cosc 4765

33
Cosc 4765 Wireless Technology and security

Upload: loyal

Post on 05-Jan-2016

28 views

Category:

Documents


4 download

DESCRIPTION

Cosc 4765. Wireless Technology and security. WiFi, IEEE 802.11 standard. services provided: Association establishes initial association between computer and access point before computer can send and receives frames (layer 2), the identity and address must been known Reassociation - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Cosc 4765

Cosc 4765

Wireless Technology and security

Page 2: Cosc 4765

WiFi, IEEE 802.11 standard

• services provided:– Association

• establishes initial association between computer and access point

– before computer can send and receives frames (layer 2), the identity and address must been known

– Reassociation• association can be transferred from on access point

to another, allowing mobile station to move

Page 3: Cosc 4765

WiFi, IEEE 802.11 standard (2)

• Disassociation– notification from station or access point that association is

terminated– like LAN MAC, protects itself when computers disconnect

without notification.

• Authentication: (optional)– no authentication scheme mandated– provides that computer are allowed to communicate with access

point.

• Privacy (optional)– method to prevent messages being read by other then intended

recipient.

Page 4: Cosc 4765

Reliable Data Delivery

• Part of the IEEE 802.11 MAC Layer (layer 2 and 1)– Noise, interference, and other propagation effects result

in the loss of a significant number of frames.– Can be dealt with in higher levels with TCP, but

retransmission rate would be very high.– Uses Frame Exchange Protocol

• When a station receives a data frame from another station, it must return an acknowledgement (ACK) frame.

• If the source doesn't receive an ACK in a short time period, then it retransmits the frame.

Page 5: Cosc 4765

802.11 Physical Layer• IEEE 802.11 issued in several parts in 1997, 1999, and 2002• Original 802.11

– included MAC layer, two in 2.4-Ghz band, 1 infrared, all operating at 1 and 2 Mbps .

• 802.11a– 5-Ghz band, standard rate: 6,9,12,18,24,36,48, and 54Mbps

• 802.11b– 5.5 and 11Mbps

• 802.11g– 54Mbps based on 802.11b standard.

• 802.11n

– 2.4 or 5 Ghz range, rate between 60 and 150 Mbps

Page 6: Cosc 4765

802.11a/b/g Access Points

• Always remember, the access point is functions like a hub, so every computer connecting to it is sharing the bandwidth– as the number of connections go up, the

bandwidth go down!

Page 7: Cosc 4765

B standard

• Mostly widely accepted standard

– Approx 4.3 Mbps throughput.– extension of 802.11 DSSS scheme

• DSSS: Direct-sequence spread spectrum operating in 2.4 Ghz ISM band.

• mapping each data bit into a string of bits, with one string used for binary 1 and another used for binary 0. The effect is to spread each bit out over time, which minimizes the effects of interference and degradation.

– Apple offered it first in the iBook computer using an AirPort wireless network option.

• Wireless Ethernet Compatibility Alliances (WECA) created a test suite to certify interoperability for all 802.11b products.

Page 8: Cosc 4765

54Mb standard

• 802.11a and 802.11g– Both use advanced modulation technology

• Orthogonal Frequency Division Multiplexing (OFDM)– also called multicarrier modulation, uses multiple carrier signals

(up to 52) at different frequencies, sending some of the bits on each channel.

– 802.11g• Approx 19 Mbps throughput• operates in 2.4-GHz frequency as 802.11b and backward-

compatibility for b standard.– 802.11a

• Approx 23 Mbps throughput• uses 5-Ghz band, offers more channels and relatively unused

band, not compatible with b or g standard.– What's best, 802.11b/g or 802.11a?

Page 9: Cosc 4765

G standard

• Lower cost, wider install base.– G standard can back down to the B standard.

• Range of up to 300 feet– Greater range, means fewer access points needed

• True or false?• remember a solid object of 4.5 inches can block the signal.

• Busy channel– microwave ovens to cordless phones and Bluetooth

devices interfere with an 802.11b/g signal– Only three non overlapping channels, so few places to

go with the interference is high.

Page 10: Cosc 4765

A standard

• All about performance– first high cost and low production in the 5GHz range,

very little interference and no problems with compatibility on Access points.

– More channels, from 12 to 20 channels– Should work (soon) with international systems as well.

• Short ranged– only 180 feet, so you need more access points, which

means, as use goes up, there are already access points to carry the load.

Page 11: Cosc 4765

802.11n• Published Oct 2010

• Some devices use 802.11n Draft 2 proposal and vendors may not be interpretable, depending on what they choose.

• Range about 70 M inside, 250M outside.• Data rate can be• Bandwidth 20 Mhz: 20 7.2, 14.4, 21.7, 28.9, 43.3, 57.8,

65, 72.2• Bandwidth 40 Mhz: 15, 30, 45, 60, 90, 120, 135, 150

• 2.4 GHz is very congested, so 40 Mhz is likely not possible in most places and 5Ghz would have to be used.

