security analysis on wireless lan protocols
play

Security Analysis on Wireless LAN protocols HORI Yoshiaki - PowerPoint PPT Presentation

Security Analysis on Wireless LAN protocols HORI Yoshiaki hori@csce.kyushu-u.ac.jp Kyushu University / ISIT ETRI-ISIT 1st joint seminar 1 Contents S e c u r i t y a n a l y s i s o n I E E E 8 0 2 . 1 1 i


  1. Security Analysis on Wireless LAN protocols HORI Yoshiaki hori@csce.kyushu-u.ac.jp Kyushu University / ISIT ETRI-ISIT 1st joint seminar 1

  2. Contents ・ S e c u r i t y a n a l y s i s o n I E E E 8 0 2 . 1 1 i ‐ S h o r t s u m m a r y o f C . H e a n d J . C . M i t c h e l l , “ S e c u r i t y A n a l y s i s a n d I m p r o v e m e n t s f o r I E E E 8 0 2 . 1 1 i , ” N D S S 0 5 , F e b r u a r y 2 0 0 5 ・ S e c u r i t y a n a l y s i s o n M I S p r o t o c o l ‐ Y e t a n o t h e r w i r e l e s s L A N p r o t o c o l b a s e d o n I E E E 8 0 2 . 1 1 p h y s i c a l l a y e r ETRI-ISIT 1st joint seminar 2

  3. Wireless LAN and Security • Wireless LAN (WLAN) – WLAN uses wireless media instead of wired media in order to provide connectivity for a terminal. • A wireless terminal is connected with Access Point (AP) by using of wireless media. – WLAN provides mobility, no wire → WLAN enables easily to build LAN – Currently WLAN become widely deployed. • WLAN security – WLAN security has become a serious concern for many organizations. – Security requirements for a WLAN • Data condidentiality • Integrity • Mutual authentication • Availability ETRI-ISIT 1st joint seminar 3

  4. WLAN security model Wireless terminal Access Point (AP) (Supplicant) (Authenticator) Network Network (Authentication Attack Server) Eaves dropping Adversary ETRI-ISIT 1st joint seminar 4

  5. Wireless Threats (by C. He and J. C. Mitchell, Stanford Univ.) • Wireless Threats – Threat 1: Passive Eavesdropping – Threat 2: Message Injection – Threat 3: Message Deletion and Interception – Threat 4: Masquerading and Malicious AP – Threat 5: Session Hijacking – Threat 6: Man-in-the-Middle – Threat 7: Denial of Service Threats 1, 2, and 3: attack all three type of frames in the Link Layer Threats 4, 5, and 6: defeat mutual authentication Threats 7: interferes with availabilit ETRI-ISIT 1st joint seminar 5

  6. IEEE 802.11i overview ・I E E E s t a n d a r d a p p r o v e d a n d p u b l i s h e d o n J u n e 2 0 0 4 ・D e s i g n e d t o p r o v i d e e n h a n c e d s e c u r i t y i n t h e M e d i a A c c e s s C o n t r o l ( M A C ) l a y e r f o r 8 0 2 . 1 1 w i r e l e s s n e t w o r k s ‐8 0 2 . 1 1 i w o r k s w e l l f o r d a t a c o n f i d e n t i a l i t y , i n t e g r i t y , a n d m u t u a l a u t h e n t i c a t i o n . ・D e f i n e d R o b u s t S e c u r i t y N e t w o r k A s s o c i a t i o n ( R S N A ) w h i c h p r o v i d e s ‐t w o d a t a c o n f i d e n t i a l i t y p r o t o c o l s ; ・T e m p o r a r y K e y I n t e g r i t y P r o t o c o l ( T K I P ) ・C o u n t e r - m o d e / C B C - M A C P r o t o c o l ( C C M P ) w i t h A E S - 1 2 8 ( 1 2 8 b i t K e y a n d 1 2 8 b i t B l o c k s i z e ) ‐A u t h e n t i c a t i o n a n d k e y m a n a g e m e n t p r o t o c o l ・E x t e n s i b l e A u t h e n t i c a t i o n P r o t o c o l ( E A P ) s c h e m e , e . g . E A P - T L S , p r o v i d e s m u t u a l a u t h e n t i c a t i o n . ・4 - w a y h a n d s h a k e e n a b l e s t o s h a r e P a i r w i s e T r a n s i e n t K e y ( P T K ) d e r i v e d f r o m t h e i r P a i r w i s e M a s t e r K e y ( P T K ) . ・A l s o s u p p o r t e d p r e - R S N A f o r c o m p a t i b i l i t y w i t h 8 0 2 . 1 1 ‐W i r e d E q u i v a l e n t P r i v a c y ( W E P ) ETRI-ISIT 1st joint seminar 6

