NIST SP 800-97, Establishing Wireless Robust Security Networks
Total Page:16
File Type:pdf, Size:1020Kb
Special Publication 800-97 Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i Recommendations of the National Institute of Standards and Technology Sheila Frankel Bernard Eydt Les Owens Karen Scarfone NIST Special Publication 800-97 Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i Recommendations of the National Institute of Standards and Technology Sheila Frankel, Bernard Eydt, Les Owens, Karen Scarfone C O M P U T E R S E C U R I T Y Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930 February 2007 U.S. Department of Commerce Carlos M. Gutierrez, Secretary Technology Administration Robert C. Cresanti, Under Secretary of Commerce for Technology National Institute of Standards and Technology William Jeffrey, Director ESTABLISHING WIRELESS ROBUST SECURITY NETWORKS: A GUIDE TO IEEE 802.11I Reports on Computer Systems Technology The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and productive use of information technology. ITL’s responsibilities include the development of technical, physical, administrative, and management standards and guidelines for the cost-effective security and privacy of sensitive unclassified information in Federal computer systems. This Special Publication 800-series reports on ITL’s research, guidance, and outreach efforts in computer security and its collaborative activities with industry, government, and academic organizations. National Institute of Standards and Technology Special Publication 800-97 Natl. Inst. Stand. Technol. Spec. Publ. 800-97, 162 pages (February 2007) Certain commercial entities, equipment, or materials may be identified in this document in order to describe an experimental procedure or concept adequately. Such identification is not intended to imply recommendation or endorsement by the National Institute of Standards and Technology, nor is it intended to imply that the entities, materials, or equipment are necessa rily the best available for the purpose. ii ESTABLISHING WIRELESS ROBUST SECURITY NETWORKS: A GUIDE TO IEEE 802.11I Acknowledgements The authors, Sheila Frankel and Karen Scarfone of the National Institute of Standards and Technology (NIST), and Bernard Eydt and Les Owens of Booz Allen Hamilton, wish to thank their colleagues who reviewed drafts of this document and contributed to its technical content. The authors would like to acknowledge Tim Grance, Lily Chen, Tim Polk and Randy Easter of NIST, and Alexis Feringa, Thomas Fuhrman, and Marc Stevens of Booz Allen Hamilton, for their keen and insightful assistance throughout the development of the document. The authors appreciate the detailed, perceptive in-depth comments provided by wireless experts Matthew Gast, Jesse Walker (Intel) and Nancy Cam-Winget (Cisco). The authors would also like to express their thanks to Bernard Aboba (Microsoft), Randy Chou (Aruba Networks), Ryon Coleman (3e Technologies), Paul Dodd (Boeing), Dean Farrington (Wells Fargo), Ben Halpert (Lockheed Martin), Criss Hyde, Timothy Kramer (Joint Systems Integration Command), W. J. Miller (MaCT), and Robert Smith (Juniper Networks) for their particularly valuable comments and suggestions. Trademark Information Microsoft, Windows, and Windows XP are either registered trademarks or trademarks of Microsoft Corporation in the United States and other countries. Cisco and Cisco IOS are registered trademarks of Cisco Systems, Inc. in the United States and certain other countries. Wi-Fi CERTIFIED is a trademark the Wi-Fi Alliance. All other names are registered trademarks or trademarks of their respective companies. iii ESTABLISHING WIRELESS ROBUST SECURITY NETWORKS: A GUIDE TO IEEE 802.11I Table of Contents Executive Summary..............................................................................................................ES-1 1. Introduction ......................................................................................................................1-1 1.1 Authority...................................................................................................................1-1 1.2 Purpose and Scope .................................................................................................1-1 1.3 Audience ..................................................................................................................1-1 1.4 Document Structure .................................................................................................1-1 1.5 How to Navigate This Document .............................................................................1-2 2. Overview of Wireless Networking ..................................................................................2-1 2.1 History of Wireless Networking Standards...............................................................2-1 2.1.1 IEEE 802.11 Standards ................................................................................2-1 2.1.2 Wi-Fi Alliance Certification............................................................................2-2 2.1.3 Other Wireless Standards ............................................................................2-3 2.2 IEEE 802.11 Network Components and Architectural Models.................................2-4 2.2.1 Ad Hoc Mode................................................................................................2-4 2.2.2 Infrastructure Mode ......................................................................................2-6 2.3 Summary..................................................................................................................2-6 3. Overview of IEEE 802.11 Security ..................................................................................3-1 3.1 WLAN Security Concerns ........................................................................................3-1 3.2 History of Pre-RSN IEEE 802.11 Security ...............................................................3-2 3.2.1 Access Control and Authentication...............................................................3-2 3.2.2 Encryption.....................................................................................................3-4 3.2.3 Data Integrity ................................................................................................3-5 3.2.4 Replay Protection .........................................................................................3-6 3.2.5 Availability.....................................................................................................3-6 3.3 Brief Overview of IEEE 802.11i Security..................................................................3-6 3.4 Summary..................................................................................................................3-9 4. Security Framework for Robust Security Networks .....................................................4-1 4.1 Features of RSNs ....................................................................................................4-1 4.2 Key Hierarchies and Key Distribution and Management .........................................4-3 4.2.1 Pairwise Key Hierarchy ................................................................................4-4 4.2.2 Group Key Hierarchy ....................................................................................4-7 4.3 Overview of RSN Data Confidentiality and Integrity Protocols ................................4-7 4.3.1 Temporal Key Integrity Protocol (TKIP)........................................................4-8 4.3.2 Counter Mode with Cipher Block Chaining MAC Protocol (CCMP)............4-10 4.4 Summary................................................................................................................4-14 5. Robust Security Networks Principles of Operation......................................................5-1 5.1 General Principles of IEEE 802.11 Operation..........................................................5-1 5.1.1 IEEE 802.11 Frame Types ...........................................................................5-1 5.1.2 IEEE 802.11 Data Frame Structure..............................................................5-3 5.2 Phases of IEEE 802.11 RSN Operation ..................................................................5-5 5.3 Discovery Phase ......................................................................................................5-6 5.3.1 Establishing a Security Policy.......................................................................5-7 5.3.2 Discovery Phase Frame Flows.....................................................................5-9 iv ESTABLISHING WIRELESS ROBUST SECURITY NETWORKS: A GUIDE TO IEEE 802.11I 5.3.3 Distinguishing RSN and Pre-RSN WLANs .................................................5-11 5.4 Authentication Phase .............................................................................................5-12 5.4.1 The IEEE 802.1X Framework: Port-Based Access Control........................5-12 5.4.2 Authentication with the PSK .......................................................................5-14 5.4.3 AS to AP Connections ................................................................................5-15