* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Wireless Security
		                    
		                    
								Survey							
                            
		                
		                
                            
                            
								Document related concepts							
                        
                        Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Wake-on-LAN wikipedia , lookup
Piggybacking (Internet access) wikipedia , lookup
Zero-configuration networking wikipedia , lookup
Extensible Authentication Protocol wikipedia , lookup
IEEE 802.11 wikipedia , lookup
						
						
							Transcript						
					
					 802.11 Basics  Security in 802.11  WEP summary  WEP Insecurity      ALOHAnet 1999: IEEE 802.11a (54 Mbps) 1999: IEEE 802.11b (11 Mbps) 2003: IEEE 802.11g (54 Mbps) 2009: IEEE 802.11n (150 Mbps) 802.11b  2.4-2.485 GHz unlicensed radio spectrum  up to 11 Mbps  direct sequence spread spectrum (DSSS) in physical layer: all hosts use same chipping code  802.11a  5-6 GHz range  up to 54 Mbps  Physical layer: orthogonal frequency division multiplexing (OFDM)  802.11g  2.4-2.485 GHz range  up to 54 Mbps  OFDM  All use CSMA/CA for multiple access  All have base-station and adhoc versions  All allow for reducing bit rate for longer range  4  Wireless host communicates with a base station  base station = access point (AP)  Basic Service Set (BSS) (a.k.a. “cell”) contains: wireless hosts  access point (AP): base station  BSS’s combined to form distribution system (DS)    No AP (i.e., base station) wireless hosts communicate with each other  to get packet from wireless host A to B may need to route through wireless hosts  Applications:  “Laptop” meeting in conference room  Vehicle Network  Interconnection of “personal” devices  Battlefield   802.11b: 2.4GHz-2.485GHz spectrum divided into 11 channels at different frequencies; 3 non-overlapping  AP admin chooses frequency for AP  interference possible: channel can be same as that chosen by neighboring AP! AP regularly sends beacon frame  Includes SSID, beacon interval (often 0.1 sec)  host: must associate with an AP     scans channels, listening for beacon frames selects AP to associate with; initiates association protocol may perform authentication After association, host will typically run DHCP to get IP address in AP’s subnet 7 2 2 6 6 6 frame address address address duration control 1 2 3 Address 1: MAC address of wireless host or AP to receive this frame 2 6 seq address 4 control 0 - 2312 4 payload CRC Address 4: used only in ad hoc mode Address 3: MAC address of router interface to which AP is attached Address 2: MAC address of wireless host or AP transmitting this frame 8 802.11 frame: addressing R1 router H1 Internet AP H1 MAC addr R1 MAC addr dest. address source address 802.3 frame H1 MAC addr AP MAC addr R1 MAC addr address 1 address 2 address 3 802.11 frame 9 802.11 frame: addressing R1 router H1 Internet AP R1 MAC addr dest. address H1 MAC addr source address 802.3 frame AP MAC addr address 1 H1 MAC addr address 2 R1 MAC addr address 3 802.11 frame 10 frame: 2 2 6 6 6 frame address address address duration control 1 2 3 2 Protocol version 2 4 1 Type Subtype To AP 6 2 1 seq address 4 control 1 From More AP frag 1 Retry 1 0 - 2312 4 payload CRC 1 Power More mgt data 1 1 WEP Rsvd frame control field expanded:  Type/subtype distinguishes beacon, association, ACK, RTS, CTS, etc frames.  To/From AP defines meaning of address fields  802.11 allows for fragmentation at the link layer  802.11 allows stations to enter sleep mode  Seq number identifies retransmitted frames (eg, when ACK lost)  WEP = 1 if encryption is used 11      Service Set Identifier (SSID) Differentiates one access point from another SSID is cast in ‘beacon frames’ every few seconds. Beacon frames are in plain text! Encryption  802.11 Basics  Security in 802.11  WEP summary  WEP Insecurity  Why do we need the encryption?  Wi-Fi networks use radio transmissions prone to eavesdropping  Mechanism to prevent outsiders from ▪ accessing network data & traffic ▪ using network resources  Access points have two ways of initiating communication with a client  Shared Key or Open System authentication  Open System: need to supply the correct SSID  Allow anyone to start a conversation with the AP  Shared Key is supposed to add an extra layer of security by requiring authentication info as soon as one associates  Client begins by sending an association request to the AP  AP responds with a challenge text (unencrypted)  Client, using the proper key, encrypts text and sends it back to the AP  If properly encrypted, AP allows communication with the client  1997: Original 802.11 standard only offers  SSID  MAC Filtering  1999: Introduce of Wired Equivalent Privacy (WEP)  Several industry players formes WECA (Wireless Ethernet Compatibility Alliance) for rapid adaption of 802.11 network products  2001: Discover weaknesses in WEP  IEEE started Task Group i   2002: WECA was renamed in WI-FI 2003: WiFi Protected Access (WPA)  Interim Solution for the weakness of WEP  2004: WPA2 (IEEE-802.11i-2004)  Primary built security for 802.11 protocol  RC4 encryption  64-bits RC4 keys  Non-standard extension uses 128-bit keys  Many flaws in implementation  Interim solution for replacement of WEP  Goals:  improved encryption  user authentication  Two Modes  WPA Personal : TKIP/MIC ; PSK  WPA Enterprise : TKIP/MIC ; 802.1X/EAP  WPA-Personal  Also refer to WPA-PSK (WPA Pre-shared Key)  Designed for home and small office networks and doesn't require an authentication server.  