  7. Data confidentiality and Integrity ・ C C M P a p p e a r s t o p r o v i d e s a t i s f a c t o r y d a t a c o n f i d e n t i a l i t y , i n t e g r i t y , a n d r e p l a y p r o t e c t i o n f o r d a t a p a c k e t s a g a i n s t t h r e a t s 1 , 2 a n d 3 . ・ H o w e v e r , t h r e a t s 1 , 2 a n d 3 r e m a i n w i t h m a n a g e m e n t f r a m e s a n d c o n t r o l f r a m e s b e c a u s e t h e s e f r a m e s a r e n e i t h e r e n c r y p t e d n o r a u t h e n t i c a t e d b y t h e l i n k l a y e r e n c r y p t i o n a l g o r i t h m . ETRI-ISIT 1st joint seminar 7

  8. Authentication and Key Management ・I f t h e c o m p l e t e R S N A h a n d s h a k e s a r e p e r f o r m e d , t h e a u t h e n t i c a t i o n a n d k e y m a n a g e m e n t p r o c e s s a p p e a r t o b e s e c u r e . ・H o w e v e r , s i n c e a n a d v e r s a r y c a n i n t e r f e r e w i t h e a r l y s t a g e s i n R S N A h a n d s h a k e s , i t m a y p r e v e n t c o m p l e t i o n o f t h e R S N A . ・S o m e a t t a c k s f o r 8 0 2 . 1 1 i ‐S e c u r i t y l e v e l r o l l b a c k a t t a c k ・B o g u s b e a c o n a n d b o g u s p r o b e r e s p o n s e f r o m a n a u t h e n t i c a t o r ( a c c e s s p o i n t ) , a n d b o g u s a s s o c i a t i o n r e q u e s t . ‐R e f l e c t i o n a t t a c k o n t h e 4 - w a y h a n d s h a k e ETRI-ISIT 1st joint seminar 8

  9. Availability ・ K n o w n D o SA t t a c k s ・ M i c h a e l A l g o r i t h m C o u n t e r m e a s u r e ( i n T K I P ) ‐ N o t a f f e c t e d w i t h C C M P ・ R S N I E ( R S N I n f o r m a t i o n E l e m e n t ) P o i s o n i n g ・ 4 - W a y H a n d s h a k e B l o c k i n g ・ F a i l u r e R e c o v e r y ETRI-ISIT 1st joint seminar 9

  10. Known DoS Attacks ・A n a d v e r s a r y c a n e a s i l y f o r g e t h e m a n a g e m e n t f r a m e s a n d t h e c o n t r o l f r a m e s t o l a u n c h a D o S a t t a c k . ‐T h e m o s t e f f i c i e n t a t t a c k i s t o f o r g e a n d r e p e a t e d l y s e n d D e a u t h e n t i c a t i o n o r D e a s s o c i a t i o n f r a m e s . T h e s e a t t a c k s p e r s i s t e v e n i f 8 0 2 . 1 1 i i s u s e d . ‐T h e r e a r e a l s o s e v e r a l D o Sa t t a c k s t h a t e x p l o i t t h e u n p r o t e c t e d E A P m e s s a g e s i n 8 0 2 . 1 X a u t h e n t i c a t i o n . H o w e v e r , t h e s e v u l n e r a b i l i t i e s f o r t u n a t e l y c a n b e e l i m i n a t e d i n 8 0 2 . 1 1 i b y s i m p l y i g n o r i n g t h e s e m e s s a g e s . ・E A P O L ( E A P o v e r L A N ) - S t a r t , E A P O L - S u c c e s s , E A P O L - F a i l u r e , E A P O L - L o g o f f ETRI-ISIT 1st joint seminar 10

  11. Summary: 802.11i security ・ S a t i s f a c t o r y d a t a c o n f i d e n t i a l i t y , i n t e g r i t y , a n d r e p l a y p r o t e c t i o n f o r d a t a p a c k e t s i s p r o v i d e d b y u s i n g o f C C M P ( A E S ) . ・ M u t u a l a u t h e n t i c a t i o n i s p r o v i d e d b y E A P - T L S a n d 4 - w a y h a n d s h a k e . ・ I n o r d e r t o s u p p o r t a b o v e f e a t u r e s a n d t o k e e p u p p e r c o m p a t i b i l i t y w i t h I E E E 8 0 2 . 1 1 a n d I E E E 8 0 2 . 1 X ( p r e - R S N A ) , w e s h o u l d c o n s i d e r a v a i l a b i l i t y . ETRI-ISIT 1st joint seminar 11

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend