Table of Contents s67
Total Page:16
File Type:pdf, Size:1020Kb
802.1x/Extensible Authentication Protocol
Beyond Traditional IEEE 802.11 Security to 802.1X/Extensible Authentication Protocol
Document Revision #: 0.4 Date of Issue: April 13, 2003 Project Members: Marie Waldrick
Revision 0.4/ April 13, 2003 Page 1 802.1x/Extensible Authentication Protocol
Table of Contents Beyond Traditional IEEE 802.11 Security to 802.1X/Extensible Authentication Protocol 1 Two types of WLAN 3 Adhoc Mode 3 Figure 1.0 An Adhoc Network 3 Infrastructure Mode 4 Figure 2.0 An Infrastructure Mode Client/Server Network 4 IEEE 802.11 5 OSI Reference Model 7 EAP System Architecture 8 Figure 3.0 8 EAP Extensible Authentication Protocol (EAP) 9 Figure 4.0 EAP in RADIUS RFC 2869 9 802.1x 10 Figure 5- 802.1x 10 Future Work/Protocols 10 802.1x/EAP=802.11i 10 Figure 6- Relationship between EAP client, backend authentication server and NAS 13 Figure 6- EAP/MD5 Conversation 14 Figure 7- EAP/TLS 15 Table 1.0 Definitions of Acronyms 16 References 17
Revision 0.4/ April 13, 2003 Page 2 802.1x/Extensible Authentication Protocol
Two types of WLAN
Adhoc Mode
Access 3 point
p pto La 4
1 ISP Web Server p pto La
Figure 1.0 An Adhoc Network
Revision 0.4/ April 13, 2003 Page 3 802.1x/Extensible Authentication Protocol
Infrastructure Mode Client/Server
5
Access 3 File point Server
4 2 1 Authentication Server p pto La
Figure 2.0 An Infrastructure Mode Client/Server Network
Revision 0.4/ April 13, 2003 Page 4 802.1x/Extensible Authentication Protocol
IEEE 802.11
IEEE 802.11 WLAN security is in the Data Link Layer of the OSI reference model. Part of the IEEE 802.11 standard provides a mechanism to protect the privacy of information that is transmitted through the air. The IEEE 802.11 standard provides three things.
Service set identifier (SSID)
Media Access Control (MAC) address filtering
Wired Equivalent Privacy (WEP)
The first is called open authentication where the service set ID (SSID) is supplied. The SSID is short for Service Set Identifier which is a 32-character unique identifier attached to the header of packets sent over a WLAN that acts as a password when a mobile device tries to connect to the Basic Service Set (BSS). The SSID differentiates one WLAN from another, so all access points and all devices attempting to connect to a specific WLAN must use the same SSID. A device will not be permitted to join the BSS unless it can provide the unique SSID. Because an SSID can be sniffed in plain text from a packet it does not supply any security to the network. An SSID is also referred to as a Network Name because essentially it is a name that identifies a wireless network.
The second type is by a shared key. The access point sends the client device a challenge text packet that the client must then encrypt with the correct WEP key and return to the Access Point. If the client has the wrong key, no authentication will occur and no association will take place with the Access Point.
Static wired equivalent privacy (WEP) keys are either 40 or 128 bits that are statically defined by the network administrator on the access point and all clients that communicate with the access point. This mechanism, Wired Equivalent Privacy (WEP) defines an encryption method but does not define how the secret keys are to be distributed to the client and to the Access Point nodes.
In the network community, it is now generally agreed that IEEE 802.11 is insecure for wireless networks.
Access points are open signals that can potentially be picked up by anyone. Sharing compatible WLAN adapters and settings in the adhoc mode without an access point may allow an attacker to gain unauthorized access to clients. These are 802.11 b or 802.11a WLAN cards.
Revision 0.4/ April 13, 2003 Page 5 802.1x/Extensible Authentication Protocol
If the infrastructure mode is used with an Access Point, the default settings must have been changed on the Access Points to enable the WEP encryption protocol. By now however, the encryption protocol has been broken: 802.11a/b WEP RF
By itself, 802.11 has management methods that are not authenticated. These messages are listed below:
beacon probe request or response association request or response re-association request or response disassociation de-authentication
These messages are open to denial-of-service (DoS) attacks.
Possible Solutions:
Change the default SSID to something that does not identify your company or address. Filter addresses at MAC (Media Access Control) level. This means define which clients can have access to the network via the Access Point. This can be too administratively overbearing. Another option is to use a RADIUS Server where user-based authentication is centrally managed. A RADIUS (Remote Authentication Dial-in User Service) server does not address security of communications while they are “in the air”, it only prevents unauthorized people from accessing the ”wired” network.
