Wireless LAN Authentication NETW 05A: APPLIED WIRELESS SECURITY By Mohammad Shanehsaz

advertisement
NETW 05A: APPLIED WIRELESS
SECURITY
Wireless LAN Authentication
By Mohammad Shanehsaz
Spring 2005
This work is supported by the National Science
Foundation under Grant Number DUE-0302909.
Any opinions, findings and conclusions or recommendations expressed in this material are
those of the author(s) and do not necessarily reflect those of the National Science Foundation.
Objectives
Explain the following types of authentication:
- Kerberos
- EAP / LEAP / PEAP
- WEP / TKIP
- VPN
- Certificates
- 2-factor & 3-factor authentication
- PAP / CHAP / MS-CHAP-V2
- LDAP / Directory Services
- RADIUS / AAA
This work is supported by the National Science
Foundation under Grant Number DUE-0302909.
Any opinions, findings and conclusions or recommendations expressed in this material are
those of the author(s) and do not necessarily reflect those of the National Science Foundation.
Kerberos
Developed at MIT under project Athena
Provides a trusted third party
authentication service for user
identification
Provides both user authentication and
encryption key management
Uses a ticketing system between clients
and servers which is managed by the
authentication server
This work is supported by the National Science
Foundation under Grant Number DUE-0302909.
Any opinions, findings and conclusions or recommendations expressed in this material are
those of the author(s) and do not necessarily reflect those of the National Science Foundation.
Kerberos
The components that make up a
Kerberos system are:




