Securing your wireless LAN Paul DeBeasi VP Marketing

Slides:



Advertisements
Similar presentations
IEEE i IT443 Broadband Communications Philip MacCabe October 5, 2005
Advertisements

CSE  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Attack and Defense in Wireless Networks Presented by Aleksandr Doronin.
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
CSG357 Dan Ziminski & Bill Davidge 1 Effective Wireless Security – Technology and Policy CSG 256 Final Project Presentation by Dan Ziminski & Bill Davidge.
無線區域網路安全 Wireless LAN Security. 2 Outline  Wireless LAN – b  Security Mechanisms in b  Security Problems in b  Solutions for b.
Implementing Wireless LAN Security
Security+ Guide to Network Security Fundamentals, Third Edition
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
Wireless LAN Security Jerry Usery CS 522 December 6 th, 2006.
WEP and i J.W. Pope 5/6/2004 CS 589 – Advanced Topics in Information Security.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
MITP | Master of Information Technology Program Securing Wireless LAN using Cisco-based technology Campus Crew Study Group Paul Matijevic Ed McCulloch.
DIMACS Nov 3 - 4, 2004 WIRELESS SECURITY AND ROAMING OVERVIEW DIMACS November 3-4, 2004 Workshop: Mobile and Wireless Security Workshop: Mobile and Wireless.
W i reless LAN Security Presented by: Pallavi Priyadarshini Student ID
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
802.1x EAP Authentication Protocols
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0—8-1 Security Olga Torstensson Halmstad University.
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
IEEE Wireless Local Area Networks (WLAN’s).
Wireless Security Presentation by Paul Petty and Sooner Brooks-Heath.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
Top-Down Network Design Chapter Eight Developing Network Security Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
WLAN security S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents WEP (Wired Equivalent Privacy) No key management Authentication.
Wireless Security Issues David E. Hudak, Ph.D. Senior Software Architect Karlnet, Inc.
Chapter 3 Application Level Security in Wireless Network IWD2243 : Zuraidy Adnan : Sept 2012.
Demonstration of Wireless Insecurities Presented by: Jason Wylie, CISM, CISSP.
Wireless LAN Security Yen-Cheng Chen Department of Information Management National Chi Nan University
EAP Overview (Extensible Authentication Protocol) Team Golmaal: Vaibhav Sharma Vineet Banga Manender Verma Lovejit Sandhu Abizar Attar.
WLAN What is WLAN? Physical vs. Wireless LAN
VPN Wireless Security at Penn State Rich Cropp Senior Systems Engineer Information Technology Services The Pennsylvania State University © All rights.
Agenda 10:00 11:00 Securing wireless networks 11:00 11:15 Break 11:15 12:00Patch Management in the Enterprise 12:00 1:00 Lunch 1:00 2:30 Network Isolation.
Wireless Security Techniques: An Overview Bhagyavati Wayne C. Summers Anthony DeJoie Columbus State University Columbus State University Telcordia Technologies,
Michal Rapco 05, 2005 Security issues in Wireless LANs.
Mobile and Wireless Communication Security By Jason Gratto.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
WIRELESS LAN SECURITY Using
Comparative studies on authentication and key exchange methods for wireless LAN Authors: Jun Lei, Xiaoming Fu, Dieter Hogrefe and Jianrong Tan Src:
© 2004 Bluesocket, Inc. Secure Mobility ™ Wireless Security: Issues and Solutions Mike Brockney Bluesocket
Wireless Networking.
Chapter Network Security Architecture Security Basics Legacy security Robust Security Segmentation Infrastructure Security VPN.
Wireless Network Security Dr. John P. Abraham Professor UTPA.
Wireless Security Beyond WEP. Wireless Security Privacy Authorization (access control) Data Integrity (checksum, anti-tampering)
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
WLAN Security Issues, technologies, and alternative solutions Hosam M. Badreldin Western Illinois University December 2011 Hosam Badreldin – Fall 2011.
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
WEP Protocol Weaknesses and Vulnerabilities
WEP, WPA, and EAP Drew Kalina. Overview  Wired Equivalent Privacy (WEP)  Wi-Fi Protected Access (WPA)  Extensible Authentication Protocol (EAP)
.  TJX used WEP security  They lost 45 million customer records  They settled the lawsuits for $40.9 million.
Wireless Technology x: Wi-Fi Standards - Cutting Through The Confusion Rob Karnbach Wireless ME May 2003.
The University of Bolton School of Business & Creative Technologies Wireless Networks - Security 1.
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
WLAN Security Condensed Version. First generation wireless security Many WLANs used the Service Set Identifier (SSID) as a basic form of security. Some.
Wireless security Wi–Fi (802.11) Security
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
KAIS T Comparative studies on authentication and key exchange methods for wireless LAN Jun Lei, Xiaoming Fu, Dieter Hogrefe, Jianrong Tan Computers.
EECS  Wired Equivalent Privacy (WEP) ◦ first security protocol defined in  Wi-Fi Protected Access (WPA) ◦ defined by Wi-Fi Alliance 
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Wireless Security.
© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0— © 2003, Cisco Systems, Inc. All rights reserved.
Wireless Security - Encryption Joel Jaeggli For AIT Wireless and Security Workshop.
Understand Wireless Security LESSON Security Fundamentals.
Wireless LAN Security 4.3 Wireless LAN Security.
Wireless Network Security
Presentation transcript:

Securing your wireless LAN Paul DeBeasi VP Marketing

Pop quiz At the end of this presentation you will… A.Think you are an expert in all aspects of wireless security. B.Decide that WLANs can never be secure enough for enterprise deployment. C.Become aware of WLAN security risks and approaches for risk mitigation. D.Need a no-whip, triple-shot, cappuccino.

Wireless vulnerabilities Theft of service –No security –Key derivation –MAC spoofing –Rogue WLANs –Default SSID –Ad-hoc networks Session hijacking –Man in the middle attacks Deny/degrade service –RF interference/jam –Bit flipping –Disassociation attack –EAP attacks Network eavesdropping –RF Monitors Infrastructure attack –Default passwords

Security Concepts Authentication Something you are, you have, you know Data Privacy Keeping your data hidden from prying eyes Data Integrity Prevent data tampering Authorization Control access to network resources

Evolution of WLAN security

WEP Wired Equivalent Privacy –Protect from eavesdropping “Good enough” privacy –U.S. export control law restrictions in 1999 Network-wide shared key –All packets encrypted IV (24 bits) WEP Key (40 or 104 bits) RC4 Key stream Clear text XOR Encrypted text

What’s wrong with WEP? (a lot!) Turned off by default pray –Plug and pray mobility Authentication –No user authentication Encryption –WEP key can be broken in a few hours Data integrity –CRC (cyclic redundancy check) susceptible to bit flipping Difficult to update keys –Must manually change every station

WEP/ recommendations Turn on WEP –Better than no security at all Change default SSID –And, don’t use a name like “finance-network” Disable SSID beaconing –Make it difficult for attackers to find your WLANs Change default key –And, change the key frequently Use MAC address filtering –More useful for small deployments

Evolution of WLAN security

802.1x and EAP Campus Network Authentication Server SupplicantAuthenticator 802.1x defines EAPOL (Extensible Authentication Protocol over LAN) –Provides centralized authentication and dynamic key exchange –EAP packets carried at the MAC layer, embedded in RADIUS commands EAP is extensible –Most common examples: EAP-TLS, EAP-TTLS, EAP-LEAP, EAP-PEAP EAPOL RADIUS EAP- (TLS, TTLS, PEAP, LEAP)

802.1x and EAP – benefits Centralized authentication –Per user authentication and resource allocation –Authentication server and supplicant authenticate each other –Effectively eliminates Man-in-the-middle attacks Centralized key management –Derived unique per user session key Centralized policy control –Session time-out and automatic key redistribution (“dynamic WEP”) –VLAN assigned by the Authentication server Campus Network Authentication Server SupplicantAuthenticator

