Title: Wireless Security
1Wireless Security
- Rick Keir
- DoIT Network Services
- Lockdown 2003
- July 18, 2003
2Agenda
- A quick survey of the problem
- The standard security steps
- Their weaknesses
- Better security
- The future of wireless security
3The problem in one screen
4Wireless WiscWorld
- Deployed starting Fall, 2000
- 60,000 potential users
- Expansion of locations coming this year
5In addition
- Café Connection (paid) near campus
- Password protected APs
- Unprotected campus APs
- Free access at University Bookstore
- Free access at Muddy Waters coffee shop
- And from my next door neighbor
6Why Security is Hard
- Some things people want
- Easy to find and use
- Available to their guests and colleagues
- Private
- Tamperproof
- Not a vulnerability to campus
7What does security mean to you?
- What are you worried about?
- Who are your users?
8Who do you want to be secure from?
- The moocher, getting a free ride
- The creep, harassing from the shadows
- The burglar, stealing data
- The vandal, launching a denial of service or
other destructive attack
9What do you want to keep secure?
- Resource usage - from the moocher
- Audit for abuse by the creep
- Keep data private - from the burglar
- Protect the networks resources - from the vandal
10The 64,000 question
- If there was no wireless at all, how secure
would - Your resources be from abuse
- Your users be from harassment
- Your data be from theft
- Your network be from vandalism
11Who are your users?
- How many users, how much data?
- Some useful groups to keep in mind
- Home user group
- Small workgroup or lab
- Department or larger
12Home user
- Very few users
- Small amounts of data
- Long periods of no data
- Easy to share secrets
13Small workgroup
- Users all fit around a table
- Everyone knows whats legitimate
- Large amounts of data
- Network always on
- Secrets can be shared
14Department
- Key management difficult
- Not everyone knows whats legitimate
- Large amounts of data
- Network always on
- Difficult to share secrets
15Background
- The pieces of a wireless network
16The Access Point
- Personal access points
- Enterprise access points 500 range
- Mounting power can
- double your costs
- in typical campus
- deployment
17The Wireless NIC
- Cheap (40)
- 24 of notebooks ship with wireless (2003)
- 80-90 of all notebooks will ship with wireless
by 2008 - source Strategy Analytics, Forrester
18Distance matters
- For most users two walls are a barrier
- Wireless NICs vary in sensitivity
- For security purposes can be much further
- Networks inside a building have been tapped from
miles away
19The Antenna
- Built-in
- External
- On the AP and on the NIC
20The Pringle's Can antenna
21Background
22Wireless 802.11b networking
- Speed 11 mB max
- Uses the 2.4 GHz band
- Most common choice on Madison campus
23Wireless 802.11a networking
- Speed Up to 54 Mbps
- Uses the 5 GHz band
24Wireless 802.11g networking
- Speed Up to 54 Mbps
- Uses the 2.4 GHz band (same as 802.11b)
- Can coexist with 802.11b at some performance cost
- Final standard just published
25Things that sound scary
26Wardriving Walking, biking, gliding .
27Warchalking
- Term derived from chalking by hobos during the
Depression - http//www.warchalking.org
- Again, a lot of FUD
28Some Common Security Techniques
- Hiding the SSID
- MAC address lists
- WEP
29Some Common Security Techniques
- Hiding the Service Set Identifier (SSID)
30Hiding the SSID
- SSID (shared set identifier)
- Examples
- Wireless-WiscWorld
- Tsunami
- Linksys
31Hiding the SSID
- You can "cloak" an access point's ID
- However, it's still possible to discover the AP's
SSID
32Hiding the SSID
- SSIDs work as a courtesy
- As security mechanisms, they're the equivalent of
a sign saying "Private" - Hiding the SSID is like taking the signs off the
door
33Some Common Security Techniques
34MAC Address lists
- Register the MAC address of the user's card
- UW-Stout does this
- Major administrative task
- How long is a MAC good for?
35MAC Address lists
- Not a defense against the determined intruder
- NIC can be stolen
- Valid MAC addresses can be sniffed
- Once a valid MAC is sniffed, it can be spoofed
36MAC Address lists
- MAC spoofing a problem on some campuses
- When used to limit bandwidth and access, MAC
restrictions encourage the evolution of a student
body that knows how to spoof MAC addresses
37Some Common Security Techniques
38Using WEP encryption
39Using WEP encryption
- Every user must have the WEP key
- Every user must get the new key when it changes
- Every user must type in the new key after a
change - Every user is responsible for keeping the key a
secret
40Using WEP encryption
- "All users on a network share a common, static
key. (Imagine the security of sharing that single
key in a community of college students!) - - Cheswick, Bellovin Rubin,
- Firewalls Internet Security
41Using WEP encryption
- Theoretical flaws discovered
- Off-the-shelf exploits built
- Airsnort, WEPCrack
42Using WEP encryption
- "WEP can be considered dead in the water. It
provides a sense of security, without useful
security. - - Cheswick, Bellovin Rubin,
- Firewalls Internet Security
43Things that do work
- Authentication
- End-to-end encryption
- VPNs
44Authentication
- Typical scenario
- User opens browser
- User is redirected to an https// captive
portal page (Wireless WiscWorld doesnt do this
currently user must type URL) - User logs on (or pays for an account)
- User is granted a DHCP lease
45Authentication
- Typical open source captive portals
- WiCap http//www.geekspeed.net/wicap
- basic set of scripts
- NoCat http//nocat.net
- More complete can run multiple copies against
same authentication server
46Authentication
- RADIUS server
- "Remote Authentication Dial In User Service"
- This is what wireless WiscWorld does (NetID)
- At UW, NetID is encrypted in login process
47Authentication
- Role-based authentication authorization still
hard in large organizations like a University - Need a directory of your users
- This is a middleware problem
48Authentication
- Shibboleth
- 802.1x framework
49Shibboleth
- Project of Internet2 (U. Washington, U.
