Table of Contents s67

Table of Contents s67

<p>802.1x/Extensible Authentication Protocol</p><p>Beyond Traditional IEEE 802.11 Security to 802.1X/Extensible Authentication Protocol</p><p>Document Revision #: 0.4 Date of Issue: April 13, 2003 Project Members: Marie Waldrick</p><p>Revision 0.4/ April 13, 2003 Page 1 802.1x/Extensible Authentication Protocol</p><p>Table of Contents Beyond Traditional IEEE 802.11 Security to 802.1X/Extensible Authentication Protocol 1 Two types of WLAN 3 Adhoc Mode 3 Figure 1.0 An Adhoc Network 3 Infrastructure Mode 4 Figure 2.0 An Infrastructure Mode Client/Server Network 4 IEEE 802.11 5 OSI Reference Model 7 EAP System Architecture 8 Figure 3.0 8 EAP Extensible Authentication Protocol (EAP) 9 Figure 4.0 EAP in RADIUS RFC 2869 9 802.1x 10 Figure 5- 802.1x 10 Future Work/Protocols 10 802.1x/EAP=802.11i 10 Figure 6- Relationship between EAP client, backend authentication server and NAS 13 Figure 6- EAP/MD5 Conversation 14 Figure 7- EAP/TLS 15 Table 1.0 Definitions of Acronyms 16 References 17</p><p>Revision 0.4/ April 13, 2003 Page 2 802.1x/Extensible Authentication Protocol</p><p>Two types of WLAN</p><p>Adhoc Mode</p><p>Access 3 point</p><p> p pto La 4</p><p>1 ISP Web Server p pto La</p><p>Figure 1.0 An Adhoc Network</p><p>Revision 0.4/ April 13, 2003 Page 3 802.1x/Extensible Authentication Protocol</p><p>Infrastructure Mode Client/Server</p><p>5</p><p>Access 3 File point Server</p><p>4 2 1 Authentication Server p pto La</p><p>Figure 2.0 An Infrastructure Mode Client/Server Network</p><p>Revision 0.4/ April 13, 2003 Page 4 802.1x/Extensible Authentication Protocol</p><p>IEEE 802.11</p><p>IEEE 802.11 WLAN security is in the Data Link Layer of the OSI reference model. Part of the IEEE 802.11 standard provides a mechanism to protect the privacy of information that is transmitted through the air. The IEEE 802.11 standard provides three things. </p><p> Service set identifier (SSID) </p><p> Media Access Control (MAC) address filtering </p><p> Wired Equivalent Privacy (WEP)</p><p>The first is called open authentication where the service set ID (SSID) is supplied. The SSID is short for Service Set Identifier which is a 32-character unique identifier attached to the header of packets sent over a WLAN that acts as a password when a mobile device tries to connect to the Basic Service Set (BSS). The SSID differentiates one WLAN from another, so all access points and all devices attempting to connect to a specific WLAN must use the same SSID. A device will not be permitted to join the BSS unless it can provide the unique SSID. Because an SSID can be sniffed in plain text from a packet it does not supply any security to the network. An SSID is also referred to as a Network Name because essentially it is a name that identifies a wireless network. </p><p>The second type is by a shared key. The access point sends the client device a challenge text packet that the client must then encrypt with the correct WEP key and return to the Access Point. If the client has the wrong key, no authentication will occur and no association will take place with the Access Point. </p><p>Static wired equivalent privacy (WEP) keys are either 40 or 128 bits that are statically defined by the network administrator on the access point and all clients that communicate with the access point. This mechanism, Wired Equivalent Privacy (WEP) defines an encryption method but does not define how the secret keys are to be distributed to the client and to the Access Point nodes. </p><p>In the network community, it is now generally agreed that IEEE 802.11 is insecure for wireless networks.</p><p>Access points are open signals that can potentially be picked up by anyone. Sharing compatible WLAN adapters and settings in the adhoc mode without an access point may allow an attacker to gain unauthorized access to clients. These are 802.11 b or 802.11a WLAN cards. </p><p>Revision 0.4/ April 13, 2003 Page 5 802.1x/Extensible Authentication Protocol</p><p>If the infrastructure mode is used with an Access Point, the default settings must have been changed on the Access Points to enable the WEP encryption protocol. By now however, the encryption protocol has been broken: 802.11a/b WEP RF</p><p>By itself, 802.11 has management methods that are not authenticated. These messages are listed below:</p><p> beacon probe request or response association request or response re-association request or response disassociation de-authentication</p><p>These messages are open to denial-of-service (DoS) attacks. </p><p>Possible Solutions:</p><p>Change the default SSID to something that does not identify your company or address. Filter addresses at MAC (Media Access Control) level. This means define which clients can have access to the network via the Access Point. This can be too administratively overbearing. Another option is to use a RADIUS Server where user-based authentication is centrally managed. A RADIUS (Remote Authentication Dial-in User Service) server does not address security of communications while they are “in the air”, it only prevents unauthorized