EAP Types – variations on a theme EAP over TLS (EAP-TLS) –IETF standard (RFC 2716) –Uses digital certificates for both user and server EAP over Tunneled TLS (EAP-TTLS) –IETF draft (Funk), only the server needs to have a certificate –Supports password or token based authentication within a protected tunnel Protected EAP (PEAP) –IETF draft (Cisco, Microsoft, RSA), only the server needs to have a certificate –Supports various EAP-encapsulation methods within a protected tunnel Cisco LEAP –Proprietary solution for mutual authentication –Supports various EAP-encapsulation methods within a protected tunnel –Vulnerable to ASLEAP dictionary attack

Virtual private networks An alternative approach –Treats wireless as an “un-trusted” network –IETF standard - layer 3 authentication & encryption Challenges –Vulnerable at layer 2 Rogue AP Layer 2 session hijacking DOS attacks against wireless stations or VPN device –Can be difficult to manage and to scale Campus Network VPN Server Client software IPSec

Comparing the options TLSTTLSPEAPLEAPIPSec EncryptRC4 3DES/AES User KeysYes Client software ManyFUNK, MeetingH ManyCiscoMany Auth. Server software ManyFUNK, MeetingH ManyCiscoMany Client certificates Req.Optional NoOptional Server certificates Req. NoOptional Cisco, Microsoft, RSA supported

802.1x and VLANs Centralized policy control –Per-user VLAN Policy improves traffic control –Timer-based key rotation reduce WEP key risk Wireless switch Engineering Marketing Engineering Marketing Engineering Authentication Server - VLAN ID - re-key

802.1x, VLAN, VPN & EAP Recommendations 802.1x –Strongly recommended to deploy 802.1x –Provides centralized management/policy control VPN –If you chose to use VPNs then be sure to use 802.1x too VLAN –Deploy per-user VLAN policy via the authentication server EAP –Consider EAP-TLS if certificate infrastructure in place –Avoid LEAP if standards-based solutions are important –TTLS and PEAP are very similar/competing approaches

Evolution of WLAN security

Wi-Fi Protected Access (WPA) Authentication –802.1x port based authentication at layer 2 –Works with EAP methods Data Privacy –TKIP (Temporal Key Integrity Protocol) –Bigger Initialization Vector; 48 bits versus 24 bits –Per-user keying & key rotation with every packet –Requires hardware acceleration Data integrity –MIC (Message Integrity Code) algorithm –Fixes flaws in the CRC algorithm used in WEP. WPA IEEE i Draft x TKIP MIC

WPA recommendations Use it if you can –Many devices/NICs do not yet support WPA Network interface cards –Ensure the card supports WPA, some never will Operating systems –Microsoft XP supports WPA –See Meetinghouse and Funk for other OS clients Authentication servers –Make sure they support EAP types Network infrastructure –Make sure the hardware supports WPA

Evolution of WLAN security

802.11i / WPA2 The future of security –Still in draft form at the IEEE i working group –Expected to be complete in 2004 Uses Advanced Encryption Standard (AES) encryption –Approved by NIST (National Institute of Standards and Technology) –As secure as 3DES, but requires less computational power –Includes integrated data integrity –Also known as the “Rjindael” algorithm Make sure that new hardware is i-ready –Must support AES cryptography acceleration now

Checklist for securing your WLAN  WEP  Turn on WEP, change key  Change default SSID  Disable SSID beacon  802.1x, VLAN, VPN  Use 802.1x with PEAP  Use L2 security if using VPN  Integrates with your VLAN’s  WPA  Require WPA certification  Don’t use pre-shared keys  Look for hardware acceleration  IEEE i (WPA2)  Uses new AES cipher  Not yet standardized  Use i-ready equipment Pop Quiz answer is… C. Become aware of WLAN security risks and approaches for risk mitigation.

Useful links –Security white papers and resource center –WLAN BLOG with vendor neutral commentary & links to other useful sites –The unofficial security page –Commonly used “war driving” tool –Commonly used tool to break WEP keys –WiFi Alliance list of certified products –“Look before you leap” article that discusses how LEAP was cracked.