Fast roaming in WPA T. Wolniewicz PIONIER. Events causing access-point switching Moving wireless client Metwork card switching in search of better conditions.

Slides:



Advertisements
Similar presentations
Inter WISP WLAN roaming
Advertisements

Doc.: IEEE /1186r0 Submission October 2004 Aboba and HarkinsSlide 1 PEKM (Post-EAP Key Management Protocol) Bernard Aboba, Microsoft Dan Harkins,
IEEE INFOCOM 2004 MultiNet: Connecting to Multiple IEEE Networks Using a Single Wireless Card.
Wireless network Usually use Radio Frequency (RF) technology Adv :
Global MP3 Geoffrey Beers Deborah Ford Mike Quinn Mark Ridao.
Doc.: IEEE /0018r0 Submission January 2010 Alexander Tolpin, Intel CorporationSlide 1 4 –Way Handshake Synchronization Issue Date:
Wireless Cracking By: Christopher Zacky.
Doc.: IEEE /275 Submission September 2000 David Halasz, Cisco Systems, Inc.Slide 1 IEEE 802.1X for IEEE David Halasz, Stuart Norman, Glen.
Wireless Design for Voice Last Update Copyright 2011 Kenneth M. Chipps Ph.D.
Network Access and 802.1X Klaas Wierenga SURFnet
Wi-Fi Security January 21, 2008 by Larry Finger. Wi-Fi Security Most laptops now come with built-in wireless capability, which can be very handy; however,
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
(Remote Access Security) AAA. 2 Authentication User named "flannery" dials into an access server that is configured with CHAP. The access server will.
WLAN Security:PEAP Sunanda Kandimalla. Intoduction The primary goals of any security setup for WLANs should include: 1. Access control and mutual authentication,
Handoff Delay for b Wireless LANs Masters Project defense Anshul Jain Committee: Dr. Henning Schulzrinne, Columbia University Dr. Zongming Fei, University.
Mid-term Project Presentation Eli Bendersky Igor Oks.
WPA2 By Winway Pang. Overview  What is WPA2?  Wi-Fi Protected Access 2  Introduced September 2004  Two Versions  Enterprise – Server Authentication.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—3-1 Wireless LANs Understanding WLAN Security.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
CSC – Tieteen tietotekniikan keskus Oy CSC – IT Center for Science Ltd. WLAN Infrastructure Monitoring and Supplicants Workshop on Wireless Belgrade -
Connecting to Secure Wi-Fi in QSB Boardroom Locations 01 September 2013.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Troubleshooting Your Network Networking for Home and Small Businesses.
1 Week #7 Network Access Protection Overview of Network Access Protection How NAP Works Configuring NAP Monitoring and Troubleshooting NAP.
Wireless and Security CSCI 5857: Encoding and Encryption.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Router LAN Switching and Wireless – Chapter 7.
ECE 424 Embedded Systems Design Networking Connectivity Chapter 12 Ning Weng.
Investigators have published numerous reports of birds taking turns vocalizing; the bird spoken to gave its full attention to the speaker and never vocalized.
Wave Relay System and General Project Details. Wave Relay System Provides seamless multi-hop connectivity Operates at layer 2 of networking stack Seamless.
“A New Level” Redesigning the Network and Rebuilding Two New Computer Labs for Harambee Ministries By Josh Kammerer.
Version Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues.
Wireless Network Authentication Regnauld / Büttrich, Edit: Sept 2011 Wireless Network Authentication Regnauld / Büttrich, Edit: Sept 2011.
Chapter Network Security Architecture Security Basics Legacy security Robust Security Segmentation Infrastructure Security VPN.
By: Alex Feldman.  A mobile station is connected to the network wirelessly through another device.  In case of WiFi (IEEE ) this would be an access.
Implementing Network Access Protection
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Configure a Wireless Router LAN Switching and Wireless – Chapter 7.
Implementing Wireless and WLAN Chapter 19 powered by DJ 1.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—-3-1 Wireless LANs Implementing a WLAN.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
Avaya Wireless Installation (hands-on). Hands-on tasks overview  Choice of the following (depending on type of system present). Multiple tasks allowed.
1/28/2010 Network Plus Unit 4 WAP Configuration WAP Configuration In this section we will discuss basic Wireless Access configuration using a Linksys.
Doc.: IEEE /0476r3 Submission May 2004 Jesse Walker and Emily Qi, Intel CorporationSlide 1 Pre-Keying Jesse Walker and Emily Qi Intel Corporation.
EAP Key Framework Draft-ietf-eap-keying-01.txt IETF 58 Minneapolis, MN Bernard Aboba Microsoft.
Doc.: IEEE /1572r0 Submission December 2004 Harkins and AbobaSlide 1 PEKM (Post-EAP Key Management Protocol) Dan Harkins, Trapeze Networks
Doc.: IEEE /0476r2 Submission May 2004 Jesse Walker and Emily Qi, Intel CorporationSlide 1 Pre-Keying Jesse Walker and Emily Qi Intel Corporation.
Doc.: IEEE /0374r0 Submission March 2010 Dan Harkins, Aruba NetworksSlide 1 Clarifying the Behavior of PMK Caching Date: Authors:
An Empirical Analysis of the IEEE MAC Layer Handoff Process Arunesh Mishra Minho Shin William Arbaugh University of Maryland,College Park,MD.
Configuring Network Access Protection
Wi-Fi: How it Works and Security Measures. What is Wi-Fi? Any wireless local area network (WLAN) product that meets the Institute of Electrical and Electronics.
Doc.: IEEE /0707r0 Submission July 2003 N. Cam-Winget, et alSlide 1 Establishing PTK liveness during re-association Nancy Cam-Winget, Cisco Systems.
IEEE i Aniss Zakaria Survey Fall 2004 Friday, Dec 3, 2004
Doc.: IEEE r Submission November 2004 Bob Beach, Symbol TechnologiesSlide 1 Fast Roaming Using Multiple Concurrent Associations Bob.
Doc.: IEEE /1062r0 Submission September 2004 F. Bersani, France Telecom R&DSlide 1 Dominos, bonds and watches: discussion of some security requirements.
Distributed WPA Cracking CSCI Distributed Systems Spring 2011 University of Colorado Rodney Beede Ryan Kroiss Arpit Sud
Cisco Discovery Networking for Homes and Small Businesses Chapter 7 JEOPARDY.
802.11b Security CSEP 590 TU Osama Mazahir. Introduction Packets are sent out into the air for anyone to receive Eavesdropping is a much larger concern.
Wireless Network Security CSIS 5857: Encoding and Encryption.
Doc.: IEEE /657r0 Submission August 2003 N. Cam-WingetSlide 1 TGi Draft 5.0 Comments Nancy Cam-Winget, Cisco Systems Inc.
Cisco Discovery Home and Small Business Networking Chapter 7 – Wireless Networking Jeopardy Review v1.1 Darren Shaver Kubasaki High School – Okinawa,
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
COMP2322 Lab 1 Introduction to Wireless LAN Weichao Li Apr. 8, 2016.
Doc.: IEEE / i Submission July 2003 Petroni,Arbaugh WAA Associates, LLC.Slide 1 An Empirical Analysis of the 4- way Hand-shake 1 Nick.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Wireless Security.
Outline What is Wireless LAN Wireless Transmission Types
Module Overview Installing and Configuring a Network Policy Server
Keying for Fast Roaming
Roaming Keith Amann, Spectralink
Keying for Fast Roaming
Wireless Thin and Thick?
Presentation transcript:

Fast roaming in WPA T. Wolniewicz PIONIER

Events causing access-point switching Moving wireless client Metwork card switching in search of better conditions Client roaming initiated by the access-point – requires non-standard solutions like Cisco Client Extensions

What happens during access-point change STA needs to authenticate (delay!!) Pairwise master key (PMK) must be distributed to STA and to the AP – PMK is sent by home Radius to STA as a part of the EAP conversation – PMK is sent to the AP within MS-MPPE-Recv-Key WPA 4-way handshake must be completed between AP and the STA – Both sides verify that the peer knows PMK

Roaming delay Authentication can take several seconds, especially for eduroam guest access WPA hanshake is fast (miliseconds)

802.11i/WPA2 Preauthentication – NAS can authenticate to other APs not breaking association with its current AP PMK caching – Both AP and NAS can keep a cache of PMKs to be reused when reassociation happens WPA2 is supported in Windows, but preauthentication and PMK caching seem to require registry changes

Controller based wireless systems APs cannot function on their own Controller acts as the Radius client Controller knows all PMKs and in principle can perform WPA handshake between a new AP and STA using PMK established during a previous authentication between this STA and another controlled AP (if the STA will accept reusing the PMK for another AP) All controller vendors claim this can be done and the AP change can be done within tens of milliseconds This is what we have been testing

How the test was performed Laptop running Windows XP SP2, SP3 and Vista (SP1) (various wireless cards) – NTP synchronised time just before starting the test – fping – ping implementation allowing us to control ping frequency and response timeout we have been sending packets every 100 ms with 200 ms timeout we have been marking all ping responses with timestamps and writing them to a file – some software showing the associated AP under vista “netsh wlan show interfaces” worked but only for some wireless cards card-specific software was also used Ping logs have been compared with the RADIUS authentication logs Tests have been performed with both local and Surfnet showcase guest account Network security was set to WPA/TKIP and in some cases WPA2/AES was also tested

Additional voice test (only with Cisco) Nokia E65 was used for voice test – fring was used to establish a Skype connection to a PC – PC’s mike was listening to the radio – I have listened to the voice on Nokia manually recording breaks in transmission

Which systems have been tested 3COM WX1200 with AP 8760 Alcatel OmniAccess 4302 with AP 60 and 70 – vendor is coming back to us after some in-house testing – similar tests, with identical results, have been performed by PSNC on an Aruba system Siemens HiPath Wireless C2400 Controller Cisco 2000 Series WLAN Controller: 6 Aps Trapeze Networks MXR-2 with MP-272 – test not complete, but this system will most likely behave the same as 3COM WX

Test results We have not observed a single case of AP roaming which would not require a reauthentication Cisco roaming did require reauthentication but it was extremely fast with a local account (it was observable during voice transmission, but hardly), however during the guest access the break lasted between 1.5 and 3 seconds. WPA2 test for Siemens showed that authentication happened visibly earlier then the AP switch, but still the break in transmission was over 1 second

Vendor reaction So far no vendor has been able to prove that we have been wrong in our tests In some cases vendors have confirmed that they have not been able to produce authentication-less roaming in their labs Some vendors started asking “why do you need this fast roaming anyway?” Some vendors took their equipment back for further testing and we are still waiting for their response

MERU Networks Virtual Cell This is such a unique idea, that it requires separate description In MERU solution all APs use the same channel and the same BSSID. There are no collisions as the controller manages the time when the APs send their frames From the STA point of view there is no roaming - STA sees only one AP The de-facto roaming does not even require WPA handshake and does indeed happen absolutely smoothly

MERU tests We have been running tests with one controller and 15 APs running a production network at Faculty of Mathematics and Informatics. There were some issues due to faulty hardware In general the test passed OK