Wisconsin, IBM, Sun, others) - A way of allowing a user to assert some
attributes (i.e., I am a faculty member) to a
3rd party - Without revealing credentials or identity to the
3rd party - Good match with problems of libraries
- First deployments happening this year
- Watch this space!
50Authentication via 802.1x
- Supplicant (laptop computer)
- connects to
- Authenticator (the wireless access point)
- which allows you to connect only to
- Authentication server
- until you are authenticated
51Authentication via 802.1x
- Supplicant can be anything that wants to join a
network - Authenticator a layer 2 device port (WAP,
Ethernet switch) - Authentication server probably a RADIUS server
52Authentication via 802.1x
- The authentication protocol is EAP (Extensible
Authentication Protocol) - Challenge - response system
- Transport for it can include
- Lightweight EAP (LEAP)
- Transport Layer Security (TLS)
- Tunneled Transport Layer Security (TTLS)
- Protected EAP (PEAP)
53Authentication via 802.1x
- Crypto system is pluggable, also
54Authentication via 802.1x
- The access point only allows traffic between the
laptop and the authentication server - Multiple cycles of challenge/response can occur
until the authentication server accepts or
rejects the credentials - Credentials might be username/password, a PKI
certificate, or something else
55Authentication via 802.1x
- The authentication server can send additional
information to the supplicant - WEP key cycling
- Doesnt fix flaws
56Encryption
- (See Jim Leinwebers talk in the other room!)
- Private
- Unaltered
- Non-repudiable (digital signatures)
57What gets encrypted?
- Your email password?
- Your FTP password?
- Credit card numbers?
- Your actual email, FTP session, etc.?
58Common cases of encryption
- Your WiscMail password (recent changes)
- SFTP (replacement for FTP)
- HTTPS pages (Amazon, UW Credit Union, UW Portal)
- PKI Email (but not many people use this yet!)
59WPA - whats coming next
- Wireless Protected Access
- Works with 802.1x and EAP
- Being tested for cryptographic flaws
- May ship late this year
- Early support in Windows XP
- Apple including support in Panther
60WEP vs.. WPA
- Poor encryption
- 40 bit keys
- Keys are static and shared
- Manual key distribution
- WEP key is used for authentication and encryption
61WEP vs. WPA
- Poor encryption
- 40 bit keys
- Keys are static and shared
- Manual key distribution
- WEP key is used for authentication and encryption
- No known flaws in encryption
- 128-bit keys
- Session keys are dynamic
- Automatic key distribution
- 802.1x/EAP user authentication
62So
- WPA has support for 802.1x authentication
- WPA fixes cryptographic flaws for key
distribution key capture (via TKIP) - WPA adds an integrity check for packets (MIC)
63WPA - whats the downside?
- Access points and NICs need upgrades
- Mixed mode WEP
- Supplicants (code for your laptop)
- Windows XP (free)
- Mac OS X Panther (not released)
- Windows 2000/98/ME (3rd party, 50)
- Linux, Mac OS X, Windows NT (3rd party, 40)
64WPA - whats the downside?
- Upgrades being delivered for 802.11g first
- Only 802.11b WPA upgrades (as of June 30)
- Cisco Aironet 802.11b 1100
- Cisco Aironet 802.11a/b 1200
- Linksys WPC11 ver3 client card
- 3COM AP8000 series
65Virtual Private Networks (VPNs)
- Can encrypt the entire conversation
- Needs client on user's machine
- Slows things down
66Discussion - guests
- Should you allow guest access?
- How long can someone be a guest?
- What can a guest do?
67Discussion - guests
- Who gives out guest access?
- IT staff?
- Administrative staff?
- Faculty?
- Everyone?
68The bottom line
- Wireless networking is difficult to make both
usable and secure for all but small populations - Authorization is a necessary first step
- Encryption is needed to keep data private
- An end-to-end problem everyone has to cooperate
69Some sources of information
- The SANS Reading Room
- http//rr.sans.org
- Glenn Fleishman's Wireless Security Status report
- http//80211b.webloggercom/weak.defense.html
70Thank you!
- Richard Keir
- DoIT Network Services
- keir_at_doit.wisc.edu
- (608) 262-9463