How to Secure your Wireless LAN

How to Secure your Wireless LAN
security concepts for modern enterprise infrastructures
Presented by Philipp Ebbecke @ WLPC_EU 2014
www.lancom.de
Secure your WLAN
Overview
Introduction
How to secure a modern enterprise class wireless network
Wireless LAN Infrastructure:
Wireless LAN Controller
Basic Security
802.1X
802.11r - Fast Transition
802.11w - Protected Management Frames
802.11u - HotSpot2.0 (R2)
Other aspects:
Monitor your network
Proper RF Design
Final Words
Page 2
Secure your WLAN
Introduction
■ Primary Connection Interface: Wi-Fi (Smartphones,
Tablets, IoT)
■ Signal does not „stay“ only in your building
■ Secure and easy installation/integration wanted
■ Sticking to the standard(s)
■ The chicken or the egg dilemma: Who implements
what first?
■ Legacy support
Page 3
Secure your WLAN
Introduction - Own Your Data (1)
Page 4
Source: http://www.zdnet.com/microsoft-ordered-to-hand-overoverseas-email-throwing-eu-privacy-rights-in-the-fire-7000032210/
Secure your WLAN
Introduction - Own Your Data (2)
Page 5
Source: http://www.reuters.com/article/2014/06/26/us-germanysecurity-verizon-idUSKBN0F11WJ20140626
Secure your WLAN
Introduction - Own Your Data (2)
Page 6
Source: http://www.digit.in/networking/2014-fifa-world-cups-wi-fipassword-revealed-accidentally-23101.html
Secure your WLAN
Overview
Introduction
How to secure a modern enterprise class wireless network
Wireless LAN Infrastructure:
Wireless LAN Controller
Basic Security
802.1X
802.11r - Fast Transition
802.11w - Protected Management Frames
802.11u - HotSpot2.0 (R2)
Other aspects:
Monitor your network
Proper RF Design
Final Words
Page 7
Secure your WLAN
WLC
■ Control and configure your APs via Wireless LAN
Controllers (WLCs)
■ Small enterprises can enable software options on their
routers
■ WLC required to distribute keys for 802.11r (FT) or
Opportunistic Key Caching (OKC)
■ Avoid cloud based WLCs if you want to truly own your
data
■ Avoid L3-Tunneling:
■ No stand-alone operation of APs possible
■ Data needs to travel through WLC
■ Expensive WLC due to hardware requirements
Page 8
Secure your WLAN
Overview
Introduction
How to secure a modern enterprise class wireless network
Wireless LAN Infrastructure:
Wireless LAN Controller
Basic Security
802.1X
802.11r - Fast Transition
802.11w - Protected Management Frames
802.11u - HotSpot2.0 (R2)
Other aspects:
Monitor your network
Proper RF Design
Final Words
Page 9
Secure your WLAN
RSN
■ Robust Security Network (RSN)
■ Self-evident: Don’t use PSK for enterprise
■ WPA2 only - WEP and WPA1 not secure and no (V)HT
support
■ WEP Cracking: http://goo.gl/0VmxFT
■ WPA1 Cracking: http://goo.gl/GEUuC
■ Isolate WEP and WPA1 SSIDs to their specific use
case (if necessary at all)
Page 10
Secure your WLAN
Overview
Introduction
How to secure a modern enterprise class wireless network
Wireless LAN Infrastructure:
Wireless LAN Controller
Basic Security
802.1X
802.11r - Fast Transition
802.11w - Protected Management Frames
802.11u - HotSpot2.0 (R2)
Other aspects:
Monitor your network
Proper RF Design
Final Words
Page 11
Secure your WLAN
802.1X
■
The one and only option for secure enterprise
networks
■
RADIUS Server required
■
Based on the Extensible Authentication Protocol
(EAP)
■
Native support in most client devices, watch out for
wireless printers(!)