The Key Distribution Center
The client & server software components
Kerberos security policies
“Kerberized” applications
This work is supported by the National Science
Foundation under Grant Number DUE-0302909.
Any opinions, findings and conclusions or recommendations expressed in this material are
those of the author(s) and do not necessarily reflect those of the National Science Foundation.
Key Distribution Center
KDC is a single service running on a
server
Provides the Authentication Service and
Ticket-Granting Services
This work is supported by the National Science
Foundation under Grant Number DUE-0302909.
Any opinions, findings and conclusions or recommendations expressed in this material are
those of the author(s) and do not necessarily reflect those of the National Science Foundation.
Authentication Service (AS)
This service issues ticket-granting ticket
(TGTs) for connection to the ticketgranting service (TGS)
TGT can be reused until it expires
This work is supported by the National Science
Foundation under Grant Number DUE-0302909.
Any opinions, findings and conclusions or recommendations expressed in this material are
those of the author(s) and do not necessarily reflect those of the National Science Foundation.
Ticket–Granting Service (TGS)
This service issues tickets for connection to
services running on server computers
If clients want access to a service located on
another computer, it must request TGT from
the authentication service, present it to TGS
and ask for a ticket to the computer
See Figure 16.1 on page 384 for this process
This work is supported by the National Science
Foundation under Grant Number DUE-0302909.
Any opinions, findings and conclusions or recommendations expressed in this material are
those of the author(s) and do not necessarily reflect those of the National Science Foundation.
This work is supported by the National Science
Foundation under Grant Number DUE-0302909.
Any opinions, findings and conclusions or recommendations expressed in this material are
those of the author(s) and do not necessarily reflect those of the National Science Foundation.
This work is supported by the National Science
Foundation under Grant Number DUE-0302909.
Any opinions, findings and conclusions or recommendations expressed in this material are
those of the author(s) and do not necessarily reflect those of the National Science Foundation.
Kerberos
Supported by Microsoft Win2K and 2003
Windows Server platforms (KDC service
is started automatically by the domain
controller’s Local Security
Authority(LSA) )
Symbol calls their proprietary KDC
appliance the Spectrum24 Mobility
Server
This work is supported by the National Science
Foundation under Grant Number DUE-0302909.
Any opinions, findings and conclusions or recommendations expressed in this material are
those of the author(s) and do not necessarily reflect those of the National Science Foundation.
The basic principles of Kerberos
operation
The Key Distribution Center (KDC) knows the secret
keys of all clients and servers on the network
The KDC initially exchanges information with the
client and server by using secret keys
Kerberos authenticates a client to requested service
on a server through TGS, and by issuing temporary
symmetric session keys for communications between
the client and KDC, the server and KDC, and the
client and server
Communication then takes place between the client
and the server using those temporary session keys
This work is supported by the National Science
Foundation under Grant Number DUE-0302909.
Any opinions, findings and conclusions or recommendations expressed in this material are
those of the author(s) and do not necessarily reflect those of the National Science Foundation.
Client to TGS server: Initial
Exchange
User enters an ID and password on the client
workstation
The client temporary generates the client’s secret key
from the password using a one-way hash function
The client sends a request for authentication to the TGS
server using the client’s ID in the clear (no password or
secret key is sent )
If TGS has the client in data base, it will returns an
encrypted client/TGS session key in the secret key of the
client and a TGT encrypted in the secret key of the TGS
server
The client decrypts the message containing the session
key with its secret key, and use it to communicate with
the TGS server, and erases its stored secret key
This work is supported by the National Science
Foundation under Grant Number DUE-0302909.
Any opinions, findings and conclusions or recommendations expressed in this material are
those of the author(s) and do not necessarily reflect those of the National Science Foundation.
Client to TGS Server: Request for
service
When requesting access, the client
sends two messages to the TGS server:
First it sends TGT, and the identification
of the server(s) from which service is
requested
Second message is an authenticator
(the client ID, timestamp, and optional
additional session key) encrypted in the
assigned session key
This work is supported by the National Science
Foundation under Grant Number DUE-0302909.
Any opinions, findings and conclusions or recommendations expressed in this material are
those of the author(s) and do not necessarily reflect those of the National Science Foundation.
TGS Server to Client: Issuing Ticket
for service
The TGS server issues a ticket to the
client that is encrypted in the server’s
secret key, and a client/server session
key that is encrypted in the client/TGS
session key
Next to receive services, the client
sends the ticket and authenticator to
the server
This work is supported by the National Science
Foundation under Grant Number DUE-0302909.
Any opinions, findings and conclusions or recommendations expressed in this material are
those of the author(s) and do not necessarily reflect those of the National Science Foundation.
Kerberos Vulnerabilities
Kerberos addresses the confidentiality and integrity of
the information, but because all the secret keys are
held and authentication is performed on the Kerberos
TGS and authentication servers, they are vulnerable
to physical and malicious code attacks
Replay attacks can be accomplished if the
compromised tickets are used within an allotted time
window
A client’s secret key, can be compromised as well as
the session keys that are stored at the client’s
computer
In Kerberos IV, DES was used for encryption (DES
can be cracked), in current release (Kerberos V)
support is provided for “plug-in” symmetric
encryption algorithm (such as 3DES, IDEA)
This work is supported by the National Science
Foundation under Grant Number DUE-0302909.
Any opinions, findings and conclusions or recommendations expressed in this material are
those of the author(s) and do not necessarily reflect those of the National Science Foundation.
Remote Access Dial-In User
Service (RADIUS)
An authentication and accounting service
To access the network Username and
password passed by the Network Access
Server (NAS) to a RADIUS to be verified
In the wireless LAN, the APs play the roll of
the NAS
RADIUS may use an internal or external
database of users
RADIUS works just as well with VPNs in a
wireless environment as it does with
802.1x/EAP
This work is supported by the National Science
Foundation under Grant Number DUE-0302909.
Any opinions, findings and conclusions or recommendations expressed in this material are
those of the author(s) and do not necessarily reflect those of the National Science Foundation.
This work is supported by the National Science
Foundation under Grant Number DUE-0302909.
Any opinions, findings and conclusions or recommendations expressed in this material are
those of the author(s) and do not necessarily reflect those of the National Science Foundation.
RADIUS server features include:
Scalability
EAP Support (TLS, TTLS, LEAP, MD5 )
Clustering and Failover Support
Accounting
Legacy Authentication Protocol Support
Mutual Authentication Support
Multiple RAS Vendor Support
Software and Appliance
Implementations
This work is supported by the National Science
Foundation under Grant Number DUE-0302909.
Any opinions, findings and conclusions or recommendations expressed in this material are
those of the author(s) and do not necessarily reflect those of the National Science Foundation.
Scalability
RADIUS server’s ability to pass
authentication requests to another
authentication service such as another
RADIUS server or an LDAP compliant
user database
This is called Proxy Authentication
This work is supported by the National Science
Foundation under Grant Number DUE-0302909.
Any opinions, findings and conclusions or recommendations expressed in this material are
those of the author(s) and do not necessarily reflect those of the National Science Foundation.
EAP support
RADIUS server should support the type
of EAP that will be used in an
organization
If not, choose the wireless
infrastructure devices that support an
EAP type matching the server
This work is supported by the National Science
Foundation under Grant Number DUE-0302909.
Any opinions, findings and conclusions or recommendations expressed in this material are
those of the author(s) and do not necessarily reflect those of the National Science Foundation.
Clustering and Failover
Clustering means that multiple servers
can run as a single computer where
each shares in the workload of the
application
Some RADIUS packages support
clustering
Depending on the OS vendor, this may
require additional licensing, upgrades
and more
This work is supported by the National Science
Foundation under Grant Number DUE-0302909.
Any opinions, findings and conclusions or recommendations expressed in this material are
those of the author(s) and do not necessarily reflect those of the National Science Foundation.
Accounting
The RADIUS server can maintain:


A history of all user dial-in sessions,
indicating start time, stop time, and various
statistics for the session
A current user list indicating which users
are currently connected to which Remote
Access Servers (RAS)
This work is supported by the National Science
Foundation under Grant Number DUE-0302909.
Any opinions, findings and conclusions or recommendations expressed in this material are
those of the author(s) and do not necessarily reflect those of the National Science Foundation.
Legacy Authentication
Protocols
Up-to-date RADIUS server software typically
supports MS-CHAP, MS-CHAPv2, multiple EAP
types, and other types of authentication
Support for legacy authentication protocols is
sometimes desirable because of legacy RAS
devices that are in place
Integrating both legacy and leading edge
authentication protocols makes the transition
between older and newer systems easier
This work is supported by the National Science
Foundation under Grant Number DUE-0302909.
Any opinions, findings and conclusions or recommendations expressed in this material are
those of the author(s) and do not necessarily reflect those of the National Science Foundation.
Mutual Authentication
Both the client and the server must
authenticate each others (two-way login)
In some cases mutual authentication also
refers to both the client and access point
having to authenticate to the
authentication server
Mutual authentication eliminates man-inthe-middle and rogue access point attacks
This work is supported by the National Science
Foundation under Grant Number DUE-0302909.
Any opinions, findings and conclusions or recommendations expressed in this material are
those of the author(s) and do not necessarily reflect those of the National Science Foundation.
Multiple RAS Vendors
When purchasing a RADIUS server
package, make sure that the
administrator can configure the server
with the proper “dialect” RADIUS
protocol that will work with the
organization’s NAS
This work is supported by the National Science
Foundation under Grant Number DUE-0302909.
Any opinions, findings and conclusions or recommendations expressed in this material are
those of the author(s) and do not necessarily reflect those of the National Science Foundation.
Various Implementations
RADIUS servers come in various forms:



Hardware appliances (suitable for large
enterprises where distributed proxy RADIUS
devices alleviate congested WAN links)
Software packages (Unix, Linux, Windows 2000
professional) for scalability and redundancy
Integrated into wireless infrastructure devices
appropriate for SOHO environments where there
are a small number of users
This work is supported by the National Science
Foundation under Grant Number DUE-0302909.
Any opinions, findings and conclusions or recommendations expressed in this material are
those of the author(s) and do not necessarily reflect those of the National Science Foundation.
Authentication Design
Considerations
Single Site deployment
Distributed autonomous sites
Distributed Sites, Centralized
authentication & Security
Distributed Sites & Security, Centralized
Authentication
Combination Architectures
This work is supported by the National Science
Foundation under Grant Number DUE-0302909.
Any opinions, findings and conclusions or recommendations expressed in this material are
those of the author(s) and do not necessarily reflect those of the National Science Foundation.
Single Site Deployment
All WLAN users are located at a single
site
A central authentication database
handles all user authentication
One or more RADIUS servers manage
WLAN and/or remote access use,
authenticating users and setting up
secure WLAN connections
This work is supported by the National Science
Foundation under Grant Number DUE-0302909.
Any opinions, findings and conclusions or recommendations expressed in this material are
those of the author(s) and do not necessarily reflect those of the National Science Foundation.
Advantages of Single Site
Deployment
You can authenticate your WLAN users
against any back-end authentication
database your RADIUS server supports
To scale, add access points and
RADIUS/AAA servers to authenticate
users against the central authentication
database
This work is supported by the National Science
Foundation under Grant Number DUE-0302909.
Any opinions, findings and conclusions or recommendations expressed in this material are
those of the author(s) and do not necessarily reflect those of the National Science Foundation.
Distributed Autonomous Sites
Distributed autonomous sites or networks
The authentication database is replicated from the central
site downstream to each autonomous site or network, so
that all user authentication happens locally
One or more RADIUS servers managing WLAN and/or
remote access use are located at each autonomous site or
network.
Each RADIUS server performs the following tasks:



Handles user authentication locally
Sets up secure WLAN connections
If required, records accounting data
Availability of central site network or hub is not an issue
This work is supported by the National Science
Foundation under Grant Number DUE-0302909.
Any opinions, findings and conclusions or recommendations expressed in this material are
those of the author(s) and do not necessarily reflect those of the National Science Foundation.
Distributed Autonomous Sites
This architecture presents the following
benefits:


Access to network is governed locally, and is not
subject to the reliability of a link back to a
central authentication store
The distributed RADIUS servers handle the full
computational load associated with setting up
the secure WLAN connection (you can easily add
servers to absorb the performance hit associated
with adding new WLAN users)
This work is supported by the National Science
Foundation under Grant Number DUE-0302909.
Any opinions, findings and conclusions or recommendations expressed in this material are
those of the author(s) and do not necessarily reflect those of the National Science Foundation.
Distributed Sites, Centralized
Authentication & Security
Distributed sites, networks or clusters of access points
WLAN access points at each site or on each network
authenticate users against an authentication database
located at a central site or operating hub
One or more RADIUS servers at the central site manage all
WLAN and/or remote access use.
The central site RADIUS server:



Handles user authentication locally
Sets up secure WLAN connections
If required, records accounting data
Availability of central site network or hub is an issue
Link bandwidth usage may be an issue
This work is supported by the National Science
Foundation under Grant Number DUE-0302909.
Any opinions, findings and conclusions or recommendations expressed in this material are
those of the author(s) and do not necessarily reflect those of the National Science Foundation.
Two issues that need consideration
when DSCA&S is used
1. Ability of a WLAN user to connect to the
network is dependent on the status of the
link between the distributed networks and
central site or operating hub
2. RADIUS/AAA server at central site
responsible for authenticating users, it must
also perform the cryptographic computations
necessary to set up the secure WLAN
connection (performance bottleneck!)
This work is supported by the National Science
Foundation under Grant Number DUE-0302909.
Any opinions, findings and conclusions or recommendations expressed in this material are
those of the author(s) and do not necessarily reflect those of the National Science Foundation.
Distributes Sites & Security
Centralized Authentication
Distributed sites, networks or clusters of
access points
The authentication database is located at the
central site or network hub
This work is supported by the National Science
Foundation under Grant Number DUE-0302909.
Any opinions, findings and conclusions or recommendations expressed in this material are
those of the author(s) and do not necessarily reflect those of the National Science Foundation.
Distributes Sites & Security
Centralized Authentication
One or more RADIUS servers managing WLAN
and/or remote access use are located at each site,
network, or AP cluster
The distributed RADIUS server performs the
following tasks:



Queries the central site for user authentication
Handles setting up the secure connection itself
If required, records accounting data locally, or forwards
data to the central site
Availability of central site network is an issue
This work is supported by the National Science
Foundation under Grant Number DUE-0302909.
Any opinions, findings and conclusions or recommendations expressed in this material are
those of the author(s) and do not necessarily reflect those of the National Science Foundation.
Combined Architectures
802.1x is very flexible
You can mix and match the different
architectures presented before
This work is supported by the National Science
Foundation under Grant Number DUE-0302909.
Any opinions, findings and conclusions or recommendations expressed in this material are
those of the author(s) and do not necessarily reflect those of the National Science Foundation.
EAP Types
EAP-MD5 LEAP
EAP-TLS
EAPTTLS
PEAP
Server
Authentication
None
Password
Hash
Public Key
(Certificate)
Public Key
(Certificate)
Public Key
(Certificate)
Supplicant
Authentication
Password
Hash
Password
Hash
Public Key
(Certificate
or Smart
Card)
CHAP, PAP,
MSCHAP(v2),
EAP
Any EAP, like
EAP-MSCHAPv2 or
Public Key
Dynamic Key
Delivery
No
Yes
Yes
Yes
Yes
Security Risks
Identity
exposed,
Dictionary
attack, Manin-theMiddle
(MitM)
attack,
Session
hijacking
Identity
exposed,
Dictionary
attack
Identity
exposed
MitM attack
MitM attack;
Identity
hidden in
Phase 2 but
potential
exposure in
Phase 1
This work is supported by the National Science
Foundation under Grant Number DUE-0302909.
Any opinions, findings and conclusions or recommendations expressed in this material are
those of the author(s) and do not necessarily reflect those of the National Science Foundation.
LDAP
LDAP is lightweight version of the X.500
Directory Access Protocol
LDAP is a simple protocol that acts as a
storehouse of information for
applications
LDAP contains small records of
information in a hierarchical structure
This work is supported by the National Science
Foundation under Grant Number DUE-0302909.
Any opinions, findings and conclusions or recommendations expressed in this material are
those of the author(s) and do not necessarily reflect those of the National Science Foundation.
Native LDAP servers
OpenLDAP server (Linux )
Innosoft’s Distributed Directory Server (Linux)
Netscape Directory server (Linux)
Sun Microsystems’s Directory Service (Solaris)
IBM’s DS Series LDAP Directory (AIX)
University of Michigan’s SLAPD (various forms
of Unix)
This work is supported by the National Science
Foundation under Grant Number DUE-0302909.
Any opinions, findings and conclusions or recommendations expressed in this material are
those of the author(s) and do not necessarily reflect those of the National Science Foundation.
LDAP applications and use
There are a number of other directory service
systems that also support LDAP queries,
where they use proprietary APIs with
interfaces for LDAP communications
They are:



Novell’s eDirectory
Microsoft’s Active Directory
Lotus Domino
Many EWGs can query LDAP compliant
databases directly rather than go through
RADIUS
This work is supported by the National Science
Foundation under Grant Number DUE-0302909.
Any opinions, findings and conclusions or recommendations expressed in this material are
those of the author(s) and do not necessarily reflect those of the National Science Foundation.
Uses for LDAP
A data retrieval protocol - used directly as an
application server to retrieve information from a
directory
An application service protocol - used by
different applications to retrieve the information
these applications require
An inter-application data exchange interface used by one application to exchange data with
another, or as a gateway between two incompatible
applications
A system service protocol - used by an OS to
communicate information between its different
resources or components
This work is supported by the National Science
Foundation under Grant Number DUE-0302909.
Any opinions, findings and conclusions or recommendations expressed in this material are
those of the author(s) and do not necessarily reflect those of the National Science Foundation.
LDAP Communications
Client-to-server communications allow user
applications to contact an LDAP server to
create, retrieve, modify, and delete data with
the standard LDAP commands
Server-to server communications define how
multiple servers on a network share the
contents of an LDAP directory information
tree and how they update and replicate
information between themselves
This work is supported by the National Science
Foundation under Grant Number DUE-0302909.
Any opinions, findings and conclusions or recommendations expressed in this material are
those of the author(s) and do not necessarily reflect those of the National Science Foundation.
LDAP Architecture
The basic structure is a simple tree called the directory
information tree (DIT)
Every node in the tree is known as an entry, or
directory service entry (DSE)
There is a special entry called the root directory
specific entry or rootDSE, that contains a description
of the whole tree, its layout, and its contents, but this is
not really the root (root does not exist)
To refer to each entry in the DIT uniquely, you must use
a distinguished name (DN)
If you know the subset, you need only specify the name
relative to it (RDNs relative distinguished names)
This work is supported by the National Science
Foundation under Grant Number DUE-0302909.
Any opinions, findings and conclusions or recommendations expressed in this material are
those of the author(s) and do not necessarily reflect those of the National Science Foundation.
Multi-factor Authentication
There are three different types of authentication
criteria that can be combined to create a multifactor solution:



Knowledge-username/passwords (something you know)
Possessions- token, secureID, SmartCard (something you
have)
Biometrics- fingerprints, eye scan, hand scan (something
you are)
When choosing a solution you must consider


Management & integration , and
proven technology
This work is supported by the National Science
Foundation under Grant Number DUE-0302909.
Any opinions, findings and conclusions or recommendations expressed in this material are
those of the author(s) and do not necessarily reflect those of the National Science Foundation.
Resources
CWSP certified wireless security
professional, from McGraw-Hill
This work is supported by the National Science
Foundation under Grant Number DUE-0302909.
Any opinions, findings and conclusions or recommendations expressed in this material are
those of the author(s) and do not necessarily reflect those of the National Science Foundation.
Download