people from accessing the ”wired” network. </p><p>By far, the most secure way to protect a network(s) is through a Virtual Private Network (VPN) with a firewall installed before the wireless network structure. Then with the wireless network, a combination of 802.1x and Extensible Authentication Protocol (EAP) can be used. EAP and 802.1x are discussed in the following report. </p><p>Revision 0.4/ April 13, 2003 Page 6 802.1x/Extensible Authentication Protocol</p><p>OSI Reference Model</p><p>Application Layer Seven OSI</p><p>Presentation Layer Six OSI</p><p>Session Layer Five OSI</p><p>IPSec, SSL, SSH (Encapsulation) Transport Layer Four Transport Control Protocol (TCP) OSI</p><p>Internet Protocol (IP) Network Layer Three L2TP-vpn encryption OSI</p><p>Data Link Layer Two 802.11 (Media Access Control) OSI</p><p>Physical Frequency Hoping Spread Spectrum Layer One OSI Direct Sequence Spread Spectrum Infrared </p><p>Revision 0.4/ April 13, 2003 Page 7 802.1x/Extensible Authentication Protocol</p><p>EAP System Architecture </p><p>PPP is well known and well deployed in many enterprises. As in figure 3 below, PPP is also integrated in RADIUS. PPP is usually used to obtain a packet service, but 802.11 is already a packet service; thus, PPPoL is an overhead. So, put PPP into the MAC-frame and put authentication method in PPP. </p><p>Visited domain</p><p>PPPoL:EAP AP/PPP p pto server La 802.11 RADIUS</p><p>802.11/PPP client Figure 3.0 EAP</p><p>Revision 0.4/ April 13, 2003 Page 8 802.1x/Extensible Authentication Protocol</p><p>EAP Extensible Authentication Protocol (EAP)</p><p>EAP is a generic architecture for passing messages among parties that do not necessarily need to understand the contents. It was originally created for use within PPP. EAP already exists for RADIUS authentication Server. See RFC 2869. </p><p>EAP sits inside PPP’s authentication protocol and provides a generalized framework for all sorts of authentication methods. Rather than keep changing PPP, the idea was to simply have a tunnel through the remote access server (RAS) for a more powerful protocol between the user and the real authentication server. By pulling EAP out into a separate protocol, it then has the option of re-use in other environments, like IEEE 802.1X. EAP methods may not know the negotiated ciphersuite. EAP is supposed to head off proprietary authentication systems and let everything from passwords to challenge-response tokens and PKI certificates work smoothly. For example, EAP provides support for multiple authentication methods and can be wrapped within TLS, see Figure 8.0. Any EAP method running within wrapped EAP is provided with built-in support for key exchange, session resumption and fragmentation and reassembly. These were weaknesses in EAP standalone. See RFC 2284. RFC 2284</p><p>Visited domain</p><p>Authenticator EAP over Radius top (AP) ap L Authenticati on Server (RADIUS)</p><p>Supplicant</p><p>Figure 4.0 EAP in RADIUS RFC 2869</p><p>Revision 0.4/ April 13, 2003 Page 9 802.1x/Extensible Authentication Protocol</p><p>802.1x</p><p>802.1x "Standard for Port Based Network Access Control" is simply a standard provided by IEEE for passing EAP over a wired or wireless LAN. Each message(s) can be packaged in Ethernet frames using 802.1X. PPP is not needed so the rest of PPP features can be eliminated. Three basic entities are provided by 802.1x. They are supplicant, authenticator, and authentication server in Figure 5.0 below. </p><p>Visited domain</p><p>802.11b, EAPoL</p><p>Authenticator EAP over Radius top for 802.11 ap L (AP) Authentication Server (RADIUS)</p><p>Supplicant (user)</p><p>Figure 5.0- 802.1x</p><p>Future Work/Protocols</p><p>802.1x/EAP=802.11i</p><p>802.11i provides full support for server-based authentication (usually only business) using the 802.1x protocol and EAP GF Most consumers will continue to use WEP until 802.11i is provided to the market in hardware and software. </p><p>Revision 0.4/ April 13, 2003 Page 10 802.1x/Extensible Authentication Protocol</p><p>802.11i will provide Temporal Key Integrity Protocol (TKIP) TKIP as a replacement for WEP when it is discarded. TKIP is one of two encryptions standards proposed for 802.11i. The other ADVANCED Encryption Standard may be somewhat stronger, but it will run only on future 802.11a/b hardware.</p><p>Basically, with 802.1x a user is initially allowed to communicate only with a access point. The authenticator only allows access to itself via a single port; the supplicant has no access to the rest of the network. </p><p>The access point passes the request on to a special longin server. Only if that server is satisfied by the person’s credentials (a user name plus a password, a biometric, or smart card) will the server give the person access to the network. </p><p>“If access is approved, the authenticator hands over a unique per-supplicant master key from which the supplicant’s network adapter derives the TKIP key, the packet integrity key, and other cryptographic necessities. </p><p>After a user has been authenticated, EAP is used to frequently refresh the master key, reducing