Page 12
Secure your WLAN
802.1X
Page 13
Secure your WLAN
4-Way Handshake
■
Data transmission via transient keys derived from
master keys
■
2 Keys: Pairwise Master Key (PMK) and Groupwise
Master Key (GMK)
■
New, unique PMK for every (re-)authentication of a
client
■
PTK for Unicasts (individual for each client)
■
GMK is randomly created
■
GTK for Broad-/Multicasts (same for all clients)
■
PTK and GTK are stored on AP and Client
■
AP can store the PMK as well (PMK-Caching - No
Authentication, just 4-Way Handshake)
Page 14
Secure your WLAN
4-Way Handshake
PTK = PRF(PMK +
ANonce + SNonce
+ AA + SPA)
Source: https://en.wikipedia.org/wiki/
IEEE_802.11i-2004#The_Four-Way_Handshake
Page 15
Secure your WLAN
802.1X - EAP
■
In General: Username/Password, Certificate, SIM
■
Legacy Authentication Protocols:
PAP: clear text username/password
CHAP: clear text username, MD5-hashed
password
MS-CHAP: weak security, MS version of CHAP
MS-CHAPv2: stronger hashing, also vulnerable
■
Legacy methods still in use but inside SSL/TLS
Tunnel
Page 16
Secure your WLAN
802.1X - EAP
■
Weak EAP Methods:
EAP-MD5
EAP-LEAP
■
■
Username in clear text
Strong EAP Protocols
■
Use of outer identity (anonymous) for tunnel
establishment
■
inner, encrypted identity inside the tunnel
Page 17
Secure your WLAN
802.1X - EAP-PEAP/TTLS
EAP-PEAP
■
Popular and secure
■
Supplicant validates server certificate
■
EAP-PEAPv0 (EAP-MSCHAPv2): Username +
password, no client certificate support
■
EAP-PEAPv0 (EAP-TLS): requires client
certificate, no username
EAP-FAST: Secure if credentials are not autoprovisioned
EAP-TTLS: EAP and non-EAP methods for inner
identity, client certificate optional
Page 18
Secure your WLAN
802.1X - EAP-TLS
EAP-TLS
■
One of the most secure EAP methods
■
Requires client-side certificates (mutual
authentication)
■
No username/password authentication
■
Secure and high-availability certificate store is a
must
■
Checks against:
– Subject Alternative Name (SAN)
– Subject Common Name (CN)
– Binary - check against user object from LDAP/
AD
Page 19
Secure your WLAN
802.1X - EAP-SIM/AKA
■
EAP Methods for mobile phones
■
Important for 802.11u
EAP-SIM
– based on 2G GSM authentication
– short key length
– no mutual authentication
EAP-AKA
– designed for 3G networks
– AKA runs inside SIM module
– longer keys
– mutual authentication included
Page 20
Secure your WLAN
Overview
Introduction
How to secure a modern enterprise class wireless network
Wireless LAN Infrastructure:
Wireless LAN Controller
Basic Security
802.1X
802.11r - Fast Transition
802.11w - Protected Management Frames
802.11u - HotSpot2.0 (R2)
Other aspects:
Monitor your network
Proper RF Design
Final Words
Page 21
Secure your WLAN
802.11r
■
Fast BSS Transition (FT) alias Roaming
■
802.11i: Full Authentication via RADIUS on every
handoff
■
.11r: „PMK Caching“ at multiple APs
■
Reduced # of Frames:
■
■
Number EAP Authentication Frames depends on
EAP Protocol
■
4-Way Handshake
■
QoS Admission Control
Over the Air or Distribution System (Wired)
Page 22
Secure your WLAN
802.11r - Over the Air
Page 23
Secure your WLAN
802.11r vs. OKC
Page 24
Secure your WLAN
802.11r - Over the DS
Page 25
Secure your WLAN
802.11r vs. OKC
■
Opportunistic Key Caching (OKC):
■
Clients sends PMKID within (Re-)Association
Request
■
If AP recognizes PMKID, EAP Authentication is
skipped and 4-Way Handshake is started
■
QoS Admission Control not integrated
■
not standardized
Page 26
Secure your WLAN
802.11r - Reassociation Request
Page 27
Secure your WLAN
802.11r - Reassociation Request
New AKM Suite
FT works with .1X and PSK
PMKID added to RSN IE
Page 28
Secure your WLAN
802.11r - Reassociation Request
Page 29
Secure your WLAN
802.11r - Reassociation Request
FT only in same
Mobility Domain
A/SNonce
included
Page 30
Who owns the original PMK?
