Overview
Overview
Access™
Networld + Interop
April 29, 2003
David Cohen
Chair, Security Committee
Wi-Fi Alliance
Agenda
2
Agenda
• Deploying WPA
– Enterprise
– Home & Small Office
• WPA Certification
• Wi-Fi Security Timeline
• Summary
– Key takeaways
– Where to get more information
• Panel
• Q&A
3
The Wi-Fi Alliance
4
What is Wi-Fi Protected Access?
(WPA)
• Powerful, standards-based, interoperable
security technology for Wi-Fi networks
• Strong data protection – encryption
• Strong access control – user authentication
• Subset of the 802.11i draft standard and will
maintain forward compatibility
• Software upgradeable to the nearly 700 Wi-Fi
Certified products
5
History of Wi-Fi Security - WEP
6
History of Wi-Fi Security - WEP
7
History of Wi-Fi Security -
alternatives
• Some vendors responded with their own proprietary
solutions
– Some good, some not
– But all were proprietary to that specific brand of gear
• Virtual Private Network (VPN)+ Wi-Fi
– Effective, but:
– Expensive (overkill), not what VPN’s were designed to
do, or what their ROI’s promised
– Still not interoperable
• 802.1X + WEP (Dynamic WEP)
• Market was calling for strong, interoperable Wi-Fi
security
8
The Industry Responds
9
WPA’s technology parts
• User authentication
– 802.1X + Extensible Authentication Protocol
(EAP)
• Encryption
– Temporal Key Integrity Protocol (TKIP)
– 802.1X for dynamic key distribution
– Message Integrity Check (MIC) a.k.a. “Michael”
• WPA = 802.1X + EAP + TKIP + MIC
• Pre-Shared Key for SOHO authentication
10
WPA Design Goals
11
WPA – Exceeding goals
12
How WPA Works - Enterprise
13
How WPA Works - Enterprise
14
How WPA Works - SOHO
Step 1. Enter Step 2. AP checks
matching client’s password.
passwords into If a match,
AP and clients. client joins
network.
If not a
match, client
kept off
network.
•Step 3. Keys
derived & installed.
Client and AP
exchange
encrypted data.
15
How WPA Works – SOHO
16
Deploying WPA – Enterprise -
Hardware
17
Deploying WPA – Enterprise -
Software
18
Deploying WPA – SOHO -
Hardware
19
Deploying WPA – SOHO - Software
20
WPA Certification
21
Wi-Fi Alliance Security Timeline
• 1999 – WEP
• 2003 – Wi-Fi Protected Access (WPA)
• 2004 – WPA2 (802.11i)
22
WPA is a snapshot of 802.11i
(WPA2)
802.11i (WPA2)
802.1X
Other Features
BSS
IBSS
Pre-authentication Wi-Fi Protected
Key hierarchy Access
Key management
Cipher & Authentication Negotiation • Implement key
features today
• Continue work on
Data Privacy Protocols 802.11i
TKIP • Forward and
CCMP backward compatible
23
Summary Comparison
WEP WPA
Encryption Flawed, cracked by Fixes all WEP’s flaws
scientists and hackers
24
Summary
25
Panel discussion and Q & A
26