the window of opportunity for intercepting packets for cracking. This re-keying process cleverly has perhaps more to do with the cryptographic future than the present. </p><p>To solve different parts of the WEP problem, three types of overlays embed EAP inside an encrypted tunnel. </p><p>An early version, EAP-TLS(Transport Layer Security), required a client-side public-key certificate to be preinstalled before the first wireless session. Although this was the method that Microsoft uses for its campus-wide WLAN, EAP-TLS is complicated because an enterprise must establish a PKI. </p><p>Instead, vendors are focusing on two methods: EAP-TTLS (Tunneled TLS) and PEAP (Protected EAP)HA, both of which build tunnels. One tunnel is entirely anonymous, allowing a second tunneled session to begin, which itself encapsulates EAP or other protocols. This approach avoids client certificates but still allows for them. </p><p>The only differences between EAP-TTLS and PEAP are that PEAP lacks support for legacy authentication, an important issue as 802.11a/b/g products already out on the shelf. </p><p>Both vendor backed EAP-TTLS and PEAP are still being evaluated by IETF (Internet Engineering Task Force). </p><p>Still, two man-in-the-middle attacks have been theorized that must be addressed before the standards can be deployed with absolute security. </p><p>Revision 0.4/ April 13, 2003 Page 11 802.1x/Extensible Authentication Protocol</p><p>One attack relies on supplicants performing authentication in the clear when asked to do so; the other attack lies in a lack of cryptographic binding between network layers, which allows a man in the middle to spoof a network identity without detection. </p><p>Conclusions:</p><p>All current support for 802.1x/EAP, tunneled or not, still relies on WEP as the link encryption method, which means that a VPN is still required for definite link security until current 802.1x/EAP with TKIP starts appearing in Access Points and clients. </p><p>As we survey the road ahead, it’s clear that the arrival of the 802.1x/EAP in vendors’ products and eventually 802.11i will reduce the administrative burden of WLANs, integrating them with existing authentication mechanisms and making the security issue disappear. “GF</p><p>Revision 0.4/ April 13, 2003 Page 12 802.1x/Extensible Authentication Protocol</p><p>Determines authentication encryption and MAC algorithms. Select by Server Default Cipher Suite TLS_DHE_CSS_WITH_3DES _EDE_CBC_SHA Cipher Cipher Suite Suite</p><p>Back End Network (EAP) Access Server Trust Server (NAS)</p><p> t ien Cl p pto EAP Conversation (over PPP, 802.11, etc.) La</p><p>Keys for Link Layer Ciphersuites</p><p>EAP Method EAP Method</p><p>Figure 6.0- Relationship between EAP client, backend authentication server and NAS</p><p>Revision 0.4/ April 13, 2003 Page 13 802.1x/Extensible Authentication Protocol</p><p>Figure 7.0- EAP/MD5 Conversation</p><p>Revision 0.4/ April 13, 2003 Page 14 802.1x/Extensible Authentication Protocol</p><p>Figure 8.0- EAP/TLS</p><p>Revision 0.4/ April 13, 2003 Page 15 802.1x/Extensible Authentication Protocol</p><p>Table 1.0 Definitions of Acronyms</p><p>Acronym Phrase</p><p>PPP Point to point protocol</p><p>EAP Extensible Authentication Protocol</p><p>IEEE 802.11 standards IETF Internet Engineering Task Force 802.11a/b/g/… 802.1x Radius Remote Authentication Dial-In User Service Remote Authentication Dial-In User Service (RADIUS) is a client/server protocol and software that enables remote access servers to communicate with a central server to authenticate dial-in users and authorize their access to the requested system or service. RADIUS allows a company to maintain user profiles in a central database that all remote servers can share. WEP Wired Equivalent Privacy TLS or TTLS EAP authentication methods Ciphersuite Determines authentication encryption and MAC algorithms. Select by Server Default Cipher Suite TLS_DHE_CSS_WITH_3DES_EDE_CBC_SHA</p><p>Wi-Fi Alliance The interrelationship between industry members is called the Wi-Fi Alliance. They call their industry standard WPA (Wi-Fi Protected Access). This is another name for the most current 802.11i draft from the IETF to repair WEP(Wired Equivalent Privacy) problems. </p><p>References</p><p>Revision 0.4/ April 13, 2003 Page 16 802.1x/Extensible Authentication Protocol</p><p>CP Cisco Networking Academy Program: Second-Year Companion Guide, Cisco Systems, Inc., Cisco Press 2001.</p><p>GF Glen Fleishman, “Key to Wi-Fi security”, http://www.infoworld.com/article/ / 03/01/10/030113newifisec_1.html</p><p>HA H.Anderson,“Protected Extensible Authentication Protocol (PEAP), http://www.globecom.net/ietf/draft/draft-josefsson-pppex-eap-tls-eap-02.html </p><p>RF Rob Flickenger, “Using SSH Tunneling”, http://www.oreillynet.com/pub/a/wireless/2001/02/23/wep.html</p><p>RFC 2284 http://www.ietf.org/ietf/lid-abstracts.txt</p><p>TKIP www.inetdevgrp.org/20020618/WLANSecurity.pdf</p><p>Revision 0.4/ April 13, 2003 Page 17</p>

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    17 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us