Secure your WLAN
802.11r - Reassociation Response
Page 31
Secure your WLAN
802.11r - Reassociation Response
Groupwise Transient Key in Reassociation Response
Page 32
Secure your WLAN
802.11r (Measurements)
Full Authentication (EAP-PEAP)
Page 33
Without .11r: ~298 ms (EAP-PEAP)
Secure your WLAN
802.11r (Measurements)
Fast Transition
With .11r: ~20 ms
Over the Air [ms]
300
DUT: iPad 3 with iOS 8.0.2
RF Band: 5 GHz
298
225
-93 %
150
75
0
20
without .11r
Mike Albano
802.11r-Over-the-Air: 16 ms
802.11r-Over-the-DS: 71 ms
with .11r
Reference: http://www.mikealbano.com/2014/06/80211r-80211k-fastbss-transition.html
Page 34
Secure your WLAN
802.11r - APs & Clients
■
Enterprise APs:
■
Feature is offered by Aerohive, Aruba, Cisco,
LANCOM, Motorola, Ruckus, […]
!
■
Clients:
■
Apple: iOS 6 devices (iPad 3, iPhone 4s and
newer)
■
Android: Samsung Galaxy Note 3, Sony Xperia
Z2 and Z3
■
BlackBerry Bold 9000
!
■
WFA Search for cert. devices: http://goo.gl/Z00Pso
Page 35
Secure your WLAN
802.11r - Conclusion
+ High level of security + fast connection phase
possible
+ Great amount of AP support
-
Lack of decent client support
-
VOIP WLAN Phones as latency sensitive should
adopt this quickly
-
WFA Certification „Voice Enterprise“ did not leverage
this feature
Page 36
Secure your WLAN
Overview
Introduction
How to secure a modern enterprise class wireless network
Wireless LAN Infrastructure:
Wireless LAN Controller
Basic Security
802.1X
802.11r - Fast Transition
802.11w - Protected Management Frames
802.11u - HotSpot2.0 (R2)
Other aspects:
Monitor your network
Proper RF Design
Final Words
Page 37
Secure your WLAN
802.11w
■
Protected Management Frames (PMF)
■
WFA: Required for .11n and .11ac certification since
July 1st 2014 - WPA2 only
■
Prohibits „Spoofed Disconnects“ Attacks Deauthenticate/Disassociate or via Channel Switch
Announcements
■
Prevents forged (Re)Associations
■
WPA1/2 required, no WEP support
Page 38
Secure your WLAN
802.11w - Disassociate Frame (unprotected)
Page 39
No reason code required
Secure your WLAN
802.11w
■
Protected Management Frames are:
■
Disassociate
■
Deauthenticate
■
Action Frames: Block ACK, QoS, FT, Radio
Measurement, Spectrum Management
!
■
Unprotected frames:
■
Beacons, Probes, Authentication, Association
■
Announcement Traffic Indication Message
■
Vendor-specific-class Action Frames
Page 40
Secure your WLAN
802.11w - Unicasts
■
Unicast Management Frames:
■
Extend AES-CCM to handle unicast management
frames
■
Protect the previously unencrypted frame header
via additional authentication data (AAD)
■
Uses same PTK as for data frames
■
Separate Receive Sequence Counter (RSC) for
replay protection
Page 41
Secure your WLAN
802.11w - Broad-/Multicasts
■
Broad-/Multicast Management Frames:
■
New Algorithm: Broadcast Integrity Protocol (BIP)
■
New Information Element: Management MIC IE:
Sequence Number + Cryptographic Hash
(AES128-CMAC based)
■
BIP uses Integrity Group Temporal Key (IGTK)
received during WPA key handshake
Page 42
Secure your WLAN
802.11w - Connection option
AP Setting
Client Setting
Outcome
No PMF
No PMF
No PMF
PMF Optional Connection without PMF
No PMF
PMF Required No Connection
PMF Optional No PMF
Secure?