• Uses MIMO (pronounced mee-moh), is the use of multiple antennas at both the transmitter and receiver to improve communication performance

Page 12: Cosc 4765

Coming soon

• IEEE 802.11ac (Jan 2014)• Very High Throughput <6 GHz• Capacity speeds between 433Mbit to 6.7Gbit

• potential improvements over 802.11n: better modulation scheme (expected ~10% throughput increase)

• wider channels (80 or even 160 MHz), multi user MIMO

• IEEE 802.11ad: Very High Throughput 60 GHz ( ~Summer 2014)• Uses the name WiGig (not clear).• Speeds of 7Gbits

• Which is the top speed of ac, which needs the 8 antenna version

• Downside, 60GHz doesn’t typically go through wall/ceiling/floors/objects instead it reflects.

Page 13: Cosc 4765

Security Risks

• Misconfiguration

• Insertion Attacks

• WarDriving: Interception and monitoring

• Jamming

• Client to Client Attacks– Same attacks that happen in a wired network.

Page 14: Cosc 4765

Misconfigurations

• Using factory defaults!– SSID numbers

• “tsunami” - Cisco • “101” – 3Com • “RoamAbout Default Network Name” - Lucent/Cabletron • “Default SSID" • “Compaq” - Compaq • “WLAN” – Addtron, a popular AP • “intel” - Intel • “linksys” – Linksys • “Wireless”

Page 15: Cosc 4765

Misconfigurations (2)

• Bruteforce the Base Sation SSID– Easy, most base stations broadcast their SSID– If not, try a dictionary attack to find the SSID

• Using default WEP keys from NetGear– 10 11 12 13 14 – 21 22 23 24 25 – 31 32 33 34 35 – 41 42 43 44 45

Page 16: Cosc 4765

Simple configuration fixes.

• Change Default SSID and password

• Disable SSID Broadcast

• Move the Access point to the “center” of the house if possible.• Maximize use and minimize signal “leakage”

• Turn on WPA (WEP if no other choice)

Page 17: Cosc 4765

Insertion attacks

• Simply put: Someone connects to AP with a computer or adding another unauthorized Access Point to your system.– Wireless bridges or extenders

• See any store for the products, including Wal-mart

– The bridge routes it’s wireless traffic to the AP and “extends” the range of the AP.

• i.e. your neighbor purchases a bridge and connects to your access point.

Page 18: Cosc 4765

WarDriving

• War Driving is the concept of getting in your car and driving around for an access point to “break into”.– Sniff the wireless network

• If unencrypted, attach directly, otherwise, break in.

– Allows attacker to inject false traffic– Issue commands on behalf of the legitimate

user and even hijack their session

Page 19: Cosc 4765

WarDriving• AirSnort, a good sniffer for 802.11a/b/g.

– There is another called AirSnarf that allows you steal passwords, by setting up a fake web page for people log into.

– http://freshmeat.net/projects/airsnort • WEPCrack http://sourceforge.net/projects/wepcrack • Netstumber:

– scans for networks roughly every second and logs all the networks it runs into--including the real SSIDs, the AP's MAC address, the best signal-to-noise ratio encountered, and the time you crossed into the network's space. www.netstumbler.com

– Also has a wireless hotspot map • WiFi War-chalking Symbols are at http://www.warchalking.org • Howto war drive: http://www.wardrive.net/wardriving/faq • Dozens more tools at http://www.wardrive.net/wardriving/tools/

Page 20: Cosc 4765

Wi Fi security

• Most WiFi run unprotected and as "clear" text message. Anyone can then "sniff" the packets to determine what is being sent and received.– On a LAN network they had to be at least connected.

• WEP: Wireless Encryption Protocol– While considered weak, it normally takes about a

million packets before the encryption is broken, changing your WEP key every so often provides a good set of protection for a home network.

– Also provides other people from using the Access Point if they don't know the WEP key.

Page 21: Cosc 4765

WEP

• Wired Equivalent Privacy– Flaws in WEP

• Passive attacks to decrypt traffic based on statistical analysis. • Active attack to inject new traffic from unauthorized mobile

stations, based on known plaintext. • Active attacks to decrypt traffic, based on tricking the access

point. • Dictionary-building attack that, after analysis of about a day's

worth of traffic, allows real-time automated decryption of all traffic

– Some say 2 hours is all the time that is needed, for either 64 or 128 bit. Some say 15 minutes.

Page 22: Cosc 4765

WEP Protocol• Shared secret key

– Send out of band• RC4 keystream

– Arbitrary init vector (IV)– Same at sender/received– Per packet

• Sender– Integrity (unkeyed CRC)– Encryption (XOR with RC4

keystream)– Transmit with IV in clear

• Receiver– Reverse operation

Message CRC

Plaintext

Keystream = RC4(v,k)

Ciphertext

XOR

v

Transmitted Data

Message CRC

Plaintext

Keystream = RC4(v,k)

Ciphertext

XOR

v

Received Data

Page 23: Cosc 4765

WEP problems

• WEP uses the RC4 encryption algorithm, which is known as a stream cipher. – A stream cipher operates by expanding a short key into an infinite pseudo-random

key stream. – The sender XORs the key stream with the plaintext to produce ciphertext. – The receiver has a copy of the same key, and uses it to generate identical key

stream. XORing the key stream with the ciphertext yields the original plaintext.• This mode of operation makes stream ciphers vulnerable to several attacks.

– If an attacker flips a bit in the ciphertext, then upon decryption, the corresponding bit in the plaintext will be flipped.

– Also, if an eavesdropper intercepts two ciphertexts encrypted with the same key stream, it is possible to obtain the XOR of the two plaintexts.

– Knowledge of this XOR can enable statistical attacks to recover the plaintexts. – The statistical attacks become increasingly practical as more ciphertexts that use the

same key stream are known. Once one of the plaintexts becomes known, it is trivial to recover all of the others.

Page 24: Cosc 4765

Wi Fi security (2)

• LEAP and EAP– Lightweight Extensible Authentication Protocol

• 802.1x MAC security and authentication– Authentic, then keys can be distributed.

• WPA: Wifi Protected Access– Enterprise Mode – requires authentication server using

RADIUS protocols for authentication and key distribution

– Pre-Shared key mode – doesn't require server, "Shared Secret" is for authentication to access point

– Part of 802.11i draft standard.

Page 25: Cosc 4765

WPA and WPA2

• WPA2 is based on the Robust Security Network (RSN) mechanism• Provides support for all the mechanisms available to

WPA too.• Strong encryption and authentication support for

infrastructure and ad-hoc networks• WPA is limited to infrastructure networks

• Reduced overhead in key derivation during the wireless LAN authentication exchange

• Support for opportunistic key caching to reduce the overhead in roaming between access points

Page 26: Cosc 4765

WPA and WPA2 (2)

• Support for pre-authentication, where a station completes the IEEE 802.1X authentication exchange before roaming

• Support for the CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol) encryption mechanism based on the Advanced Encryption Standard (AES) cipher as an alternative to the TKIP protocol.

• 2006: the WPA2 certification became mandatory for all new equipment certified by the Wi-Fi Alliance, ensuring that any reasonably modern hardware will support both WPA and WPA2.

Page 27: Cosc 4765

Jamming

• DoS attack– 5 or 2.4 GHz Interfering Technology – An attacker with the proper equipment and tools can

easily flood the 2.4 GHz frequency, so that the signal to noise drops so low, that the wireless network ceases to function.

– This can be a risk with even non-malicious intent as more technologies use the same frequencies and cause blocking. Cordless phones, baby monitors, and other devices like Bluetooth that operate on the 2.4 GHz frequency can disrupt a wireless network.

Page 28: Cosc 4765

Bluetooth

• It's a cable-replacement technology– For things like printers, keyboards, mice, monitors, PDAs,

headphones, etc.• It's a standard for wireless devices using the 2.4 Ghz range• The maximum range is 10 meters. Data can be exchanged

at a rate of 1Mbps (up to 2 Mbps in the second generation of the technology). – NOTE: NOT Ethernet or LAN technology

• A frequency hop scheme allows devices to communicate even in areas with a great deal of electromagnetic interference.

• Built-in encryption and verification is provided.

Page 29: Cosc 4765

Bluetooth (2)

• Besides a cable replacement• cell-phones and PDAs

– Comminicate between them, and other devices.– Could allow you purchase things at vending

machines.• You would walk up with your Bluetooth cell-phone

and get a signal from the vending machine allowing you to purchase something without needing money.

Page 30: Cosc 4765

Bluetooth (3)

• Bluetooth hacking (bluejacking)– There are entire web sites devoted to how-to hack

into bluetooth PDAs and cell phones.• http://www.bluejackingtools.com/ • With Bluetooth now included in cars to even

refrigerators. • Bluetooth security is becoming more and more a huge

issue that has yet to be addressed by the security community with any real depth.

– If you have bluetooth device, make sure it is configured correctly.

Page 31: Cosc 4765

Bluetooth configurations

• Discovery mode: Should be OFF.• Leaving discovery on, allows anyone to find your

bluetooth device and to connect to it.• You may not get anything message that someone has

connected. Most phones will be default allow the contact list to be transferred.

• Change the transfer of contacts

as well, to disabled, unless you need

it.

Page 32: Cosc 4765

References• Wireless LAN Alliance• http://en.wikipedia.org/wiki/Wireless_security • IEEE 802.11 wireless LAN working Group• Security of the WEP algorithm

http://www.isaac.cs.berkeley.edu/isaac/wep-faq.html• Wi-Fi Alliance• http://www.networkworld.com/columnists/

2006/091106-wireless-security.html • Computer Networking with internet protocols and

technology, Stallings, Prentice Hall, 2004• http://www.wardrive.net/wardriving/tools/• http://www.iss.net/wireless/WLAN_FAQ.php

Page 33: Cosc 4765

QA&