By far, the most secure way to protect a network(s) is through a Virtual Private Network (VPN) with a firewall installed before the wireless network structure. Then with the wireless network, a combination of 802.1x and Extensible Authentication Protocol (EAP) can be used. EAP and 802.1x are discussed in the following report.
Revision 0.4/ April 13, 2003 Page 6 802.1x/Extensible Authentication Protocol
OSI Reference Model
Application Layer Seven OSI
Presentation Layer Six OSI
Session Layer Five OSI
IPSec, SSL, SSH (Encapsulation) Transport Layer Four Transport Control Protocol (TCP) OSI
Internet Protocol (IP) Network Layer Three L2TP-vpn encryption OSI
Data Link Layer Two 802.11 (Media Access Control) OSI
Physical Frequency Hoping Spread Spectrum Layer One OSI Direct Sequence Spread Spectrum Infrared
Revision 0.4/ April 13, 2003 Page 7 802.1x/Extensible Authentication Protocol
EAP System Architecture
PPP is well known and well deployed in many enterprises. As in figure 3 below, PPP is also integrated in RADIUS. PPP is usually used to obtain a packet service, but 802.11 is already a packet service; thus, PPPoL is an overhead. So, put PPP into the MAC-frame and put authentication method in PPP.
Visited domain
PPPoL:EAP AP/PPP p pto server La 802.11 RADIUS
802.11/PPP client Figure 3.0 EAP
Revision 0.4/ April 13, 2003 Page 8 802.1x/Extensible Authentication Protocol
EAP Extensible Authentication Protocol (EAP)
EAP is a generic architecture for passing messages among parties that do not necessarily need to understand the contents. It was originally created for use within PPP. EAP already exists for RADIUS authentication Server. See RFC 2869.
EAP sits inside PPP’s authentication protocol and provides a generalized framework for all sorts of authentication methods. Rather than keep changing PPP, the idea was to simply have a tunnel through the remote access server (RAS) for a more powerful protocol between the user and the real authentication server. By pulling EAP out into a separate protocol, it then has the option of re-use in other environments, like IEEE 802.1X. EAP methods may not know the negotiated ciphersuite. EAP is supposed to head off proprietary authentication systems and let everything from passwords to challenge-response tokens and PKI certificates work smoothly. For example, EAP provides support for multiple authentication methods and can be wrapped within TLS, see Figure 8.0. Any EAP method running within wrapped EAP is provided with built-in support for key exchange, session resumption and fragmentation and reassembly. These were weaknesses in EAP standalone. See RFC 2284. RFC 2284
Visited domain
Authenticator EAP over Radius top (AP) ap L Authenticati on Server (RADIUS)
Supplicant
Figure 4.0 EAP in RADIUS RFC 2869
Revision 0.4/ April 13, 2003 Page 9 802.1x/Extensible Authentication Protocol
802.1x
802.1x "Standard for Port Based Network Access Control" is simply a standard provided by IEEE for passing EAP over a wired or wireless LAN. Each message(s) can be packaged in Ethernet frames using 802.1X. PPP is not needed so the rest of PPP features can be eliminated. Three basic entities are provided by 802.1x. They are supplicant, authenticator, and authentication server in Figure 5.0 below.
Visited domain
802.11b, EAPoL
Authenticator EAP over Radius top for 802.11 ap L (AP) Authentication Server (RADIUS)
Supplicant (user)
Figure 5.0- 802.1x
Future Work/Protocols
802.1x/EAP=802.11i
802.11i provides full support for server-based authentication (usually only business) using the 802.1x protocol and EAP GF Most consumers will continue to use WEP until 802.11i is provided to the market in hardware and software.
Revision 0.4/ April 13, 2003 Page 10 802.1x/Extensible Authentication Protocol
802.11i will provide Temporal Key Integrity Protocol (TKIP) TKIP as a replacement for WEP when it is discarded. TKIP is one of two encryptions standards proposed for 802.11i. The other ADVANCED Encryption Standard may be somewhat stronger, but it will run only on future 802.11a/b hardware.
Basically, with 802.1x a user is initially allowed to communicate only with a access point. The authenticator only allows access to itself via a single port; the supplicant has no access to the rest of the network.
The access point passes the request on to a special longin server. Only if that server is satisfied by the person’s credentials (a user name plus a password, a biometric, or smart card) will the server give the person access to the network.
“If access is approved, the authenticator hands over a unique per-supplicant master key from which the supplicant’s network adapter derives the TKIP key, the packet integrity key, and other cryptographic necessities.
After a user has been authenticated, EAP is used to frequently refresh the master key, reducing the window of opportunity for intercepting packets for cracking. This re-keying process cleverly has perhaps more to do with the cryptographic future than the present.