Connection without PMF
Connection without PMF
PMF Optional PMF Optional Connection with PMF
PMF Optional PMF Required Connection with PMF
PMF Required No PMF
No Connection
PMF Required PMF Optional Connection with PMF
PMF Required PMF Required Connection with PMF
Page 43
Secure your WLAN
802.11w - RSN without .11w
Check the AKM on the next slides
2 Flags:
Required = Mandatory
Capable = Optional
Page 44
Secure your WLAN
802.11w - .11w optional
Support for SHA1 and SHA256
PMF Optional
Page 45
Secure your WLAN
802.11w - .11w required
Support only for SHA256
PMF Mandatory
New Cipher Suite for
Broad-/Multicasts
Page 46
Secure your WLAN
802.11w - Disassociate (protected)
Protected bit set
Mgmt. Frame
Sequence Counter
Page 47
Secure your WLAN
802.11w - SA-Query
■
Source Address Query (SA-Query) Procedure
■
Protects against forged (de)authentication and
(dis)association frames and solves „association
lockout“ problem
■
AP Scenario 1 (No Attack):
■
Client discards all keys (due to a restart) and
sends an unprotected association request for a
reconnection
■
AP still has a valid association from the client
including his key material
Page 48
Secure your WLAN
802.11w - AP Scenario 1
Page 49
Secure your WLAN
802.11w - AP Scenario 2
■
AP Scenario 2 (Attack):
■
Attacker sends an unprotected association
request for a forged reconnection
■
AP still has a valid association from the client
including his key material
■
AP rejects the association requests with a special
status code (association rejected temporarily)
and an association comeback interval
Page 50
Secure your WLAN
802.11w - AP Scenario 2
Page 51
Secure your WLAN
802.11w - Client Scenario 1
Page 52
Secure your WLAN
802.11w - Client Scenario 2
Page 53
Secure your WLAN
802.11w
Reason code for this scenario: 6
Page 54
Secure your WLAN
802.11w - APs & Clients
■
Enterprise APs:
■
Feature is offered by Aerohive, AirTight, Aruba,
Cisco, LANCOM, Motorola, Ruckus, Xirrus, […]
!
■
Clients:
■
Support since Windows 8
■
Intel 7260, Qualcomm Adapters since AR5BXB92
■
Samsung Galaxy S5
■
Playstation 4
!
Page 55
■
WFA search for cert. devices: http://goo.gl/3Gk5lG
Secure your WLAN
802.11w - Conclusion and Outlook
+ Feature is now required for WFA 11n, 11ac and
Passpoint
+ Prevents (Dis-)Connect Attacks
+ Finally(!): Adds security to management frames
-
Today: Don’t make PMF required on main SSID (due
to lack of client support)
!
■
Remaining easy disturbances of connections:
■
CTS control frames with long reservation times
■
RF jamming
Page 56
Secure your WLAN
Overview
Introduction
How to secure a modern enterprise class wireless network
Wireless LAN Infrastructure:
Wireless LAN Controller
Basic Security
802.1X
802.11r - Fast Transition
802.11w - Protected Management Frames
802.11u - HotSpot2.0 (R2)
Other aspects:
Monitor your network
Proper RF Design
Final Words
Page 57
Secure your WLAN
802.11u - Guest Network
■
■
Today:
■
Companies usually offer guest access via
Captive Portal
■
Open Network for guest devices
■
No enterprise network for guest devices
Near Future:
■
Companies offer guest access via HS2.0 (R2
starting now)
■
Authentication via NAI realm or mobile operator
■
R2: Open or Server-side encryption for device
provisioning
■
Keep guest devices out of enterprise network but
on an encrypted network
Page 58
Secure your WLAN
802.11u - Advertisement Server
■ Authentication via:
■ Internal NAI Server
■ External NAI Server
■ External Advertisement Server from Mobile
Operator
■ Device has no IP yet => L2 based
Page 59
Secure your WLAN
802.11u
■
Interworking alias HotSpot 2.0
■
Client authenticates via his mobile operator or NAI
Realm (e.g. [email protected])
■
Differentiate between guest and employee device
■
Choose SSID according to given user details
■
More details on HS2.0 R2 in Dave Wright’s
presentation at WLPC 2014: http://goo.gl/zIqpMR
■
Release 1 Problem: Someone has to pre-configure
devices
Page 60
Secure your WLAN
802.11u - Provisioning R1
Apple Configurator
Page 61
Secure your WLAN
802.11u - Flow Diagram
Page 62
See slide 10 for the EAP Flow
Secure your WLAN
802.11u - APs & Clients
■
Enterprise APs:
■
Feature is offered by Aruba, Cisco, Ericsson,
LANCOM, Ruckus, […]
!
