Security in IEEE 802.11 wireless networks
Download
Report
Transcript Security in IEEE 802.11 wireless networks
Security in IEEE 802.11
wireless networks
Piotr Polak
University Politehnica of Bucharest, December 2008
About IEEE 802.11
IEEE 802.11 is set of standards created for building wireless
networks.
IEEE 802.11 grants the interoperability between different wireless
devices.
IEEE 802.11 is often called Wi-Fi (Wireless Fidelity)
Wi-Fi Alliance, was founded in 1999 as WECA (Wireless Ethernet
Compatibility Alliance).
In some countries the term "Wi-Fi" is often used by the public as a
synonym for wireless internet (W-LAN)
Wi-Fi certified technologies are supported by nearly every modern
personal computer operating system, most advanced game
consoles, laptops, smartphones and many printers and other
peripherals.
About IEEE 802.11
IEEE 802.11 uses free frequencies between 2400 to 2485 MHz (for
802.11b and 802.11g) and 5000 MHz (for 802.11a).
The band 2.4 GHz is split into 14 channels for Europe, 11 channels
for USA.
Transmition speed depends on the devices used and distances
between stations and can take values of 11, 22, 44, 54 or 108 Mbps.
Security principles
Security includes preventing unauthorized users to access the
network and encrypting all the network traffic so that nobody from
outside the network can sniff the information transmitted between
users and/or devices.
Wireless networks will always remain less secure than traditional
wired networks since all the signals are transmitted trough ether.
Basic methods
Disabling the ESSID broadcast and changing the default network
ESSID introduced by manufacturer
MAC address filtering
Assigning static IP to devices
Traffic encryption (WEP, WPA, WPA2)
External authorization using RADIUS server
VPN
Limiting the range of the network
Disabling the ESSID broadcast
Hiding ESSID was introduced in the first Access Points as a
“protection method”, ESSID as the “password”
The user must provide the ESSID (network identifier) to connect to
the network
Not a real security method, nowadays ESSID is relatively easy to
find
Good for hiding the network from neighbors
Might be dangerous when a malicious AP broadcasting friendly
named network is created in the neighborhood area
MAC address filtering
MAC (Media Access Control) are unique identifiers assigned to the
network device
MAC filtering consists of creating the “white list” of accepted clients
Only the registered clients can gain the access to the network
Should be used along other protection methods, MAC address in an
unencrypted network can be easily found and “imitated” (using
Macshift)
Can prevent from less experienced users
Assigning static IP to devices
Method similar to MAC address filtering
Every device is registered, a static IP address is assigned to a
specific MAC address
To be used along with a router having a good traffic policy – only
selected IPs can communicate to other hosts, etc.
WEP
Wired Equivalent Privacy was included as the privacy of the original
IEEE 802.11 standard ratified in September 1999
Provides both authorization (basic) and encryption security
Standard 64-bit WEP uses a 40 bit key (also known as WEP-40),
which is concatenated with a 24-bit initialization vector (IV) to form
the RC4 traffic key
Key size security limitation, easy to crack using Stream cipher attack
Uses static keys – the keys are generated once according to the
password
Using longer keys slows down the network
Currently not recommended, considered as deprecated
WPA/WPA2
WPA (Wi-Fi Protected Access) was introduced in 2004 to replace
weak WEP and is hardware compatible
WPA implemented a subset of 802.11i and makes use of the
Advanced Encryption Standard (AES)
IEEE 802.11i-2004 introduced new key distribution methods, the
keys are no longer static (a serious issue of previous WPA)
Uses 802.1X for authentication, Extensible Authentication Protocol,
AES-based CCMP to provide confidentiality, integrity and origin
authentication
WPA2 certification is mandatory for all new devices to bear the Wi-Fi
trademark
Personal WPA2
For home and small office use
Uses PSK (Pre Shared Key). The passphrase (“the password”) used
for connecting the network may be from 8 to 63 printable ASCII
characters or 64 hexadecimal digits (256 bits).
Random PSK of length 13 are considered secure, shorter PSK are
not enough to protect from Brute Force Attack
VPN
VPN stands for Virtual Private Networks
VPN creates secure tunnels between the client and VPN server
Provides user authorization and transition encryption
Uses compression to reduce the bandwidth
More resource expensive than WPA/WEP
Some routers do not pass VPN trough
Range of the network
If you use a single device position your Access point in the middle of
the office/building so that the signal can be uniformly distributed.
Limit the antenna power so that the network is inaccessible from
outside the office – this will prevent from attacks from outside.
Otherwise anybody parked in front of your building can attempt to
connect to your network and you will have no chance to locate him.
Conclusions
For my home wireless network I use Personal WPA2 (AES) with a
randomly generated passphrase, the passphrase is changed
periodically and is of length 63. Moreover all my devices are
registered in the MAC whitelist and have static IPs associated by
DHCP server.
When I use public hotspots I no matter WPA is used or no, I connect
to the Internet using my own VPN server so that even if the traffic is
sniffed at any of the pass-trough points, all the data I send and
receive is safe.
If I had to implement an enterprise network, I would use all the
protection methods described in the first point, VPN and I would
configure AP/Router in such way so that only VPN connections to
the VPN server are allowed. I find it simpler than RADIUS or
WPA2/Enterprise.
Conclusions
Change your devices’ default passwords and other sensitive settings
Don’t let any user to extend the network by adding misconfigured
devices. Even single unprotected Access Point can affect the
security of the whole system.
Bibliography and usefull links
http://www.wifi.owe.pl/?id=ukrycie_essid
http://en.wikipedia.org/wiki/Wpa2
http://www.warchalking.pl/
http://en.wikipedia.org/wiki/Wired_Equivalent_Privacy
http://hack.pl/artykuly/wardriving/bezpieczenstwo_sieci_bezprzewodowych_
90
http://compnetworking.about.com/od/wirelesssecurity/tp/wifisecurity.htm