m White Paper madge Wireless LAN Security Copyright@ 2002-2003 Madge Limited. All rights reserved
White Paper Wireless LAN Security Copyright © 2002-2003 Madge Limited. All rights reserved
Introduction s wireless LANs become widely deployed, and the business benefits become clear, concern has grown over their security. This white paper details these concerns and discusses advanced technologies that resolve the issues to produce robust security solutions. The key topics of ncryption and authentication are defined in some depth Recommendations are made on deploying enterprise class wireless LANs that are standards-compliant scalable, manageable and extensible to encompass new technologies as they emerge 2 Why is security so important? Why is there so much apprehension over security of wireless LAN technology? It all stems from the open nature of the wireless media. To connect to a wired LAN you need physical access, you have connect a PC into a live network port. With wireless you only need to be in the coverage area of an aerial (i. e. within range of an Access Point). Control for wired networks is simpler: traditional hysical access control into buildings can be used and unused network ports can be disabled by management application Wireless LANs use radio waves which pass through many modern building materials and thus coverage is not limited to the inside of a building the radio waves appear in the street where transmissions from Wireless LANs can be monitored by an eavesdropper with suitable quipment. Access to a corporate network can be achieved from outside a building using readily vailable technology Figure 1 shows how an eavesdropper can gain access to a wireless LAN from outside of an office building The solution is to implement a robust security network. For example use encryption to prevent an eavesdropper from understanding any intercepted transmissions and use strong authentication schemes to prevent unauthorised network access Wired Network LAN 3需 Blue area denotes Eaves Coverage LAN Clic s LAN Client Office Building Wireless LAN Client Figure 1: Eavesdropping example WWP-001 Copyright@ 2002-2003 Madge Limited. All rights reserved
1 Introduction As wireless LANs become widely deployed, and the business benefits become clear, concern has grown over their security. This white paper details these concerns and discusses advanced technologies that resolve the issues to produce robust security solutions. The key topics of encryption and authentication are defined in some depth. Recommendations are made on deploying enterprise class wireless LANs that are standards-compliant, scalable, manageable and extensible to encompass new technologies as they emerge. 2 Why is security so important? Why is there so much apprehension over security of wireless LAN technology? It all stems from the open nature of the wireless media. To connect to a wired LAN you need physical access, you have to connect a PC into a live network port. With wireless you only need to be in the coverage area of an aerial (i.e. within range of an Access Point). Control for wired networks is simpler: traditional physical access control into buildings can be used and unused network ports can be disabled by management application. Wireless LANs use radio waves which pass through many modern building materials and thus coverage is not limited to the inside of a building. The radio waves appear in the street where transmissions from Wireless LANs can be monitored by an eavesdropper with suitable equipment. Access to a corporate network can be achieved from outside a building using readily available technology. Figure 1 shows how an eavesdropper can gain access to a wireless LAN from outside of an office building. The solution is to implement a robust security network. For example use encryption to prevent an eavesdropper from understanding any intercepted transmissions and use strong authentication schemes to prevent unauthorised network access. Wired Network LAN Office Building Wireless LAN Client Wireless LAN Client Eavesdropper Wireless LAN Client Access Point (AP) Blue area denotes AP coverage Figure 1: Eavesdropping example WWP-001 Copyright © 2002-2003 Madge Limited. All rights reserved. Page 1
3 Weaknesses in 802.11 security he IEEE 802.11 standard defines wired Equivalent Privacy(WEP) to protect wireless transmissions WEP employs the RC4 symmetric stream cipher using an encryption key that is shared by all participants in the wireless network. 802.11 defines 64-bit WeP keys but most suppliers also support 128-bit keys. 802.11 does not define how keys are distributed. A WEP key consists of two parts: a 24-bit Initialisation Vector(Iv and a secret key. The Iv is transmitted in plain text in the headers of 802.11 packets and can therefore be easily intercepted Armed with the Iv there are well-documented techniques available to"crack" WEP encrypted transmissions given sufficient sample data. The solution is to use dynamic Wep keys that change frequently The 802. 11 standard defines very basic wireless client authentication that also uses the WeP key. The industry has adopted the 802.1x authentication framework(see section 7 entitled"Wireless Authentication" ) to overcome the deficiencies of the 802.11 standard. Recently the University of Maryland has documented potential security risks with the 802. 1x protocol. Today's solution is to use mutual authentication to prevent "man in the middle"attacks and dynamic WEP keys that are distributed over secure, encrypted channels. Both these techniques are supported by the Transport Layer Security (tLs) protocol. Further enhancements include per-packet keying and message integrity checks-these are proposed enhancements to the 802 1 1i security standard 4 Madge Wireless LAN architecture The Madge wireless LAN architecture consists of three components: Wireless Clients, which communicate with Access Points, which in turn can communicate with and can be controlled by Access Servers. Wireless clients are typically laptop computers with a wireless Network Interface Card(NIC) installed to allow access to the wireless network. An Access Point(AP)provides radio coverage to a particular area(known as a cell)and connects to the wired network. Both 802. 11b (11Mbps LANs at 2.4 GHz) and Bluetooth APs are supported An Access Server (i.e. the Enterprise Access server or EAs)provides control, management and advanced security features to the Enterprise wireless network Wireless-side 802.11 Corporate Switched or Routed Access Point Intranet Network Enterprise Access server cts as gateway for all wired to wireless Bluetooth 802.11 Access point Access Point Figure 2: Enterprise Access Server in Gateway Mode A Madge wireless infrastructure can be connected to existing wired networks in a number of ways. Common architectures include deploying the EAs in " Gateway Mode"or "Controller Mode". In Gateway Mode(see figure 2 above) the EAs is placed between the AP network and the rest of the enterprise network. The Eas therefore controls all traffic flow between the wired and wireless networks and acts as a firewall WWP-001 Copyright@ 2002-2003 Madge Limited. All rights reserved Page 2
3 Weaknesses in 802.11 security The IEEE 802.11 standard defines Wired Equivalent Privacy (WEP) to protect wireless transmissions. WEP employs the RC4 symmetric stream cipher using an encryption key that is shared by all participants in the wireless network. 802.11 defines 64-bit WEP keys but most suppliers also support 128-bit keys. 802.11 does not define how keys are distributed. A WEP key consists of two parts: a 24-bit Initialisation Vector (IV) and a secret key. The IV is transmitted in plain text in the headers of 802.11 packets and can therefore be easily intercepted. Armed with the IV there are well-documented techniques available to “crack” WEP encrypted transmissions given sufficient sample data. The solution is to use dynamic WEP keys that change frequently. The 802.11 standard defines very basic wireless client authentication that also uses the WEP key. The industry has adopted the 802.1x authentication framework (see section 7 entitled “Wireless Authentication”) to overcome the deficiencies of the 802.11 standard. Recently the University of Maryland has documented potential security risks with the 802.1x protocol. Today’s solution is to use mutual authentication to prevent “man in the middle” attacks and dynamic WEP keys that are distributed over secure, encrypted channels. Both these techniques are supported by the Transport Layer Security (TLS) protocol. Further enhancements include per-packet keying and message integrity checks – these are proposed enhancements to the 802.11i security standard. 4 Madge Wireless LAN architecture The Madge wireless LAN architecture consists of three components: Wireless Clients, which communicate with Access Points, which in turn can communicate with and can be controlled by Access Servers. Wireless clients are typically laptop computers with a wireless Network Interface Card (NIC) installed to allow access to the wireless network. An Access Point (AP) provides radio coverage to a particular area (known as a cell) and connects to the wired network. Both 802.11b (11Mbps LANs at 2.4 GHz) and Bluetooth APs are supported. An Access Server (i.e. the Enterprise Access Server or EAS) provides control, management and advanced security features to the Enterprise wireless network. Wired-side Wireless-side Switched or Routed Network Corporate Intranet Enterprise Access Server Bluetooth Access Point 802.11 Access Point 802.11 Access Point Acts as gateway for all wired to wireless traffic Figure 2: Enterprise Access Server in Gateway Mode A Madge wireless infrastructure can be connected to existing wired networks in a number of ways. Common architectures include deploying the EAS in “Gateway Mode” or “Controller Mode”. In Gateway Mode (see figure 2 above) the EAS is placed between the AP network and the rest of the enterprise network. The EAS therefore controls all traffic flow between the wired and wireless networks and acts as a firewall. WWP-001 Copyright © 2002-2003 Madge Limited. All rights reserved. Page 2
In Controller Mode(see figure 3)the EAs manages the APs and controls access to the wireless network but is not involved in the transfer of user data. in this mode the wireless network can be separated from the wired network with an additional firewall or fully integrated into the enterprise wired network access and manages Access Points Enterprise Switched or routed Access serve Firewall and/or VPN server Bluetooth 802.11 Access Point Access Point Figure 3: Enterprise Access Server in Controller Mode 5 Madge Wireless Security Model The Madge wireless LAN architecture supports a comprehensive and extensible security model based on industry-standards as shown in figure 4. Each element within the model is configurable allowing twork administrators to balance usability and security appropriate to their needs VPN wireless client connectivity(IPSec) Firewall Packet filtering/port blocking to protect enterprise networks from wireless intruders Mutual authentication between client Authentication devices, users and the network (802.1x EAP-TLS using certificates) Encryption Encrypting data to prevent eavesdropping Dynamic WEP, 802.1x EAP-TLS and 3DES) Device Authorization Authorizing network access to wireless devices(MAC address access control) Figure 4: Wireless security model Device Authorisation: wireless clients can be excluded from the network according to their hardware address(e.g. MAC address). The EAs maintains a database of authorised wireless clients and individual APs either pass or block traffic accordingly Encryption: the Madge WLAN family of products support the WEP, 3DES and TLs standards that use encryption to prevent eavesdropping. WEP keys can be generated on a per-user, per session basis WWP-001 Copyright@ 2002-2003 Madge Limited. All rights reserved Page 3
In Controller Mode (see figure 3) the EAS manages the APs and controls access to the wireless network but is not involved in the transfer of user data. In this mode the wireless network can be separated from the wired network with an additional firewall or fully integrated into the enterprise wired network. Wired-side Wireless-side Switched or Routed Network Corporate Intranet Firewall and/or VPN server (optional) Bluetooth Access Point 802.11 Access Point Enterprise Access Server Controls access and manages Access Points Figure 3: Enterprise Access Server in Controller Mode 5 Madge Wireless Security Model The Madge wireless LAN architecture supports a comprehensive and extensible security model based on industry-standards as shown in figure 4. Each element within the model is configurable allowing network administrators to balance usability and security appropriate to their needs. Device Authorization Encryption Authentication Firewall VPN Packet filtering/port blocking to protect enterprise networks from wireless intruders Encrypting data to prevent eavesdropping (Dynamic WEP, 802.1x EAP-TLS and 3DES) Device Authorization Encryption Authentication Firewall VPN Packet filtering/port blocking to protect enterprise networks from wireless intruders Encrypting data to prevent eavesdropping (Dynamic WEP, 802.1x EAP-TLS and 3DES) VPN wireless client connectivity (IPSec) Mutual authentication between client devices, users and the network (802.1x EAP-TLS using certificates) Authorizing network access to wireless devices (MAC address access control) VPN wireless client connectivity (IPSec) Mutual authentication between client devices, users and the network (802.1x EAP-TLS using certificates) Authorizing network access to wireless devices (MAC address access control) Figure 4: Wireless security model Device Authorisation: wireless clients can be excluded from the network according to their hardware address (e.g. MAC address). The EAS maintains a database of authorised wireless clients and individual APs either pass or block traffic accordingly. Encryption: the Madge WLAN family of products support the WEP, 3DES and TLS standards that use encryption to prevent eavesdropping. WEP keys can be generated on a per-user, per session basis. WWP-001 Copyright © 2002-2003 Madge Limited. All rights reserved. Page 3