■
Clients:
■
Apple iOS Devices since iOS7
■
Android on HTC, LG, Samsung, Sony high end
smartphones
!
■
WFA search for cert. R1 devices: http://goo.gl/rghHlt
■
WFA search for cert. R2 devices: http://goo.gl/0udr31
Page 63
Secure your WLAN
802.11u - Conclusion and Outlook
+ Release 1 is widely adopted already
+ Authentication via internal and/or external
authentication server(s)
+ Encrypted guest network
+ Great solution for BYOD
-
Today: Lack of Release 2 support by enterprise and
client device vendors
Page 64
Secure your WLAN
Overview
Introduction
How to secure a modern enterprise class wireless network
Wireless LAN Infrastructure:
Wireless LAN Controller
Basic Security
802.1X
802.11r - Fast Transition
802.11w - Protected Management Frames
802.11u - HotSpot2.0 (R2)
Other aspects:
Monitor your network
Proper RF Design
Final Words
Page 65
Secure your WLAN
Monitor your network
■ Overview of your current network status
■ History of status, events, logs and graphs
■ Requires deep understanding and knowledge
especially for troubleshooting
■ Should include wired and wireless network
■ Integration of multiple vendors
■ Sensors for RF spectrum, Rogue AP detection
■ Alarms/Notifications - but don’t flood your IT crew
Page 66
Secure your WLAN
Overview
Introduction
How to secure a modern enterprise class wireless network
Wireless LAN Infrastructure:
Wireless LAN Controller
Basic Security
802.1X
802.11r - Fast Transition
802.11w - Protected Management Frames
802.11u - HotSpot2.0 (R2)
Other aspects:
Monitor your network
Proper RF Design
Final Words
Page 67
Secure your WLAN
Proper RF Design
■ Signal does not stop at building walls
■ Consider fabric of a building
■ Directional antennas
■ Drop/Ignore clients below certain SNR
■ Not easy to deploy - proper design and verification
required
■ Survey around your site
Page 68
Secure your WLAN
Overview
Introduction
How to secure a modern enterprise class wireless network
Wireless LAN Infrastructure:
Wireless LAN Controller
Basic Security
802.1X
802.11r - Fast Transition
802.11w - Protected Management Frames
802.11u - HotSpot2.0 (R2)
Other aspects:
Monitor your network
Proper RF Design
Final Words
Page 69
Secure your WLAN
Final Words
■ Enterprise security should be based on strong EAP
methods
■ „Make it as hard as possible to break your security“
■ Lack of client support of some optional features - no
one size fits all solution
■ Troubleshooting requires great(er) knowledge
!
■ Secure WLAN will play a greater role in the future
(http://www.cwnp.com/covers/2014-09-SAE-atCWNP.PDF)
■ HotSpot 2.0 (Release 2) can make a difference
Page 70
Thank you for your attention!
Further information…
More information about our products, solutions and services at:
www.lancom.eu
Presenter: Philipp Ebbecke (@MTroi84,
[email protected])
QA Engineer for WLAN
LANCOM Systems GmbH
Adenauerstraße 20/B2
52146 Wuerselen
Germany
[email protected]
Page 71