To solve different parts of the WEP problem, three types of overlays embed EAP inside an encrypted tunnel.
An early version, EAP-TLS(Transport Layer Security), required a client-side public-key certificate to be preinstalled before the first wireless session. Although this was the method that Microsoft uses for its campus-wide WLAN, EAP-TLS is complicated because an enterprise must establish a PKI.
Instead, vendors are focusing on two methods: EAP-TTLS (Tunneled TLS) and PEAP (Protected EAP)HA, both of which build tunnels. One tunnel is entirely anonymous, allowing a second tunneled session to begin, which itself encapsulates EAP or other protocols. This approach avoids client certificates but still allows for them.
The only differences between EAP-TTLS and PEAP are that PEAP lacks support for legacy authentication, an important issue as 802.11a/b/g products already out on the shelf.
Both vendor backed EAP-TTLS and PEAP are still being evaluated by IETF (Internet Engineering Task Force).
Still, two man-in-the-middle attacks have been theorized that must be addressed before the standards can be deployed with absolute security.
Revision 0.4/ April 13, 2003 Page 11 802.1x/Extensible Authentication Protocol
One attack relies on supplicants performing authentication in the clear when asked to do so; the other attack lies in a lack of cryptographic binding between network layers, which allows a man in the middle to spoof a network identity without detection.
Conclusions:
All current support for 802.1x/EAP, tunneled or not, still relies on WEP as the link encryption method, which means that a VPN is still required for definite link security until current 802.1x/EAP with TKIP starts appearing in Access Points and clients.
As we survey the road ahead, it’s clear that the arrival of the 802.1x/EAP in vendors’ products and eventually 802.11i will reduce the administrative burden of WLANs, integrating them with existing authentication mechanisms and making the security issue disappear. “GF
Revision 0.4/ April 13, 2003 Page 12 802.1x/Extensible Authentication Protocol
Determines authentication encryption and MAC algorithms. Select by Server Default Cipher Suite TLS_DHE_CSS_WITH_3DES _EDE_CBC_SHA Cipher Cipher Suite Suite
Back End Network (EAP) Access Server Trust Server (NAS)
t ien Cl p pto EAP Conversation (over PPP, 802.11, etc.) La
Keys for Link Layer Ciphersuites
EAP Method EAP Method
Figure 6.0- Relationship between EAP client, backend authentication server and NAS
Revision 0.4/ April 13, 2003 Page 13 802.1x/Extensible Authentication Protocol
Figure 7.0- EAP/MD5 Conversation
Revision 0.4/ April 13, 2003 Page 14 802.1x/Extensible Authentication Protocol
Figure 8.0- EAP/TLS
Revision 0.4/ April 13, 2003 Page 15 802.1x/Extensible Authentication Protocol
Table 1.0 Definitions of Acronyms
Acronym Phrase
PPP Point to point protocol
EAP Extensible Authentication Protocol
IEEE 802.11 standards IETF Internet Engineering Task Force 802.11a/b/g/… 802.1x Radius Remote Authentication Dial-In User Service Remote Authentication Dial-In User Service (RADIUS) is a client/server protocol and software that enables remote access servers to communicate with a central server to authenticate dial-in users and authorize their access to the requested system or service. RADIUS allows a company to maintain user profiles in a central database that all remote servers can share. WEP Wired Equivalent Privacy TLS or TTLS EAP authentication methods Ciphersuite Determines authentication encryption and MAC algorithms. Select by Server Default Cipher Suite TLS_DHE_CSS_WITH_3DES_EDE_CBC_SHA
Wi-Fi Alliance The interrelationship between industry members is called the Wi-Fi Alliance. They call their industry standard WPA (Wi-Fi Protected Access). This is another name for the most current 802.11i draft from the IETF to repair WEP(Wired Equivalent Privacy) problems.
References
Revision 0.4/ April 13, 2003 Page 16 802.1x/Extensible Authentication Protocol
CP Cisco Networking Academy Program: Second-Year Companion Guide, Cisco Systems, Inc., Cisco Press 2001.
GF Glen Fleishman, “Key to Wi-Fi security”, http://www.infoworld.com/article/ / 03/01/10/030113newifisec_1.html
HA H.Anderson,“Protected Extensible Authentication Protocol (PEAP), http://www.globecom.net/ietf/draft/draft-josefsson-pppex-eap-tls-eap-02.html
RF Rob Flickenger, “Using SSH Tunneling”, http://www.oreillynet.com/pub/a/wireless/2001/02/23/wep.html
RFC 2284 http://www.ietf.org/ietf/lid-abstracts.txt
TKIP www.inetdevgrp.org/20020618/WLANSecurity.pdf
Revision 0.4/ April 13, 2003 Page 17