A Comprehensive Review of 802.11 Wireless LAN Security and The Cisco Wireless Security Suite
A Comprehensive Review of 802.11 Wireless LAN Security and The Cisco Wireless Security Suite
A Comprehensive Review of 802.11 Wireless LAN Security and the Cisco Wireless Security Suite
1. Introduction Since the ratication of the IEEE 802.11b standard in 1999, wireless LANs have become more prevalent. Today, wireless LANs are widely deployed in places such as corporate ofce conference rooms, industrial warehouses, Internet-ready classrooms, and even coffeehouses. These IEEE 802.11-based wireless LANs present new challenges for network administrators and information security administrators alike. Unlike the relative simplicity of wired Ethernet deployments, 802.11-based wireless LANs broadcast radio-frequency (RF) data for the client stations to hear. This presents new and complex security issues that involve augmenting the 802.11 standard. Security in the IEEE 802.11 specicationwhich applies to 802.11b, 802.11a, and 802.11ghas come under intense scrutiny. Researchers have exposed several vulnerabilities in the authentication, data-privacy, and message-integrity mechanisms dened in the specication. This white paper: Reviews the authentication and data-privacy functions described in Clause 8 of the IEEE 802.11 specication Describes the inherent security vulnerabilities and management issues of these functions Explains how security issues can be addressed effectively only by augmenting the 802.11 security standard Examines Cisco Systems architecture for enhanced security on wireless LANsincluding the Cisco Wireless Security Suite Looks ahead to long-term security enhancements
Cisco Systems, Inc. All contents are Copyright 2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement. Page 1 of 39
2. 802.11 Authentication and Its Weaknesses Wireless LANs, because of their broadcast nature, require the addition of: User authentication to prevent unauthorized access to network resources Data privacy to protect the integrity and privacy of transmitted data The 802.11 specication stipulates two mechanisms for authenticating wireless LAN clients: open authentication and shared key authentication. Two other mechanismsthe Service Set Identier (SSID) and authentication by client Media Access Control (MAC) addressare also commonly used. This section explains each approach and its weaknesses. The use of Wired Equivalent Privacy (WEP) keys can function as a type of access control because a client that lacks the correct WEP key cannot send data to or receive data from an access point. WEP, the encryption scheme adopted by the IEEE 802.11 committee, provides encryption with 40 bits or 104 bits of key strength. A subsequent section of this paper discusses WEP and its weaknesses in greater detail. 2.1. Service Set Identifier The SSID is a construct that allows logical separation of wireless LANs. In general, a client must be congured with the appropriate SSID to gain access to the wireless LAN. The SSID does not provide any data-privacy functions, nor does it truly authenticate the client to the access point. 2.2. 802.11 Station Authentication Authentication in the 802.11 specication is based on authenticating a wireless station or device instead of authenticating a user. The specication provides for two modes of authentication: open authentication and shared key authentication. The 802.11 client authentication process consists of the following transactions (Figure 1): 1. Client broadcasts a probe request frame on every channel 2. Access points within range respond with a probe response frame 3. The client decides which access point (AP) is the best for access and sends an authentication request 4. The access point will send an authentication reply 5. Upon successful authentication, the client will send an association request frame to the access point 6. The access point will reply with an association response 7. The client is now able to pass trafc to the access point Figure 1 802.11 Client Authentication Process
1. Probe Request 2. Probe Response 3. Authentication Request 4. Authentication Response 5. Association Request Client 6. Association Response Access Point
Wired Network
The next four subsections will detail each of the individual processes for client authentication.
Cisco Systems, Inc. All contents are Copyright 2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement. Page 2 of 39
Cisco Systems, Inc. All contents are Copyright 2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement. Page 3 of 39
Cisco Systems, Inc. All contents are Copyright 2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement. Page 4 of 39
Open authentication allows any device network access. If no encryption is enabled on the network, any device that knows the SSID of the access point can gain access to the network. With WEP encryption enabled on an access point, the WEP key itself becomes a means of access control. If a device does not have the correct WEP key, even though authentication is successful, the device will be unable to transmit data through the access point. Neither can it decrypt data sent from the access point (Figure 5). Figure 5 Open Authentication with Differing WEP Keys
1. Authentication Request 2. Authentication Response (Success) 3. Association Request/Response 4. WEP Data Frame to Wired Network
Wired Network
Cisco Aironet Access Point WEP Key 112233
Cisco Systems, Inc. All contents are Copyright 2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement. Page 5 of 39
1. Authentication Request 2. Authentication Response (Challenge) 3. Authentication Request (Encrypted Challenge) 4. Authentication Response (Success)