WPA-Enterprise  Known as WPA-802.1X  Designed for enterprise networks and requires an authentication server  An Extensible Authentication Protocol (EAP) is used for authentication  Supports multiple authentication method based on: ▪ passwords (Sample: PEAP) ▪ digital certificates (Sample: TLS, TTLS)  TKIP (Temporal Key Integrity Protocol)  The 128 bit RC4 stream cipher used in WPA  CCMP (Counter Cipher Mode with Block Chaining Message Authentication Code Protocol)  An AES-based encryption mechanism used in WPA2  Approved in July 2004  AES is used for encryption  Two mode like WPA:  Enterprise Mode: ▪ authentication: 802.1X/EAP ▪ encryption: AES-CCMP  Personal Mode: ▪ authentication: PSK ▪ encryption: AES-CCMP WEP WPA WPA2 Cipher RC4 RC4 AES Key Size (bits) 64/128 128 128 Key Life 24 bit IV 48 bit IV 48 bit IV Packet Key Concatenation Two Phase Mix Not Need Data Integrity CRC32 Michael CCM Key Management None 802.1X/PSK 802.1X/PSK 23 • WEP is no longer a secure wireless method • WPA2 with AES encryption is currently the best encryption scheme • If on an unsecured network, use SSH or VPN tunneling to secure your data  802.11 Basics  Security in 802.11  WEP summary  WEP Insecurity A block of plaintext is bitwise XORed with a pseudorandom key sequence of equal length  RC4 PRNG  26 CRC 802.11 Frame Header Payload Payload ICV 32  ICV computed – 32-bit CRC of payload 4 x 40 Key 1 Keynumber Key 2 Key 3 Key 4   Key 40 ICV computed – 32-bit CRC of payload One of four keys selected – 40-bits    IV keynumber 24 8 ICV computed – 32-bit CRC of payload One of four keys selected – 40-bits IV selected – 24-bits, prepended to keynumber 64 IV Payload     Key ICV RC4 Payload ICV ICV computed – 32-bit CRC of payload One of four keys selected – 40-bits IV selected – 24-bits, prepended to keynumber IV+key used to encrypt payload+ICV WEP Frame Header      IV keynumber Payload ICV ICV computed – 32-bit CRC of payload One of four keys selected – 40-bits IV selected – 24-bits, prepended to keynumber IV+key used to encrypt payload+ICV IV+keynumber prepended to encrypted payload+ICV 4 x 40 Key 1 Keynumber Key 2 Key 3 Key 4  Keynumber is used to select key Key 40 64 IV Payload Key ICV RC4  Keynumber is used to select key  ICV+key used to decrypt payload+ICV Payload ICV Payload ICV CRC Header Payload ICV’ 32  Keynumber is used to select key  ICV+key used to decrypt payload+ICV  ICV recomputed and compared against original 24 104 IV Key Payload      ICV 128-bits RC4 Payload ICV Purpose – increase the encryption key size Non-standard, but in wide use IV and ICV set as before 104-bit key selected IV+key concatenated to form 128-bit RC4 key   Keys are manually distributed Keys are statically configured  often infrequently changed and easy to remember!   Key values can be directly set as hex data Key generators provided for convenience  ASCII string is converted into keying material  Non-standard but in wide use  Different key generators for 64- and 128-bit  http://www.wepkey.com/ 38  802.11 Basics  Security in 802.11  WEP summary  WEP Insecurity    Problem: Keystream Reuse WEP’ s Solution: Per Packet Ivs But… XOR cancels keystream so knowing one plaintext will get you the other 40     IV only 24-bits in WEP, It must repeat after 2^24 or ~ 16.7M packets practical? How long to exhaust the IV space in busy network?  A busy AP constantly send 1500 bytes packet  Consider Data Rate 11 Mbps  IV exhausts after.. (1500 ´ 8) 24 11´10 6 ´ 2 » 18000s » 5hrs Consequences: – Keystream for corresponding IV is obtained 41  2001: Fluhrer, Mantin, Shamir : Weaknesses in the Key Scheduling Algorithm of RC4.  completely passive attack  Inductive chosen plaintext attack  Takes 5-10M. packets to find secret key  Showed that WEP is near useless 42     In 2001, airsnort was released but needs millions of packets ‹In 2004, aircrack and weblap require only hundreds of thousands of packets http://securityfocus.com/infocus/1814 ‹http://www.securityfocus.com/infocus/1824 43 One common shared key  If any device is stolen or compromised, must change shared key in all devices  No key distribution mechanism  Infeasible for large organization: approach doesn’t scale Crypto is flawed  Early 2001: Integrity and authentication attacks published  August 2001 (weak-key attack): can deduce RC4 key after observing several million packets  AirSnort application allows casual user to decrypt WEP traffic Crypto problems  24 bit IV to short  Same key for encryption and message integrity  ICV flawed, does not prevent adversarial modification of intercepted packets  Cryptanalytic attack allows eavesdroppers to learn key after observing several millions of packets 44  SSID and access control lists provide minimal security  no encryption   WEP provides encryption, but is easily broken Emerging protocol: 802.11i  Back-end authentication server  Public-key cryptography for authentication and master key distribution  TKIP: Strong symmetric crypto techniques 45  Fluhrer, Mantin, Shamir - Weakness in the Key Scheduling Algorithm of RC4. http://www.drizzle.com/~aboba/IEEE/rc4_ksaproc.pdf  Stubblefield, Loannidis, Rubin – Using the Fluhrer, Mantin, and Shamir Attack to Break WEP. http://www.cs.rice.edu/~astubble/wep/wep_attack.pdf  Rivest – RSA Security Response to Weakness in the Key Scheduling Algorithm of RC4. http://www.rsasecurity.com/rsalabs/technotes/wep.html  RC4 Encryption Algorithm. http://www.ncat.edu/~grogans/algorithm_breakdown.htm 46
 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
                                             
                                             
                                             
                                             
                                             
                                             
                                             
                                             
                                            