interception over longer distances.>Record is 124 miles for an unamplified

802.11b signal (4 metre dish)

IY5511-08 WLAN Security 35

Directional Antenna

> Directional antenna provides focused reception.

> DIY plans available.> Aluminium cake tin> Chinese cooking sieve

> http://www.saunalahti.fi/~elepal/antennie.html> http://www.usbwifi.orcon.net.nz/

IY5511-08 WLAN Security 36

WarDriving

>Software>Netstumbler>And many more

>Laptop>802.11a,b,g PC card>Optional:

>Global Positioning System>Logging of MAC address, network

name, SSID, manufacturer, channel, signal strength, noise (GPS - location).

Page 10: WLAN Technologies Wireless LAN Security

IY5511-08 WLAN Security 37

WarDriving results

>San Francisco, 2001>Maximum 55 miles per hour.>1500 Access Points>60% in default configuration.>Most connected to internal backbones.>85% use Open System Authentication.

>Commercial directional antenna>25 mile range from hilltops.

> Peter Shipley - http://www.dis.org/filez/openlans.pdf

IY5511-08 WLAN Security 38

WarDriving map Source: www.dis.org/wl/maps/

IY5511-08 WLAN Security 39

Worldwide War Drive 2004

>Fourth and last worldwide war drive>www.worldwidewardrive.org

>228,537 Access points>82,755 (35%) with default SSID>140,890 (60%) with Open System

Authentication>62,859 (27%) with both, probably default

configuration

IY5511-08 WLAN Security 40

Further issues

>Access Point configuration>Mixtures of SNMP, web, serial, telnet.

>Default community strings, default passwords.

>Evil Twin Access Points>Stronger signal, capture user

authentication.

>Renegade Access Points>Unauthorised wireless LANs.

Page 11: WLAN Technologies Wireless LAN Security

IY5511-08 WLAN Security 41

War Driving prosecutions

> February 2004, Texas, Stefan Puffer acquitted of wrongful access after showing an unprotected county WLAN to officials

> June 2004, North Carolina, Lowes DIY store> Salcedo convicted for stealing credit card numbers via

unprotected WLAN> Botbyl convicted for checking email & web browsing via

unprotected WLAN> June 2004, Connecticut, Myron Tereshchuk guilty of

drive-by extortion via unprotected WLANs> “make the check payable to M.Tereshchuk”

> July 2005, London, Gregory Straszkiewicz guilty of dishonestly obtaining a communications service> Warwalking in Ealing

IY5511-08 WLAN Security 42

802.11b Security Services

>Two security services provided:>Authentication

>Shared Key Authentication

>Encryption>Wired Equivalence Privacy

IY5511-08 WLAN Security 43

Wired Equivalence Privacy

>Shared key between>Stations.>An Access Point.

>Extended Service Set>All Access Points will have same shared key.

>No key management>Shared key entered manually into

>Stations>Access points>Key management nightmare in large wireless

LANs

IY5511-08 WLAN Security 44

RC4

>Ron’s Code number 4>Symmetric key encryption>RSA Security Inc.>Designed in 1987.>Trade secret until leak in 1994.

>RC4 can use key sizes from 1 bit to 2048 bits.

>RC4 generates a stream of pseudo random bits>XORed with plaintext to create ciphertext.

Page 12: WLAN Technologies Wireless LAN Security

IY5511-08 WLAN Security 45

WEP – Sending

> Compute Integrity Check Vector (ICV).> Provides integrity> 32 bit Cyclic Redundancy Check.> Appended to message to create plaintext.

> Plaintext encrypted via RC4> Provides confidentiality.> Plaintext XORed with long key stream of pseudo

random bits.> Key stream is function of

> 40-bit secret key> 24 bit initialisation vector

> Ciphertext is transmitted.

IY5511-08 WLAN Security 46

WEP Encryption

PRNG

32 bit CRC

IV

Ciphertext

||

||Plaintext

Secret key

InitialisationVector (IV)

IY5511-08 WLAN Security 47

WEP – Receiving

>Ciphertext is received.>Ciphertext decrypted via RC4

>Ciphertext XORed with long key stream of pseudo random bits.

>Key stream is function of >40-bit secret key>24 bit initialisation vector (IV)

>Check ICV>Separate ICV from message.>Compute ICV for message>Compare with received ICV

IY5511-08 WLAN Security 48

Shared Key Authentication

> When station requests association with Access Point> AP sends random number to station> Station encrypts random number

> Uses RC4, 40 bit shared secret key & 24 bit IV

> Encrypted random number sent to AP> AP decrypts received message

> Uses RC4, 40 bit shared secret key & 24 bit IV

> AP compares decrypted random number to transmitted random number

> If numbers match, station has shared secret key.

Page 13: WLAN Technologies Wireless LAN Security

IY5511-08 WLAN Security 49

WEP Safeguards

>Shared secret key required for:>Associating with an access point.>Sending data.>Receiving data.

>Messages are encrypted.>Confidentiality.

>Messages have checksum.>Integrity.

>But management traffic still broadcast in clear containing SSID.

IY5511-08 WLAN Security 50

Initialisation Vector

>IV must be different for every message transmitted.

>802.11 standard doesn’t specify how IV is calculated.

>Wireless cards use several methods>Some use a simple ascending counter for

each message.>Some switch between alternate ascending

and descending counters.>Some use a pseudo random IV generator.

IY5511-08 WLAN Security 51

Passive WEP attack

>If 24 bit IV is an ascending counter,>If Access Point transmits at 11 Mbps,>All IVs are exhausted in roughly 5 hours.>Passive attack:

>Attacker collects all traffic>Attacker could collect two messages:

>Encrypted with same key and same IV>Statistical attacks to reveal plaintext>Plaintext XOR Ciphertext = Keystream

IY5511-08 WLAN Security 52

Active WEP attack

>If attacker knows plaintext and ciphertext pair>Keystream is known.>Attacker can create correctly encrypted

messages.>Access Point is deceived into accepting

messages.

>Bitflipping>Flip a bit in ciphertext>Bit difference in CRC-32 can be computed

Page 14: WLAN Technologies Wireless LAN Security

IY5511-08 WLAN Security 53

Limited WEP keys

>Some vendors allow limited WEP keys>User types in a passphrase>WEP key is generated from passphrase>Passphrases creates only 21 bits of entropy

in 40 bit key.>Reduces key strength to 21 bits = 2,097,152>Remaining 19 bits are predictable.>21 bit key can be brute forced in minutes.

>www.lava.net/~newsham/wlan/WEP_password_cracker.ppt

IY5511-08 WLAN Security 54

Creating limited WEP keys

IY5511-08 WLAN Security 55

Brute force key attack

>Capture ciphertext.>IV is included in message.

>Search all 240 possible secret keys.>1,099,511,627,776 keys>~170 days on a modern laptop

>Find which key decrypts ciphertext to plaintext.

IY5511-08 WLAN Security 56

128 bit WEP

>Vendors have extended WEP to 128 bit keys.>104 bit secret key.>24 bit IV.

>Brute force takes 10^19 years for 104-bit key.

>Effectively safeguards against brute force attacks.

Page 15: WLAN Technologies Wireless LAN Security

IY5511-08 WLAN Security 57

Key Scheduling Weakness

>Paper from Fluhrer, Mantin, Shamir, 2001.

>Two weaknesses:>Certain keys leak into key stream.

>Invariance weakness.

>If portion of PRNG input is exposed, >Analysis of initial key stream allows key to be

determined.>IV weakness.

IY5511-08 WLAN Security 58

IV weakness

> WEP exposes part of PRNG input.> IV is transmitted with message.> Every wireless frame has reliable first byte

> Sub-network Access Protocol header (SNAP) used in logical link control layer, upper sub-layer of data link layer.

> First byte is 0xAA> Attack is:

> Capture packets with weak IV> First byte ciphertext XOR 0xAA = First byte key stream> Can determine key from initial key stream

> Practical for 40 bit and 128 bit keys> Passive attack.

> Non-intrusive.> No warning.

IY5511-08 WLAN Security 59

Wepcrack

>First tool to demonstrate attack using IV weakness.>Open source, Anton Rager.

>Three components>Weaker IV generator.>Search sniffer output for weaker IVs &

record 1st byte.>Cracker to combine weaker IVs and selected

1st bytes.

>Cumbersome.

IY5511-08 WLAN Security 60

Airsnort

>Automated tool>Cypher42, Minnesota, USA.>Does it all!>Sniffs>Searches for weaker IVs>Records encrypted data>Until key is derived.

>100 Mb to 1 Gb of transmitted data.>3 to 4 hours on a very busy WLAN.

Page 16: WLAN Technologies Wireless LAN Security

IY5511-08 WLAN Security 61

Avoid the weak IVs

> FMS described a simple method to find weak IVs> Many manufacturers avoid those IVs after 2002> Therefore Airsnort and others may not work on

recent hardware

> However David Hulton aka h1kari> Properly implemented FMS attack which shows many

more weak IVs> Identified IVs that leak into second byte of key

stream.> Second byte of SNAP header is also 0xAA> So attack still works on recent hardware> And is faster on older hardware> Dwepcrack, weplab, aircrack

IY5511-08 WLAN Security 62

Generating WEP traffic

>Not capturing enough traffic?>Capture encrypted ARP request packets>Anecdotally lengths of 68, 118 and 368

bytes appear appropriate>Replay encrypted ARP packets to generate

encrypted ARP replies>Aireplay implements this.

IY5511-08 WLAN Security 63

802.11 safeguards

>Security Policy & Architecture Design>Treat as untrusted LAN>Discover unauthorised use>Access point audits>Station protection>Access point location>Antenna design

IY5511-08 WLAN Security 64

Security Policy & Architecture

>Define use of wireless network>What is allowed >What is not allowed

>Holistic architecture and implementation >Consider all threats.>Design entire architecture

>To minimise risk.

Page 17: WLAN Technologies Wireless LAN Security

IY5511-08 WLAN Security 65

Wireless as untrusted LAN

>Treat wireless as untrusted.>Similar to Internet.

>Firewall between WLAN and Backbone.>Extra authentication required.>Intrusion Detection

>at WLAN / Backbone junction.

>Vulnerability assessments

IY5511-08 WLAN Security 66

Discover unauthorised use

> Search for unauthorised access points, ad-hoc networks or clients.

> Port scanning> For unknown SNMP agents.> For unknown web or telnet interfaces.

> Warwalking!> Sniff 802.11 packets> Identify IP addresses> Detect signal strength> But may sniff your neighbours…

> Wireless Intrusion Detection> AirMagnet, AirDefense, Trapeze, Aruba,…

IY5511-08 WLAN Security 67

Access point audits

>Review security of access points. >Are passwords and community strings

secure?>Use Firewalls & router ACLs

>Limit use of access point administration interfaces.

>Standard access point config:>SSID>WEP keys>Community string & password policy

IY5511-08 WLAN Security 68

Station protection

> Personal firewalls> Protect the station from attackers.

> VPN from station into Intranet> End-to-end encryption into the trusted network.> But consider roaming issues.

> Host intrusion detection> Provide early warning of intrusions onto a station.

> Configuration scanning> Check that stations are securely configured.

Page 18: WLAN Technologies Wireless LAN Security

IY5511-08 WLAN Security 69

Location of Access Points

>Ideally locate access points>In centre of buildings.

>Try to avoid access points>By windows>On external walls>Line of sight to outside

>Use directional antenna to “point” radio signal.

IY5511-08 WLAN Security 70

Wireless IDS/IPS

>Sensors deployed in WLAN>Monitoring to detect

>Unauthorised clients by MAC address>Accidental>Malicious

>Ad-hoc mode networks>Unauthorised access points>Policy violations

>Possible to identify approximate locations

IY5511-08 WLAN Security 71

WPA

> Wi-Fi Protected Access> Works with 802.11b, a and g

> “Fixes” WEP’s problems> Existing hardware can be used> 802.1x user-level authentication> TKIP

> RC4 session-based dynamic encryption keys> Per-packet key derivation> Unicast and broadcast key management> New 48 bit IV with new sequencing method> Michael 8 byte message integrity code (MIC)

> Optional AES support to replace RC4

IY5511-08 WLAN Security 72

WPA and 802.1x

> 802.1x is a general purpose network access control mechanism

> WPA has two modes> Pre-shared mode, uses pre-shared keys> Enterprise mode, uses Extensible Authentication

Protocol (EAP) with a RADIUS server making the authentication decision

> EAP is a transport for authentication, not authentication itself

> EAP allows arbitrary authentication methods> For example, Windows supports

> EAP-TLS requiring client and server certificates> PEAP-MS-CHAPv2

Page 19: WLAN Technologies Wireless LAN Security

IY5511-08 WLAN Security 73

Practical WPA attacks

>Dictionary attack on pre-shared key mode>CoWPAtty, Joshua Wright

>Denial of service attack>If WPA equipment sees two packets with

invalid MICs in 1 second>All clients are disassociated>All activity stopped for one minute>Two malicious packets a minute enough to stop a

wireless network

IY5511-08 WLAN Security 74

802.11i (WPA2)

> Robust Security Network extends WPA> Counter Mode with Cipher Block Chaining Message

Authentication Code Protocol (CCMP)> Based on a mode of AES, with 128 bits keys and 48

bit IV.> Also adds dynamic negotiation of authentication and

encryption algorithms> Allows for future change

> Does require new hardware> Lots more info

> www.drizzle.com/~aboba/IEEE/

IY5511-08 WLAN Security 75

Relevant RFCs

>Radius Extensions: RFC 2869>EAP: RFC 2284>EAP-TLS: RFC 2716

IY5511-08 WLAN Security 76

Demonstration

>War driving>Packet sniffing>Cracking WEP