Wired Network
Cisco Aironet Access Point WEP Key 123456
RADIUS
Cisco Systems, Inc. All contents are Copyright 2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement. Page 6 of 39
Cisco Systems, Inc. All contents are Copyright 2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement. Page 7 of 39
Li
st
en
in
Li
e st
ni
ng
Plain-Text Challenge
Attacker (Listening)
XOR
Key Stream
Cipher-Text Response
Cisco Systems, Inc. All contents are Copyright 2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement. Page 8 of 39
3. WEP Encryption and Its Weaknesses WEP is based on the RC4 algorithm, which is a symmetric key stream cipher. As noted previously, the encryption keys must match on both the client and the access point for frame exchanges to succeed. The following section will examine stream ciphers and provide some perspective on how they work and how they compare to block ciphers. 3.1. Stream Ciphers and Block Ciphers A stream cipher encrypts data by generating a key stream from the key and performing the XOR function on the key stream with the plain-text data. The key stream can be any size necessary to match the size of the plain-text frame to encrypt (Figure 11). Figure 11 Stream Cipher Operation
Key Key Stream
Cipher
XOR
Cipher-Text
Plain-Text
Block ciphers deal with data in dened blocks, rather than frames of varying sizes. The block cipher fragments the frame into blocks of predetermined size and performs the XOR function on each block. Each block must be the predetermined size, and leftover frame fragments are padded to the appropriate block size (Figure 12). For example, if a block cipher fragments frames into 16 byte blocks, and a 38-byte frame is to be encrypted, the block cipher fragments the frame into two 16-byte blocks and one six-byte block. The six-byte block is padded with 10 bytes of padding to meet the 16-byte block size. Figure 12 Block Cipher Operation
Key Key Stream
Cipher
XOR
Cipher-Text
Cipher-Text
Cipher-Text
Plain-Text
Cisco Systems, Inc. All contents are Copyright 2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement. Page 9 of 39
The process of encryption described above for stream ciphers and block ciphers is known as Electronic Code Book (ECB) mode encryption. With ECB mode encryption, the same plain-text input always generates the same cipher-text output. As Figure 13 illustrates, the input text of FOO always produces the same cipher-text. This is a potential security threat because eavesdroppers can see patterns in the cipher-text and start making educated guesses about what the original plain-text is. Figure 13 Electronic Code Book Encryption
Key Stream 12345
XOR
Cipher-Text AHGHE
Plain-Text FOO
There are two encryption techniques to overcome this issue: Initialization vectors Feedback modes
Cipher
XOR
Cipher-Text WGSSF
Plain-Text FOO
The IV is a 24-bit value (Figure 15) that augments a 40-bit WEP key to 64 bits and a 104-bit WEP key to 128 bits. The IV is sent in the clear in the frame header so the receiving station knows the IV value and is able to decrypt the frame (Figure 16). Although 40-bit and 104-bit WEP keys are often referred to as 64-bit and 128-bit WEP keys, the effective key strength is only 40 bits and 104 bits, respectively, because the IV is sent unencrypted.
Cisco Systems, Inc. All contents are Copyright 2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement. Page 10 of 39
Octets
IV
ICV 4
Bits
Initialization Vector 24
Pad 6
Key ID 2
IV + Key Stream
Cipher-Text (1st)
Cipher-Text (2nd)
Cisco Systems, Inc. All contents are Copyright 2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement. Page 11 of 39
3.2. Statistical Key DerivationPassive Network Attacks In August 2001, cryptanalysts Fluhrer, Mantin, and Shamir determined that a WEP key could be derived by passively collecting particular frames from a wireless LAN. The vulnerability is how WEP has implemented the key scheduling algorithm (KSA) from the RC4 stream cipher. Several IVs (referred to as weak IVs) can reveal key bytes after statistical analysis. Researchers at AT&T/Rice University as well as the developers of the AirSnort application implemented this vulnerability and veried that WEP keys of either 40- or 128-bit key length can be derived after as few as 4 million frames. For high-usage wireless LANs, this translates to roughly four hours until a 128-bit WEP key is derived. This vulnerability renders WEP ineffective. Using dynamic WEP keys can mitigate this vulnerability, but reactive efforts only mitigate known issues. To eliminate this vulnerability, a mechanism that strengthens the WEP key is required. 3.3. Inductive Key DerivationActive Network Attacks Inductive key derivation is the process of deriving a key by coercing information from the wireless LAN and is also referred to as an active network attack. As mentioned in the section on stream ciphers, encryption is accomplished by performing the XOR function with the stream cipher to produce the cipher-text. Inductive network attacks work on this premise. Man-in-the-middle attacks, a form of inductive key derivation attack, are effective in 802.11 networks because of the lack of effective message integrity. The receiver of a frame cannot verify that the frame was not tampered with during its transmission. In addition, the Integrity Check Value (ICV) used to provide message integrity is based on the 32-bit cyclic redundancy check (CRC32) checksum function. The CRC32 value is vulnerable to bit-ipping attacks, which render it ineffective. With no effective mechanism to verify message integrity, wireless LANs are vulnerable to man-in-the-middle attacks, which include bit-ipping attacks and IV replay attacks.