Authentication: the Madge WLAN family of products support mutual authentication(using 802.1x EAP-TLS)to ensure only authorised wireless clients are permitted to access the wireless network. The EAs uses an internal RADIUs server for authentication using digital certificates. Digital certificates can be obtained from the internal Certificate Authority(CA)or imported from an externa CA. This maximises security and minimises administrative overhead Firewall: the EAs incorporates a customisable packet filtering and port blocking firewall based on Linux IPchains Built-in preset configurations allow common traffic types to be enabled or disabled VPN the eas contains an ipsec vpn server that allows wireless clients to establish secure VPN sessions over the wireless network to the eas 6 Encryption Encryption is about transforming data so that only authorised parties can decode it. The encryption process combines some plaintext with a key to produce Ciphertext. Decryption reverses the process figure 5. The process of defining and distributing the keys is known as key management. shown in Key Management Key Key Ciphertext Plaintext H Encryption Decryption Plaintext Eavesdrop Figure 5: Encryption If the same key is used for both encryption and decryption then the keys are known as symmetric If different keys are used then they are known as"asymmetric". asymmetric keys are typically used in Public Key Infrastructures(PKIs) where one key is"public" and the other is"private There are two main encryption methods: block ciphers and stream ciphers. Block ciphers operate on plaintext in groups of bits, called blocks that are typically 64 or 128 bits long. Examples of block ciphers are: DES, triple DES (3DES), AES and Blowfish. Stream ciphers convert a key into a random keystream"(a stream of small keys of typically 8 bits each) that is then combined with the plaintext to encode it Stream ciphers are generally much more efficient than block ciphers Examples of stream ciphers are: RC4(used in 802.11 wireless LANs), SEAL and SOBER. WWP-001 Copyright@ 2002-2003 Madge Limited. All rights reserved Page 4
Authentication: the Madge WLAN family of products support mutual authentication (using 802.1x EAP-TLS) to ensure only authorised wireless clients are permitted to access the wireless network. The EAS uses an internal RADIUS server for authentication using digital certificates. Digital certificates can be obtained from the internal Certificate Authority (CA) or imported from an external CA. This maximises security and minimises administrative overhead. Firewall: the EAS incorporates a customisable packet filtering and port blocking firewall based on Linux IPchains. Built-in preset configurations allow common traffic types to be enabled or disabled. VPN: the EAS contains an IPSec VPN server that allows wireless clients to establish secure VPN sessions over the wireless network to the EAS. 6 Encryption Encryption is about transforming data so that only authorised parties can decode it. The encryption process combines some plaintext with a key to produce Ciphertext. Decryption reverses the process by taking the Ciphertext and combining it with a key to reproduce the original plaintext as shown in figure 5. The process of defining and distributing the keys is known as key management. Plaintext Encryption Decryption Plaintext Key Key Management Eavesdropper Ciphertext KeKeyy Key Figure 5: Encryption If the same key is used for both encryption and decryption then the keys are known as “symmetric”. If different keys are used then they are known as “asymmetric”. Asymmetric keys are typically used in Public Key Infrastructures (PKIs) where one key is “public” and the other is “private”. There are two main encryption methods: block ciphers and stream ciphers. Block ciphers operate on plaintext in groups of bits, called blocks that are typically 64 or 128 bits long. Examples of block ciphers are: DES, triple DES (3DES), AES and Blowfish. Stream ciphers convert a key into a random “keystream” (a stream of small keys of typically 8 bits each) that is then combined with the plaintext to encode it. Stream ciphers are generally much more efficient than block ciphers. Examples of stream ciphers are: RC4 (used in 802.11 wireless LANs), SEAL and SOBER. WWP-001 Copyright © 2002-2003 Madge Limited. All rights reserved. Page 4