4.3 Given a scenario, secure a basic wireless network. Flashcards
Wireless encryption
All wireless computers are radio transmitters and receivers - anyone can listen in
Solution: Encrypt the data• Everyone gets the password• Or their own password• Only people with the password can transmit and listen• WPA and WPA2
WPA (Wi-Fi Protected Access)
2002: WPA was the replacement for serious cryptographic weaknesses inWEP (Wired Equivalent Privacy)
• Don’t use WEP
• Needed a short-term bridge between WEP and whatever would be the successor
• Run on existing hardware
• WPA: RC4 with TKIP (Temporal Key Integrity Protocol)
• Initialization Vector (IV) is larger and an encrypted hash
• Every packet gets a unique 128-bit encryption key
Temporal Key Integrity Protocol
Temporal Key Integrity ProtocolMixed the keys
• Combines the secret root key with the IV
• Adds sequence counter - prevents replay attacks
• Implements a 64-bit Message Integrity Check
• Protects against tampering
• TKIP has it’s own set of vulnerabilities
• Deprecated in the 802.11-2012 standard
WPA2 and CCMP
WPA2 certification began in 2004
AES (Advanced Encryption Standard) replaced RC4• CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol) replaced TKIP
CCMP block cipher mode
Uses AES for data confidentiality
128-bit key and a 128-bit block size
Requires additional computing resources
CCMP security services
Data confidentiality (AES), authentication, and access control
EAP
Extensible Authentication Protocol
An authentication framework
Many different ways to authenticate based on RFC standards
WPA and WPA2 use five EAP types as authentication mechanisms
EAP types
EAP-FAST - EAP Flexible Authentication via Secure Tunneling
Cisco’s proposal to replace LEAP (Lightweight EAP - previously used with WEP)• Lightweight and secure
EAP-TLS (EAP Transport Layer Security)
Strong security, wide adoption• Support from most of the industry
EAP-TTLS (EAP Tunneled Transport Layer Security)
Support other authentication protocols in a TLS tunnel• Use any authentication you can support, maintain security with TLS
Protected Extensible Authentication Protocol -Protected EAP
Protected EAPCreated by Cisco, Microsoft, and RSA Security
• Encapsulates EAP in a TLS tunnel, one certificate on the server
• Combined a secure channel and EAP
• Commonly implemented as PEAPv0/EAP-MSCHAPv2
• Authenticates to Microsoft’s MS-CHAPv2 databases
Wireless security modes
Configure the authentication on your wireless access point / wireless router
• Open System - No authentication password is required
WPA-Personal / WPA-PSK
WPA2 with a pre-shared key• Everyone uses the same 256-bit key
WPA-Enterprise / WPA-802.1X
Authenticates users individually with an authentication server (i.e., RADIUS)
MAC filtering
Easy to find working MAC addresses
Limit access through the physical hardware address
Keeps the neighbors out through wireless LAN analysis
Security through obscurity (not actual security)