Presentation is loading. Please wait.

Presentation is loading. Please wait.

Implementing Network Security – Wireless Security Segway! Steve Lamb Technical Security Advisor

Similar presentations


Presentation on theme: "Implementing Network Security – Wireless Security Segway! Steve Lamb Technical Security Advisor"— Presentation transcript:

1 Implementing Network Security – Wireless Security Segway! Steve Lamb Technical Security Advisor http://blogs.msdn.com/steve_lamb stephlam@microsoft.com

2 So whats the problem? WEP is a euphemism –Wired –Equivalent –Privacy Actually, its a lie –It isnt equivalent to wired privacy at all! –How can you secure the air? Thus: WEPs v.poor http://www.isaac.cs.berkeley.edu/isaac/wep-faq.html

3 WLAN Security Challenges Unsecured WLAN Most wireless LANs are unsecured mailt o:bo ss@ com pany. tld mailto:boss@company.tld WLAN Access Point Company Servers Mobile Employee Evil Hacker

4 WLAN Security Challenges Weak Security in 802.11 Static WEP X7!g%k0j37**54bf(jv&8gF… X7!g %k0j 37**54 bf(jv &8gB) £F..

5 Other 802.11 Challenges Access Points are dim! Key Management (!!!!) –Manual update = never changed! Access Control with MAC address filtering –= NO SECURITY! Neither is scalable Authentication Authorization Data Protection Audit

6 WLAN Security Challenges Weak Security in 802.11 Static WEP Static WEP key easily obtained for encryption / authentication X7!g%k0j37**54bf(jv&8gB)£F.. X7!g%k0j37**54bf(jv&8gF… X7!g %k0j 37**54 bf(jv &8gB) £F..

7 WLAN Security Challenges Weak Security in 802.11 Static WEP Man in the middle attacks are difficult to detect & prevent X7!g%k0j37** Rogue Network X7!g%k0j37**

8 Alternatives to WEP

9 VPNs Pros –Familiarity –Hardware Independent –Proven Security Cons –Lacks user transparency –Only user logon (not computer) –Roaming profiles, logon scripts, GPOs broken, shares, management agents, Remote desktop –No reconnect on resume from standby –Complex network structure

10 VPNs More Cons –No protection for WLAN –Bottleneck at VPN devices –Higher management & hardware cost –Prone to disconnection Yet more cons! (non- MS VPNs) –3 rd party licensing costs –Client compatibility –Many VPN auth schemes (IPsec Xauth) are as bad as WEP!

11 PEAP encapsulation 1. 1. Server authenticates to client 2. 2. Establishes protected tunnel (TLS) 3. 3. Client authenticates inside tunnel to server No cryptographic binding between PEAP tunnel and tunneled authN method Fix: constrain client (in GPO) to trust only a specific corporate root CA –Foils potential MitM attacks

12 EAP architecture TLSTLS GSS_API Kerberos GSS_API Kerberos PEAP IKE MD5 EAP PPP 802.3 802.5 802.11 … Anything… method layer method layer EAPlayerEAPlayer medialayermedialayer MS-CHAPv2 TLS SecurID

13 802.1X over 802.11 Supplicant Authenticator Authentication Server 802.11 association EAPOL-start EAP-request/identity EAP-response/identityRADIUS-access-request EAP-requestRADIUS-access-challenge EAP-response (credentials) RADIUS-access-request EAP-successRADIUS-access-accept Access allowed EAPOW-key (WEP) Gotta get on! Calculating this guys key… Accessblocked Calculating my key… (Wow I just dont understand this new maths!)

14 Session Summary Windows XP has great wireless security features Theres extensive prescriptive guidance available from our website Dont be scared of wireless!

15 Next Steps Find additional security training events: http://www.microsoft.com/seminar/events/security.mspx Sign up for security communications: http://www.microsoft.com/technet/security/signup/ default.mspx Check out Security360 http://www.microsoft.com/seminar/events/series/mikenash.mspx Get additional security tools and content: http://www.microsoft.com/security/guidance

16 Resources Microsoft Wi-Fi Page: http://www.microsoft.com/wifihttp://www.microsoft.com/wifi The Unofficial 802.11 Security Web Page http://www.drizzle.com/~aboba/IEEE/http://www.drizzle.com/~aboba/IEEE/ Intercepting Mobile Communications: The Insecurity of 802.11 http://www.drizzle.com/~aboba/IEEE/wep-draft.zip http://www.drizzle.com/~aboba/IEEE/wep-draft.zip Fluhrer, Mantin, Shamir WEP Paper: http://www.crypto.com/papers/others/rc4_ksaproc.pdf http://www.crypto.com/papers/others/rc4_ksaproc.pdf WiFi Planet: http://www.wi-fiplanet.com/http://www.wi-fiplanet.com/ Microsoft Solution for Securing Wireless LANs with PEAP and Passwords (< 1 week) http://www.microsoft.com/technet/security/guidance/peap_0.mspxhttp://www.microsoft.com/technet/security/guidance/peap_0.mspx Microsoft Solution for Securing Wireless LANs with Certificates http://www.microsoft.com/technet/security/prodtech/win2003/pkiwire/swlan.mspx Wifi for SOHO Environments http://www.microsoft.com/technet/prodtechnol/winxppro/maintain/wifisoho.mspx http://www.microsoft.com/technet/prodtechnol/winxppro/maintain/wifisoho.mspx

17 Credits Thanks to Ian Hellen(MCS) & Steve Riley(Corp) as I borrowed several of their slides!

18 Questions and Answers


Download ppt "Implementing Network Security – Wireless Security Segway! Steve Lamb Technical Security Advisor"

Similar presentations


Ads by Google