Download ppt - Iuwne10 S04 L05

Transcript
Page 1: Iuwne10 S04 L05

© 2008 Cisco Systems, Inc. All rights reserved. IUWNE v1.0—4-1

WLAN Security

Managing Authentication and Encryption with WPA and WPA2

Page 2: Iuwne10 S04 L05

© 2008 Cisco Systems, Inc. All rights reserved. IUWNE v1.0—4-2

Wi-Fi Protected Access (WPA)

WPA introduced in late 2003

Pre-standard implementation of IEEE 802.11i WLAN security

Addresses currently known security problems with WEP

Allows software upgrade on already deployed 802.11 equipment to improve security

Components of WPA

− Authenticated key management using 802.1X: EAP authentication, and PSK authentication

− Unicast and broadcast key management

− Standardized TKIP per-packet keying and MIC protocol

− Initialization vector space expansion: 48-bit initialization vectors

− Migration mode—coexistence of WPA and non-WPA devices (optional implementation that is not required for WPA certification)

Page 3: Iuwne10 S04 L05

© 2008 Cisco Systems, Inc. All rights reserved. IUWNE v1.0—4-3

WPA Authentication Modes

Enterprise(802.1X Authentication)

Personal(PSK Authentication)

Authentication server required Authentication server not required

RADIUS used for authentication and key distribution

Shared secret used for authentication

Centralized access control Local access control

Encryption uses TKIP, AES optional

Encryption uses TKIP, AES optional

Page 4: Iuwne10 S04 L05

© 2008 Cisco Systems, Inc. All rights reserved. IUWNE v1.0—4-4

WPA Authentication Process

Page 5: Iuwne10 S04 L05

© 2008 Cisco Systems, Inc. All rights reserved. IUWNE v1.0—4-5

Purpose of Each WPA Phase

RADIUS-based key distribution

− Server moves (not copies) Pairwise Master Key (PMK) to access point

802.1X key management

− Bind PMK to client and AP

− Confirm both client and access point possess PMK

− Generate fresh Pairwise Transient Key (PTK)

− Prove each peer is live

− Synchronize PTK use

− Distribute Group Transient Key (GTK)

Page 6: Iuwne10 S04 L05

© 2008 Cisco Systems, Inc. All rights reserved. IUWNE v1.0—4-6

Unicast Keys: Four-Way Handshake

John Bartenhagen
Q2Dev: In label and callout at top right, "Point" should be lowercase. -EDIT.
Page 7: Iuwne10 S04 L05

© 2008 Cisco Systems, Inc. All rights reserved. IUWNE v1.0—4-7

Group Key Handshake

Page 8: Iuwne10 S04 L05

© 2008 Cisco Systems, Inc. All rights reserved. IUWNE v1.0—4-8

WPA: Longer Key, Longer Initialization Vector

IV = initialization vector

John Bartenhagen
Q2Dev: In yellow circle, "engine" should be capitalized. -EDIT.
Page 9: Iuwne10 S04 L05

© 2008 Cisco Systems, Inc. All rights reserved. IUWNE v1.0—4-9

WPA: Per-Packet Key Mixing

IV = initialization vector

John Bartenhagen
Q2Dev: In yellow circle, "engine" should be capitalized. -EDIT.
Page 10: Iuwne10 S04 L05

© 2008 Cisco Systems, Inc. All rights reserved. IUWNE v1.0—4-10

Message Integrity Check

MIC is calculated from:

− MIC key

− Destination MAC address

− Source MAC address

− Data payload

Uses Michael Algorithm

− Has its own key

Algorithm is relatively lightweight

− Computationally inexpensive

− Can be implemented in firmware on NIC cards

Page 11: Iuwne10 S04 L05

© 2008 Cisco Systems, Inc. All rights reserved. IUWNE v1.0—4-11

WPA Pre-Shared Key (PSK) Authentication: Offline Dictionary Attack

John Bartenhagen
Q2Dev: In center top callout, "Pre" should be lowercase.In callout for bottom arrow, "mqmt" should be "mgmt".In text at bottom right, "Dictionary" should be lowercase.-EDIT.
Page 12: Iuwne10 S04 L05

© 2008 Cisco Systems, Inc. All rights reserved. IUWNE v1.0—4-12

WPA2 and IEEE 802.11i

802.11i

− Ratified in June 2004

− Standardizes

802.1X for authentication

AES to be used for encryption

Key management

WPA2

– Supplement to WPA ”version 1”, which uses TKIP encryption

– Provides for AES encryption to be used

– Third-party testing and certification for WLAN device compatibility

Page 13: Iuwne10 S04 L05

© 2008 Cisco Systems, Inc. All rights reserved. IUWNE v1.0—4-13

IEEE 802.11i and AES Encryption

Uses AES encryption in lieu of RC4 encryption Specific AES implementation used in 802.11i is called

“AES Counter Mode with CBC-MAC authentication” (a.k.a. AES-CCMP)

128-bit, symmetric block cipher (versus RC4 stream cipher)

AES cryptographically more robust than RC4 (and requires more computational power)

AES is implemented in hardware

Page 14: Iuwne10 S04 L05

© 2008 Cisco Systems, Inc. All rights reserved. IUWNE v1.0—4-14

WPA/WPA2/802.11i Comparison

WPA WPA2 802.11i

SOHO Enterprise Enterprise

802.1X authentication/PSK

802.1X authentication/PSK

802.1X authentication

128-bit RC4 w/ TKIP encryption cipher

128-bit AES encryption cipher

128-bit AES encryption cipher

Ad hoc not supported Ad hoc not supported Allows ad hoc

Test devices for compliance

Test devices for compliance

No test, specification

Page 15: Iuwne10 S04 L05

© 2008 Cisco Systems, Inc. All rights reserved. IUWNE v1.0—4-15

802.11i Key Caching and Preauthentication

802.11i allows credentials to be cached on an AP, and a client to preauthenticate on several APs

John Bartenhagen
Q2Dev: In top arrow callout, "Request" should be lowercase.In second arrow callout, "Response" and "Success" should be lowercase.-EDIT.
Page 16: Iuwne10 S04 L05

© 2008 Cisco Systems, Inc. All rights reserved. IUWNE v1.0—4-16

Cisco Centralized Key Management

Page 17: Iuwne10 S04 L05

© 2008 Cisco Systems, Inc. All rights reserved. IUWNE v1.0—4-17

Summary

WPA creates a new framework for authentication and encryption.

With WPA, authentication can still be PSK-based, like WEP, but can also be 802.1X-based.

WPA encryption is still RC4, but enhanced to make it harder to crack.

WPA2 uses AES-CCMP for encryption, known to be unbreakable.

802.11i is a protocol, and WPA2 certifies its implementation.

Cisco Centralized Key Management is a Cisco feature allowing caching of credentials to improve roaming efficiency.

Page 18: Iuwne10 S04 L05

© 2008 Cisco Systems, Inc. All rights reserved. IUWNE v1.0—4-18