Cisco Systems, Inc. All contents are Copyright 2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement. Page 12 of 39
Authenticated Client
Li
Internet
st
en
in
Network Attacker
Once a key stream has been derived for a given frame size, it can be grown to any size required. This process is described below and illustrated in Figure 19: 1. The network attacker can build a frame one byte larger than the known key stream size; an Internet Control Message Protocol (ICMP) echo frame is ideal because the access point solicits a response 2. The network attacker then augments the key stream by one byte 3. The additional byte is guessed because only 256 possible values are possible 4. When the network attacker guesses the correct value, the expected response is received: in this example, the ICMP echo reply message 5. The process is repeated until the desired key stream length is obtained Figure 19 Growing a Key Stream
Known Plain-Text ICMP Echo
XOR
Cipher-Text
Key Stream
Network Attacker
Cipher-Text Response
Cisco Systems, Inc. All contents are Copyright 2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement. Page 13 of 39
ICV Pass
Bit-Flipped Frame
CRC Fail
WEP
XOR
Key Stream
Cisco Systems, Inc. All contents are Copyright 2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement. Page 14 of 39
The basis for this attack is the failure of the ICV. The ICV is in the WEP-encrypted portion of the frame, so how is the attacker able to modify it to match the bit-ipped changes to the frame? The process of ipping bits is: 1. A given frame (F1 in Figure 21) has an ICV (C1) 2. A new frame is generated (F2) the same length as F1 with bits set 3. Frame F3 is created by performing the XOR function F1 and F2 4. The ICV for F3 is calculated (C2) 5. ICV C3 is generated by performing the XOR function C1 and C2 Figure 21 ICV Weakness
WEP Frame (F1 and C1) 01011010110101 110
XOR 110 Bits to Flip (F2) 00000011100000 XOR Bit-Flipped Frame (F3) 01011001010101 010 ICV Calculated (C2) ICV 101 New ICV Calculated (C3)
01011001010101
101
3.4. Static WEP Key Management Issues The 802.11 standard does not specify key management mechanisms. WEP is dened to support only static, preshared keys. Because 802.11 authentication authenticates a device and not the user of the device, the loss or theft of a wireless adapter becomes a security issue for the network. The loss of an adapter and the compromising of the existing key presents network administrators with the tedious task of manually rekeying all wireless devices in the network. This task might be acceptable for small deployments but is not realistic in midsize and large deployments in which the number of wireless users can reach into the thousands. Without a mechanism to distribute or generate keys, administrators must watch wireless NICs closely.
Cisco Systems, Inc. All contents are Copyright 2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement. Page 15 of 39
4. Secure 802.11 Wireless LANs with Cisco Wireless Security Suite Cisco recognizes the vulnerabilities in 802.11 authentication and data privacy. To give customers a secure wireless LAN solution that is scalable and manageable, Cisco has developed the Cisco Wireless Security Suite. This suite of security enhancements augments 802.11 security by implementing prestandards enhancements to 802.11 authentication and encryption. Some mistakenly believe WEP to be the only component to wireless LAN security, but wireless security actually consists of three components: The authentication framework The authentication algorithm The data privacy or encryption algorithm All three of these components are included in the Cisco Wireless Security Suite: 802.1X authentication frameworkThe IEEE 802.1X standard provides a framework for many authentication types and the link layer Extensible Authentication Protocol (EAP) Cisco authentication algorithmThe EAP Cisco Wireless authentication type, also called Cisco LEAP supports centralized, user-based authentication with the ability to generate dynamic WEP keys Temporal Key Integrity Protocol (TKIP)Cisco has implemented two components to augment WEP encryption: Message Integrity Check (MIC)The MIC function provides effective frame authenticity to mitigate man-in-the-middle vulnerabilities Per-Packet KeyingPer-packet keying provides every frame with a new and unique WEP key that mitigates WEP key derivation attacks Broadcast Key RotationDynamic key rotation for broadcast and multicast trafc. 4.1. Cisco Wireless Security Suite Components
Method Layer
802.1x
802.1x Layer
802.3 Ethernet
Link Layer
Cisco Systems, Inc. All contents are Copyright 2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement. Page 16 of 39
802.1X requires three entities: The supplicantResides on the wireless LAN client The authenticatorResides on the access point The authentication serverResides on the RADIUS server These entities are logical entities on the network devices. The authenticator creates a logical port per client, based on the clients association ID (AID). This logical port has two data paths. The uncontrolled data path allows network trafc through to the network. The controlled data path requires successful authentication to allow network trafc through (Figure 23). Figure 23 802.1X Ports
Authenticator System 1
Controlled Port Uncontrolled Port
Authenticator System 2
Controlled Port Uncontrolled Port
Port Unauthorized
Port Authorized
LAN
LAN
The supplicant becomes active on the medium and associates to the access point. The authenticator detects the client association and enables the supplicants port. It forces the port into an unauthorized state so that only 802.1X trafc is forwarded. All other trafc is blocked. The client may send an EAP Start message, although client initiation is not required (Figure 24). The authenticator replies with an EAP Request Identity message back to the supplicant to obtain the clients identity. The supplicants EAP Response packet containing the clients identity is forwarded to the authentication server. The authentication server is congured to authenticate clients with a specic authentication algorithm. Currently, 802.1X for 802.11 LANs does not stipulate a specic algorithm to use. However, this paper focuses on Cisco LEAP authentication and assumes that Cisco LEAP credential verication occurs. The end result is a RADIUS -ACCEPT or RADIUS-REJECT packet from the RADIUS server to the access point. Upon receiving the RADIUS ACCEPT packet, the authenticator transitions the clients port to an authorized state, and trafc may be forwarded.
Cisco Systems, Inc. All contents are Copyright 2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement. Page 17 of 39
Derive Key
Access Point Sends Client Broadcast Key, Encrypted with Session Key
802.1X provides the means for a wireless LAN client to communicate with an authentication server to validate the client credentials. 802.1X is extensible and allows a variety of authentication algorithms to operate over it.
Cisco Systems, Inc. All contents are Copyright 2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement. Page 18 of 39
4.1.2.3. Dynamic WEP Keys User-based mutual authentication provides an easy-to-administer and secure authentication scheme, yet a mechanism is still needed to manage WEP keys efciently. This need has driven the requirement for the authentication algorithm to generate keying material for dynamic WEP keys. Cisco LEAP employs its user-based nature to generate unique keying material for each client. This relieves network administrators from the burden of managing static keys and manually rekeying as needed. 802.1X session timeouts force the client to reauthenticate to maintain network connectivity. Although reauthentication is transparent to the client, the process of reauthentication in an algorithm that supports dynamic WEP will generate new WEP keys at every reauthentication interval. This is an important feature in mitigating statistical key derivation attacks and is critical for Cisco WEP enhancements (described in detail later).
WEP Encrypted
Cisco Systems, Inc. All contents are Copyright 2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement. Page 19 of 39
WEP Encrypted
The sequence number is a sequential counter that increases in value on a per-frame, per-association basis. The access point will discard frames received that have an out-of-order sequence number. The MIC eld is calculated based on the elds in Figure 27. Figure 27 MIC Value Derivation
Seed
DA
SA
LLC
SNAP
SEQ
Payload
MMH Hash
4bite MIC
Modications to any of the elds will result in a discrepancy in the calculated MIC on the receiver. As a result, the receiver will drop the frame. The MIC is currently a prestandards implementation. Although it is included in the IEEE 802.11 Task Group i draft, all wireless LAN vendors have not adopted it. As a result, the MIC requires the use of Cisco clients and access points. 4.1.3.2. Per-Packet Keying The vulnerabilities described in the Fluhrer, Mantin, and Shamir, paper as well as the AirSnort tool, which can implement an attack, render WEP ineffective for data privacy and encryption. Using WEP key rotation schemes via 802.1X reauthentication can mitigate the vulnerabilities but does not provide resolution for the weaknesses. The IEEE has adopted into the Task Group i draft a WEP enhancement that changes the transmit WEP key on a per-packet basis. Cisco was instrumental in devising and co-developing this enhancement and has implemented it on Cisco clients and access points. In a Cisco implementation of 802.11 WEP encryption, an IV is generated randomly and concatenated with the WEP key. The two values are processed by the WEP algorithm to generate the key stream. The key stream is mixed with the plain-text to generate the cipher-text. The Cisco implementation of per-packet keying augments the process by hashing the WEP key and the IV to create a new packet key. The original IV is then concatenated with the packet key and processed normally (Figure 28).
Cisco Systems, Inc. All contents are Copyright 2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement. Page 20 of 39
HASH
XOR
Cipher-Text
Packet Key
WEP
Key Stream
To effectively use the 24-bit IV space, Cisco has also adopted IV sequencing. Cisco client and access points implement IV sequencing by simply starting the IV counter and increasing the IV value by one for each frame. If the client and access point both initiate their IV counters at zero, the client and access point will be sending the same IV/base WEP keys through the hashing algorithm and generating the same packet keys. To overcome this problem, the Cisco IV sequencing is directional. For example, client-to-access-point frames may use an even-numbered IV, and access-point-to-client frames may use an odd-numbered IV. Per-packet keying will not generate the same packet key as long as unique IV/base WEP key pairs are used. With a static WEP key, this only allows for 224 possible unique packet keys. Because the IV space recycles when it is exhausted, IV/base WEP key pairs will be reused. To get around this limitation, the base WEP key should be changed before the IV space is used. Cisco LEAP session timeouts accommodate this requirement. Once the base WEP key is changed, new IV/base WEP key pairs are used, and unique packet keys will be generated. 4.1.3.3. Broadcast Key Rotation 802.1X authentication types that support user-based WEP keys provide WEP keys for unicast trafc only. To provide encryption for broadcast and multicast trafc, the Cisco Wireless Security Suite requires that one of two options be selected: Employ a static broadcast key congured on the access point Enable broadcast key rotation for dynamic broadcast key generation A static broadcast key must be congured on an access point for 802.1X clients to receive broadcast and multicast messages. In wireless LAN deployments in which Cisco TKIP enhancements are implemented, a static broadcast key will go through the per-packet keying process. This reduces the opportunity for statistical key derivation attacks, but because the base broadcast key remains static, the IV space will recycle, causing key streams to be reused. Statistical attacks may take much longer to execute, but they are still possible. Static broadcast key deployments might be required in some instances. Broadcast keys are sent from the access point to the client encrypted with the clients unicast WEP key. Because the broadcast keys are distributed after authentication, access points do not have to be congured with the same broadcast key.
Cisco Systems, Inc. All contents are Copyright 2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement. Page 21 of 39
Cisco recommends enabling broadcast key rotation on the access points. The access point generates broadcast WEP keys using a seeded pseudorandom number generator (PRNG). The access point rotates the broadcast key after a congured broadcast WEP key timer expires. This process should generally be in sync with the timeouts congured on the RADIUS servers for user reauthentication. Broadcast key rotation is designed for 802.1X-enabled access point deployments. In mixed static WEP/802.1X deployments, broadcast key rotation may cause connectivity problems in static WEP clients. Therefore, Cisco recommends that broadcast key rotation be enabled when the access point services an 802.1X exclusive wireless LAN. 5. Cisco LEAP Architecture The EAP Cisco Wireless or Cisco LEAP algorithm provides user-based mutual authentication. It also provides keying material to the client and RADIUS server for the generation of WEP keys. This section will examine Cisco LEAP, from protocol message exchanges to how to implement the algorithm on RADIUS servers, access points, and client devices. 5.1. Cisco LEAP Authentication Process Cisco LEAP is a user-based authentication algorithm that is secure enough to implement in hostile wireless LAN deployments. Based on these user requirements, and the need for single-sign-on (SSO) capabilities, Cisco built Cisco LEAP around the premise of Microsoft Challenge Handshake Authentication Protocol (MS-CHAP). Cisco LEAP is a password-based algorithm. It preserves the integrity of the password during wireless authentication by converting the password to a secret key value so that wireless eavesdroppers cannot sniff Cisco LEAP authentication and see a users password transmitted across the wireless link. The secret key value is the result of a mathematical function called a hash function. A hash function is an algorithm that one-way encrypts data. The data cannot be decrypted to derive the original input. Cisco LEAP uses secrets in the form of the Microsoft NT key format. The Windows NT key is a Message Digest Algorithm 4 (MD4) hash of an MD4 hash of the users password (Figure 29). Figure 29 Windows NT Key
Password
Password Hash
MD4
MD4
Password Hash
NT Key
Use of the Windows NT key allows Cisco LEAP to use existing Windows NT Domain Services authentication databases as well as Windows 2000 Active Directory databases. In addition, any Open Database Connectivity (ODBC) that uses MS-CHAP passwords can also be used.
Cisco Systems, Inc. All contents are Copyright 2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement. Page 22 of 39
Cisco has developed drivers for most versions of Microsoft Windows (Windows 95, 98, Me, 2000, NT and XP) and uses the Windows logon as the Cisco LEAP logon. A software shim in the Windows logon allows the username and password information to be passed to the Cisco Aironet client driver. The driver will convert the password into a Windows NT key and hand the username and Windows NT key to the Cisco NIC. The NIC executes 802.1X transactions with the AP and the authentication, authorization, and accounting (AAA) server. Note: Neither the password nor the password hash is ever sent across the wireless medium. Reauthentication and subsequent WEP key derivation follow a similar process. The transaction WEP-encrypted with the existing client WEP key and clients port on the access point does not transition to a blocking state. It will remain in the forwarding state until the client explicitly sends an EAP Logoff message or fails reauthentication. 5.2. Cisco LEAP Deployment Cisco designed Cisco LEAP to provide strong, easy-to-deploy, and easy-to-administer wireless security. Cisco offers third-party NIC support and RADIUS support to allow customers to use their existing investments in wireless clients as well as existing RADIUS servers. In addition, Cisco provides deployment best practices guidance to ensure customer success with Cisco Aironet products and the Cisco LEAP algorithm.
Cisco Systems, Inc. All contents are Copyright 2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement. Page 23 of 39
5.2.2.1. Use Strong Passwords for LEAP Authentication Cisco LEAP is a password-based algorithm. To minimize the possibility of a successful dictionary attack, use strong passwords, which are difcult to guess. Some characteristics of strong passwords include: A minimum of ten characters A mixture of uppercase and lowercase letters At least one numeric character or one non-alphanumeric character (Example: !#@$%) No form of the users name or user ID A word that is not found in the dictionary (domestic or foreign) Examples of strong passwords: cnw84FriDAY, from cannot wait for Friday 4yosc10cP!, from for your own safety choose 10 character password! 5.2.2.2. Avoid Using MAC and Cisco LEAP Authentication on the Same RADIUS Server In scenarios where MAC address authentication uses the same ACS as Cisco LEAP, be sure that the MAC address has a separate MS-CHAP strong password. If a MAC address has been congured on an ACS that supports Cisco LEAP and MAC authentication, the MAC address should use a different strong password for the required MS-CHAP/CHAP eld. If not, an eavesdropper can spoof a valid MAC address and use it as a username and password combination for Cisco LEAP authentication. 5.2.2.3. Use RADIUS Session Timeouts to Rotate WEP Keys Cisco LEAP and EAP Transport Layer Security (TLS) support session expiration and 802.1X reauthentication by using the RADIUS session timeout option (RADIUS Internet Engineering Task Force option 27). To avoid IV reuse (IV collisions), rotate the base WEP key before the IV space is exhausted. For example, the worst-case scenario for a reauthentication time would be stations in a service set running at maximum packet rate (in 802.11 stations, this is 1000 frames per second). 2^24 frames (16,777,216) / 1000 frames per second ~= 16,777 seconds or 4 hours 40 minutes. Normal frame rates will vary by implementation, but this example serves as a guideline for determining the session timeout value. 5.2.2.4. Deploy Cisco LEAP on a Separate Virtual LAN (VLAN) Deploying Cisco LEAP wireless LAN users on a separate VLAN allows Layer 3 access lists to be applied to the wireless LAN VLAN if required, without affecting wired clients. In addition, intrusion-detection systems can be installed on wireless LAN VLANs to monitor wireless LAN trafc.
Cisco Systems, Inc. All contents are Copyright 2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement. Page 24 of 39
6. What Lies Ahead WEP encryption and 802.11 authentication are known to be weak. The IEEE is enhancing WEP with TKIP and providing robust authentication options with 802.1X to make 802.11-based wireless LANs secure. At the same time, the IEEE is looking to stronger encryption mechanisms. The IEEE has adopted the use of the Advanced Encryption Standard (AES) to the data-privacy section of the proposed 802.11i standard. 6.1. AES Overview The Advanced Encryption Standard (AES) is the next-generation encryption function approved by the National Institute of Standards and Technology (NIST). NIST solicited the cryptography community for new encryption algorithms. The algorithms had to be fully disclosed and available royalty free. The NIST judged candidates on cryptographic strength as well as practical implementation. The nalist, and adopted method, is known as the Rijndael algorithm. Like most ciphers, AES requires a feedback mode to avoid the risks associated with ECB mode. The IEEE is deciding which feedback mode to use for AES encryption. The two contenders are: Offset code book (OCB) Cipher block chaining counter mode (CBC-CTR) with cipher block chaining message authenticity check (CBC-MAC), collectively known as CBC-CCM The two modes are similar but differ in implementation and performance.
Cisco Systems, Inc. All contents are Copyright 2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement. Page 25 of 39
M[1]
M[2]
M[m1]
M[m]
len Nonce
Checksum
L(1)
Offset
Offset
Offset
Offset
Offset
AES
AES
AES
AES
AES
AES
FullTag
prefix
C[1]
C[2]
C[m1]
C[m]
Tag
Refer to OCB Mode for a more detailed description of AES OCB mode. OCB mode also includes a MIC function. The MIC is calculated by performing the XOR function on the following values: All plain-text blocks except the nal one The nal plain-text block with the XOR function performed with the appropriate offset value The nal cipher-text block The nal offset value The result from this XOR function is AES-encrypted using the AES key. The rst 64 bits of the resulting 128-bit output is the MIC value inserted into the AES-encrypted frame (Figure 31). Note that the MIC is not included in the encrypted portion of the frame. Encrypting the MIC is not required because MIC itself is the result of AES encryption. Figure 31 AES-Encrypted Frame
Encrypted (Note)
Replay Counter 4
MAC Service Data Unit (MSDU) Data Protocol Data Unit (PDU) >=1
MIC 8
AES-OCB is a new mode, which is an inherent weakness in the eyes of the cryptographic community. But the author of the mode, Phil Rogaway, has cryptographically proven the strength of the mode and is also a well-respected member of the cryptography community. OCB mode is known to be efcient and fast. One major benet is that the MIC can be calculated in the same processing function as the encryption, minimizing encryption overhead and maximizing data throughput.
Cisco Systems, Inc. All contents are Copyright 2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement. Page 26 of 39
AES
Key Stream
AES
Key Stream
AES
Key Stream
Key
XOR
Cipher-Text (1)
Key
XOR
Cipher-Text (2)
Key
XOR
Cipher-Text (N)
Plain-Text (1)
Plain-Text (2)
Plain-Text (N)
CBC-MAC operates by using the result of CBC encryption over frame length, destination address, source address, and data. The resulting 128-bit output is truncated to 64 bits for use in the transmitted frame. AES-CCM uses cryptographically known functions but has the weakness of requiring two operations for encryption and message integrity. This is computationally expensive and adds a signicant amount of overhead to the encryption process.
Cisco Systems, Inc. All contents are Copyright 2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement. Page 27 of 39
7. Summary Wireless LAN deployments should be made as secure as possible. Standard 802.11 security is weak and vulnerable to numerous network attacks. This paper has highlighted these vulnerabilities and described how the Cisco Wireless Security Suite can augment 802.11 security to create secure wireless LANs. Some Cisco security enhancement features might not be deployable in some situations because of device limitations such as application specic devices (ASDs such as 802.11 phones capable of static WEP only) or mixed vendor environments. In such cases, it is important that the network administrator understand the potential WLAN security vulnerabilities. Cisco strives to educate and inform customers and clients about Cisco wireless LAN solutions, and to provide design and deployment guidance to allow them to make decisions that best suit their needs. Cisco recommends using the Cisco Wireless Security Suite to provide wireless LAN users with the most secure environment possibleabandoning legacy authentication and encryption, wherever possible, in favor of strong authentication and encryption. Cisco is committed to providing customers with interoperable wireless LAN solutions. The Cisco Wireless Security Suite offers many prestandard features that will be upgradeable to interoperable versions once the standards are ratied. This arrangement allows for deployment of secure wireless LANs today with the prospect of interoperable wireless LANs tomorrow.
Cisco Systems, Inc. All contents are Copyright 2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement. Page 28 of 39
8. Appendix AEAP Authentication Types 8.1. EAP Transport Layer Security EAP Transport Layer Security (TLS) (RFC2716) is a Microsoft-supported EAP authentication algorithm based on the TLS protocol (RFC2246). TLS is the current version of Secure Socket Layer (SSL) used in most Web browsers for secure Web application transactions. TLS has proved to be a secure authentication scheme and is now available as an 802.1X EAP authentication type. EAP-TLS is supported in the Microsoft XP platform, and support is planned for legacy Microsoft operating systems as well. Including a supplicant on the client operating system eases deployment and alleviates single-vendor constraints.
Martha
George
Cisco Systems, Inc. All contents are Copyright 2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement. Page 29 of 39
Digital certicates are data structures distributed by a certicate authority that join a public key to a user. A digital certicate is generally made up of the following pieces of information: Certicate version Serial number Certicate issuer User Users public key Validity period Optional extensions Signature algorithm Signature The digital signature is derived by combining the certicate version, serial number, issuer, user, users public key, and validity period and running the values through a keyed hash function. The certicate authority keys the hash with its own private key (Figure 34). Figure 34 Digital Signature
Version Number Serial Number Issuer User Users Public Key Validity Period Certificate Authoritys Private Key Hash Digital Signature
Cisco Systems, Inc. All contents are Copyright 2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement. Page 30 of 39
Access Point Sends Client Broadcast Key, Encrypted with Session Key
Cisco Systems, Inc. All contents are Copyright 2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement. Page 31 of 39
8.2. EAP SIM Architecture The EAP subscriber identity module (SIM) authentication algorithm is designed to provide per-user/per-session mutual authentication between a wireless LAN (WLAN) client and an AAA server. It also denes a method for generating the master key used by the client and AAA server for the derivation of WEP keys. The Cisco implementation of EAP SIM authentication is based on the most recent IEEE draft protocol. This section will take a closer look at EAP SIM, from protocol message exchanges to how to implement EAP SIM on the AAA servers, access points, and client devices.
Cisco Systems, Inc. All contents are Copyright 2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement. Page 32 of 39
802.1X authentication using Cisco implementation of EAP SIM proceeds as follows (Figure 36): 1. An EAP-over-LAN (EAPOL) Start message from the client starts the authentication protocol and indicates to the access point that the client wants to authenticate using EAP. 2. In response, the access point sends an EAP Identity Request message to the client. At this point, the client has not yet been assigned an IP address, and the access point blocks all messages from the client except for those necessary for authentication (EAP and EAP SIM protocol messages). 3. The client responds to the access points request with an EAP Identity Response message containing the users network identity. This identity is read from the SIM card, using a card reader attached to (or incorporated into) the client. It is of the form 0<IMSI>@<realm>, where <IMSI> is the International Mobile Subscriber Identity (as used in GSM networks) and <realm> is the operators domain name string (voicestream.com, for example). The network identity is stored on the SIM and determined by the service provider; it may differ from the users login credentials and is used mainly to authenticate access to the WLAN. 4. The access point forwards the EAP Identity Response to the AAA server using a RADIUS protocol message with Cisco vendor-specic attributes. 5. The AAA server determines that the user intends to use EAP SIM authentication based on its conguration parameters or on the identity passed to it and invokes its EAP SIM extension code. This code then starts the EAP SIM extension protocol by sending an EAP SIM Start request back to the client. It may also generate a GetAuthInfo message to the AuC requesting a (congurable) number of GSM triplets; this step may be delayed until after a response to the EAP SIM Start message is received to ensure that the client indeed supports the EAP SIM protocol. Note: Depending on the realm (domain) contained in the identity string, the AAA request might need to be proxied from the local AAA server to the service providers AAA server. 6. The GetAuthInfo message is routed to the Internet Transfer Point Mobile Application Part (ITP MAP) proxy, which acts as a gateway to the service providers SS7 network. The ITP translates the request into a standard GSM MAP GetAuth request before sending it to the AuC. 7. On receiving the EAP SIM Start request, the client reads a 128-bit (16-byte) random number generated on the SIM and passes it back to the AAA server in the EAP SIM Start response. 8. Once the AAA server has received the clients EAP SIM Start response and the response from the AuC containing a sufcient number of GSM triplets (typically two to three), it then constructs an EAP SIM Challenge message that contains the random numbers (RAND) received from the AuC and a 160-bit (20-byte) message-authentication code (MAC_RAND). 9. The client passes the EAP SIM Challenge request to the SIM card, which rst calculates its own MAC_RAND. The AAA server is validated if the result matches the MAC_RAND received from the server. Only in that case, the SIM also calculates the GSM result (SRES) and encryption key (Kc) for each of the RANDs it received, as well as a 160-bit (20-byte) message-authentication code (MAC_SRES) based on these results and the user identity. Only MAC_SRES is returned to the AAA server (and therefore exposed on the radio link) in the EAP SIM Challenge response. The SIM also calculates cryptographic keying material, using a secure hash function on the user identity and the GSM encryption keys, for the derivation of session encryption keys.
Cisco Systems, Inc. All contents are Copyright 2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement. Page 33 of 39
10. When the AAA server receives the clients EAP SIM Challenge response, it calculates its own MAC_SRES and compares it to the one received from the client. If both match, the client is authenticated and the AAA server also calculates the session encryption keys. It then sends a RADIUS ACCEPT message to the access point, which contains an encapsulated EAP Success message and the (encrypted) client session key. 11. The access point installs the session key for the clients association ID and forwards the EAP Success message to the client. It then sends its broadcast key, encrypted with the clients session key, in an EAP Key message to the client. It also unblocks the data path for the client so that IP trafc can ow between the client and the rest of the network. 12. Upon receiving the EAP Success message, the EAP SIM supplicant returns the session encryption key calculated by the SIM to the EAP framework, which installs it on the clients WLAN radio card. 13. The client is now able to securely send and receive network trafc. Figure 36 EAP SIM Authentication
Client Cisco Aironet Access Point RADIUS Server Authentication Center (AuC)
Start Request Identity 1IMSI@realm SIM-Start Random MAC_RAND Pass? Server Authenticated SIM-Challenge
Access Point Blocks All Requests Until Authentication Completes 1IMSI@realm SIM-Start Random GetAuthInfo Triplets
SIM-Challenge
Derive Key
Access Point Sends Client Broadcast Key, Encrypted with Session Key
Note: The clients session key is never sent across the radio link and can therefore not be snooped by network attackers listening in on the message trafc. Similarly, the results of the GSM authentication algorithm (SRES, Kc) are never exposed to listeners over the radio link. EAP SIM, therefore, exposes even less information to network attackers than the standard GSM authentication for wireless phones. All message authentication codes described above are calculated using a secure keyed hashing algorithm, HMAC-SHA1 (steps 4 and 5). A hash function is an algorithm that one-way encrypts data so that it cannot be decrypted to derive the original input data. The algorithm uses the users identity, the random number generated by the SIM, the GSM encryption keys Kc, and other data to calculate the authentication codes and encryption keys used in EAP SIM.
Cisco Systems, Inc. All contents are Copyright 2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement. Page 34 of 39
The Cisco implementation of EAP SIM is particularly secure because the results of the GSM authentication algorithm (SRES, Kc) never leave the SIM and therefore remain inaccessible even if network attackers manage to compromise the EAPSIM supplicant code. This is made possible by a partnership between Cisco and Gemplus, a world leader in Smartcard technology and leading supplier of SIM chips to the GSM industry. Other implementations of EAP SIM, using standard GSM SIM chips or software-based SIM emulators, are possible but are inherently less secure than the Cisco solution. 8.3. Protected EAP Protected EAP (PEAP), is a draft EAP authentication type that is designed to allow hybrid authentication. PEAP employs server-side PKI authentication. For client-side authentication, PEAP can use any other EAP authentication type. Because PEAP establishes a secure tunnel via server-side authentication, non-mutually authenticating EAP types can be used for client-side authentication, such as EAP generic token card (GTC) for one-time passwords (OTP), and EAP MD5 for password based authentication. PEAP is based on server-side EAP-TLS, and it addresses the manageability and scalability shortcomings of EAP-TLS. Organizations can avoid the issues associated with installing digital certicates on every client machine as required by EAP-TLS and select the method of client authentication that best suits them.
Cisco Systems, Inc. All contents are Copyright 2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement. Page 35 of 39
Server Certificate
Server Certificate
Client-Side Authentication
Access Point Sends Client Broadcast Key, Encrypted with Session Key
Cisco Systems, Inc. All contents are Copyright 2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement. Page 36 of 39
9. Appendix BCisco Wireless Security Suite in Bridging Deployments The authentication and TKIP WEP enhancements are primarily focused on addressing infrastructure basic service sets. Cisco recognizes the need for enhanced security in point-to-point and point-to-multipoint bridging environments and has added features to the bridge rmware to allow wireless bridge links to take advantage of Cisco LEAP authentication and TKIP WEP enhancements. Figure 38 illustrates a typical point-to-point bridging scenario. The root bridge is congured to support 802.1X authentication and the TKIP WEP enhancements, including per-packet keying, the MIC, and broadcast key rotation. Figure 38 Cisco LEAP and TKIP and Bridge Links
Corporate Network
RADIUS Servers
Remote Network
The non-root bridge is statically congured with a username and password. The non-root bridge must also be congured to support per-packet keying and the MIC function. As with a NIC-based client, the broadcast key will be sent via the wireless link to the non-root bridge, encrypted with the dynamic WEP key of the non-root bridge. Enabling Cisco LEAP and TKIP WEP enhancements allows the wireless bridge link to use dynamic WEP keys with administrator-controlled reauthentication (and WEP rekey) intervals.
Cisco Systems, Inc. All contents are Copyright 2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement. Page 37 of 39
10. Appendix CUseful Links Cisco Wireless LAN Security Web site http://www.cisco.com/go/aironet/security Cisco Aironet Wireless LAN Security Overview http://www.cisco.com/en/US/products/hw/wireless/ps430/prod_brochure09186a00801f7d0b.html SAFE: Wireless LAN Security in Depth http://www.cisco.com/en/US/netsol/ns340/ns394/ns171/ns128/networking_solutions_white_paper09186a008009c8b3.shtml Your 802.11 Wireless Network Has No Clothes http://www.cs.umd.edu/%7Ewaa/wireless.pdf Cisco response to Your 802.11 Wireless Network Has No Clothes http://www.cisco.com/en/US/products/hw/wireless/ps430/prod_bulletin09186a008009246e.html An Initial Security Analysis of the IEEE 802.1x Standard http://www.cs.umd.edu/~waa/1x.pdf Authentication with 802.1x and EAP Across Congested WAN Links http://www.cisco.com/en/US/products/hw/wireless/ps430/products_white_paper09186a00800a9e8e.shtml IEEE 802.11 Working Group Web site http://grouper.ieee.org/groups/802/11/
Cisco Systems, Inc. All contents are Copyright 2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement. Page 38 of 39
Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 526-4100
European Headquarters Cisco Systems International BV Haarlerbergpark Haarlerbergweg 13-19 1101 CH Amsterdam The Netherlands www-europe.cisco.com Tel: 31 0 20 357 1000 Fax: 31 0 20 357 1100
Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA www.cisco.com Tel: 408 526-7660 Fax: 408 527-0883
Asia Pacic Headquarters Cisco Systems, Inc. Capital Tower 168 Robinson Road #22-01 to #29-01 Singapore 068912 www.cisco.com Tel: +65 6317 7777 Fax: +65 6317 7799
Cisco Systems has more than 200 ofces in the following countries and regions. Addresses, phone numbers, and fax numbers are listed on the
C i s c o We b s i t e a t w w w. c i s c o . c o m / g o / o f f i c e s
Argentina Australia Austria Belgium Brazil Bulgaria Canada Chile China PRC Colombia Costa Rica Croatia Czech Republic Denmark Dubai, UAE Finland France Germany Greece Hong Kong SAR Hungary India Indonesia Ireland Israel Italy Japan Korea Luxembourg Malaysia Mexico The Netherlands New Zealand Norway Peru Philippines Poland Portugal Puerto Rico Romania Russia Saudi Arabia Scotland Singapore Slovakia Slovenia South Africa Spain Sweden S w i t z e r l a n d Ta i w a n T h a i l a n d Tu r key U k r a i n e U n i t e d K i n g d o m U n i t e d S t a t e s Ve n e z u e l a Vi e t n a m Z i m b a b w e
All contents are Copyright 19922003 Cisco Systems, Inc. All rights reserved. Aironet, Cisco, Cisco IOS, Cisco Systems, and the Cisco Systems logo are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. All other trademarks mentioned in this document or Web site are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (0304R) 10.03 rev.1 BW8282