45
William A. Arbaugh Department of Computer Science and UMIACS University of Maryland College Park, MD [email protected] http://www.cs.umd.edu/~waa The Convergence of Ubiquity: The Future of Wireless Security

The Convergence of Ubiquity: The Future of Wireless Securityn The future standard uses two forms of identity: MAC address at the link layer, and a user ID at the network layer. n Requires

  • Upload
    others

  • View
    14

  • Download
    0

Embed Size (px)

Citation preview

Page 1: The Convergence of Ubiquity: The Future of Wireless Securityn The future standard uses two forms of identity: MAC address at the link layer, and a user ID at the network layer. n Requires

William A. ArbaughDepartment of Computer Science and UMIACS

University of MarylandCollege Park, [email protected]

http://www.cs.umd.edu/~waa

The Convergence of Ubiquity: The Future of Wireless Security

Page 2: The Convergence of Ubiquity: The Future of Wireless Securityn The future standard uses two forms of identity: MAC address at the link layer, and a user ID at the network layer. n Requires

• Wireless Networking Overview

• Why Wireless Security is Different

• Hop by Hop vs. End to End

• The Ghosts of Wireless Security Past

Talk Overview(with apologies to Dickens)

Page 3: The Convergence of Ubiquity: The Future of Wireless Securityn The future standard uses two forms of identity: MAC address at the link layer, and a user ID at the network layer. n Requires

• The Ghosts of Wireless Security Present

• Wi-Fi Protected Access

• Denial of Service

• The Ghosts of Wireless Security Future

• Trends

• Interworking

• Device security

Page 4: The Convergence of Ubiquity: The Future of Wireless Securityn The future standard uses two forms of identity: MAC address at the link layer, and a user ID at the network layer. n Requires

Wireless Networking is Experiencing Exponential

Growth

0

5,000

10,000

15,000

20,000

25,000

30,000

35,000

40,000

45,000

1999 2000 2001 2002 2003 2004 2005 2006Source: In-Stat/MDR, 7/02

(in thousands)

19,482 for 2002 according to Gartner Dataquest 1/03

WLANShipments

Page 5: The Convergence of Ubiquity: The Future of Wireless Securityn The future standard uses two forms of identity: MAC address at the link layer, and a user ID at the network layer. n Requires

WLAN Sales

$0

$500

$1,000

$1,500

$2,000

$2,500

$3,000

1999 2000 2001 2002 2003 2004 2005 2006

($M)

Source: In-Stat/MDR, 7/02

2,320 for 2002 according to Gartner Dataquest 1/03

Page 6: The Convergence of Ubiquity: The Future of Wireless Securityn The future standard uses two forms of identity: MAC address at the link layer, and a user ID at the network layer. n Requires

• The next Internet, or

Wireless Networking

Page 7: The Convergence of Ubiquity: The Future of Wireless Securityn The future standard uses two forms of identity: MAC address at the link layer, and a user ID at the network layer. n Requires

or the next Bubble?

Page 8: The Convergence of Ubiquity: The Future of Wireless Securityn The future standard uses two forms of identity: MAC address at the link layer, and a user ID at the network layer. n Requires

The Future of WLAN’s?

w 4G?w Hot spot coverage

only ala Boingo et. al?w Or some sort of

overlay blend?w Regardless- the

rapid growth will continue.

Page 9: The Convergence of Ubiquity: The Future of Wireless Securityn The future standard uses two forms of identity: MAC address at the link layer, and a user ID at the network layer. n Requires

WLAN Urban Legend• 802.11b is “secure” because it uses frequency

hopping or spread spectrum!• Using IPsec or SSH is all that’s needed to provide

complete security!• I haven’t heard of anyone’s WLAN being exploited-

so I’m OK!• All of the known attacks require a sniffer which is

difficult to find and expensive. Thus, you’re safe!• Attacking WLANs requires expensive and

specialized tools!

Page 10: The Convergence of Ubiquity: The Future of Wireless Securityn The future standard uses two forms of identity: MAC address at the link layer, and a user ID at the network layer. n Requires

The Threat

w In general, there are four threat classes1:

w Journeymen (Class 0)

w Experts (Class 1)

w Insiders (Class 2)

w Well funded professionals (Class 3)

1. Modifications to the model originally proposed by [Abraham et. al.].

Page 11: The Convergence of Ubiquity: The Future of Wireless Securityn The future standard uses two forms of identity: MAC address at the link layer, and a user ID at the network layer. n Requires

Why Wireless Security is Different

w An attacker has access to the transport medium of your network!

w Essentially elevates the experts to an insider (higher threat)

Page 12: The Convergence of Ubiquity: The Future of Wireless Securityn The future standard uses two forms of identity: MAC address at the link layer, and a user ID at the network layer. n Requires

The Wireless Threat

Used with permission from KARS: http://www.ittc.ku.edu/wlan/

Page 13: The Convergence of Ubiquity: The Future of Wireless Securityn The future standard uses two forms of identity: MAC address at the link layer, and a user ID at the network layer. n Requires

• End to end security is necessary, but only sufficient if and only if strong mutual authentication occurs.

• PEAP attack [Asokan, et.al.]

• Human factors, e.g. “Social Engineering”

• Requires global non-forgeable identity

Hop by Hop vs. End to End

Page 14: The Convergence of Ubiquity: The Future of Wireless Securityn The future standard uses two forms of identity: MAC address at the link layer, and a user ID at the network layer. n Requires

• End to End can not guarantee availability!• Routing attacks• Michael DoS (We’ll see this later)

Page 15: The Convergence of Ubiquity: The Future of Wireless Securityn The future standard uses two forms of identity: MAC address at the link layer, and a user ID at the network layer. n Requires

Wired Equivalent Privacy

w What exactly does that mean?

w My guess:

w Prevent unauthorized use (access control, authentication, and integrity)

w Prevent unauthorized disclosure (confidentiality)

w Prevent unauthorized eavesdropping (Not likely to happen in consumer wireless)

Page 16: The Convergence of Ubiquity: The Future of Wireless Securityn The future standard uses two forms of identity: MAC address at the link layer, and a user ID at the network layer. n Requires

Identityn The current standard only uses the MAC address as a

form of identity.n Unfortunately, the MAC address is malleable and further

compounded by inadequate cryptographic binding [Walker, Borisov et. al., Arbaugh et. al.].

n The future standard uses two forms of identity: MAC address at the link layer, and a user ID at the network layer.n Requires cryptographic binding between the two ID’s [Mishra

et. al.].n

n nb. History buffs will remember that the AMPS (Cellular) system made the same mistake with the equipment serial number (ESN).

Page 17: The Convergence of Ubiquity: The Future of Wireless Securityn The future standard uses two forms of identity: MAC address at the link layer, and a user ID at the network layer. n Requires

Access Controln MAC access control lists

n MAC address is forgeable [Arbaugh et. al.]n Proprietary “closed network” used a shared

secret as access token.n Access tokens broadcast in the clear in

management frames [Arbaugh et. al.]n

nb. Here the reliance on the expense/difficulty in eavesdropping as a security mechanism is again a mistake the cellular community made.

Page 18: The Convergence of Ubiquity: The Future of Wireless Securityn The future standard uses two forms of identity: MAC address at the link layer, and a user ID at the network layer. n Requires

Integrityn The lack of any message authenticity

mechanism, or the reliance on error detection (CRC) for integrity protection.

n A linear CRC combined with a linear combiner, XOR, allows “bit flipping” [Borisov et. al.].

Page 19: The Convergence of Ubiquity: The Future of Wireless Securityn The future standard uses two forms of identity: MAC address at the link layer, and a user ID at the network layer. n Requires

WEP Block Diagram

RC4Encryption Key K

Plaintext data byte P

Pseudo Random byte b

¯ Ciphertext data byte C

Decryption works the same way: P = C ¯ b

Init. Vector IV

Page 20: The Convergence of Ubiquity: The Future of Wireless Securityn The future standard uses two forms of identity: MAC address at the link layer, and a user ID at the network layer. n Requires

Confidentialityw IV space is only 224

w Creates Depth [Walker, Borisov et. al.]w c1 ¯ c2 = (p1 ¯ r) ¯ (p2 ¯ r) = p1 ¯ p2

w Lack of Replay protection combined with stream cipherw Asynchronous known plaintext attack [Walker, Borisov et.

al.]w Synchronous known plaintext attack [Arbaugh]

w IV as first part of keyw Induces several classes of weak IV’s. The most damaging

being when the IV is of the form <n,FF,x> [Fluhrer et. al.]

Page 21: The Convergence of Ubiquity: The Future of Wireless Securityn The future standard uses two forms of identity: MAC address at the link layer, and a user ID at the network layer. n Requires

w Most all vendors have implemented IV filtering to prevent FMS attacks.

w Reduces IV space from 224 to 218 in some cases.

w Prevents FMS attack that required on average several hours, but ....

w Reduces the work-factor of a previous attack (Inductive Chosen Plaintext) from 18 hours to 80 minutes!!!

Mitigating FMS

Page 22: The Convergence of Ubiquity: The Future of Wireless Securityn The future standard uses two forms of identity: MAC address at the link layer, and a user ID at the network layer. n Requires

Authenticationw The use of a challenge response system

covered by a Vernam cipher.

w Eavesdropping on a single successful authentication provides the attacker the ability to authenticate at will [Arbaugh et. al., Borisov et. al., Walker]

Page 23: The Convergence of Ubiquity: The Future of Wireless Securityn The future standard uses two forms of identity: MAC address at the link layer, and a user ID at the network layer. n Requires

The Ghosts of Wireless Security

Present

Page 24: The Convergence of Ubiquity: The Future of Wireless Securityn The future standard uses two forms of identity: MAC address at the link layer, and a user ID at the network layer. n Requires

Wi-Fi Protected Access (WPA)

w Announced early of this year by WECA

w Available real soon now

w Essentially a subset of IEEE draft

w Designed to support legacy equipment via new firmware and drivers

Page 25: The Convergence of Ubiquity: The Future of Wireless Securityn The future standard uses two forms of identity: MAC address at the link layer, and a user ID at the network layer. n Requires

• Confidentiality: Per-packet keying via TKIP

• Message Authenticity: Michael algorithm via TKIP

• Access Control: IEEE 802.1x

• Authentication: EAP/TLS

WPA

Page 26: The Convergence of Ubiquity: The Future of Wireless Securityn The future standard uses two forms of identity: MAC address at the link layer, and a user ID at the network layer. n Requires

w WPA will provide a tremendous increase in security

w However, WPA is based on several new and domain specific protocols

w As such- it SHOULD only be considered as an interim solution until Robust Security Network, aka WPA2, equipment becomes available

WPA Commentary

Page 27: The Convergence of Ubiquity: The Future of Wireless Securityn The future standard uses two forms of identity: MAC address at the link layer, and a user ID at the network layer. n Requires

• Due “Real Soon Now” - actually product won’t ship until Q3 or Q4 2004.

• Will require hardware upgrades to support AES in most cases (some of the newer cards/AP’s may not).

RSN aka WPA2

Page 28: The Convergence of Ubiquity: The Future of Wireless Securityn The future standard uses two forms of identity: MAC address at the link layer, and a user ID at the network layer. n Requires

• Confidentiality: Per-packet keying via TKIP or AES CCMP

• Message Authenticity: Michael algorithm via TKIP or AES CCMP

• Access Control: IEEE 802.1x

• Authentication: EAP/TLS

Page 29: The Convergence of Ubiquity: The Future of Wireless Securityn The future standard uses two forms of identity: MAC address at the link layer, and a user ID at the network layer. n Requires

w will provide tremendous improvements in Confidentiality, Integrity, Authentication, and Access Control

w but ......

w Availability will remain an issue

Both WPA and RSN

Page 30: The Convergence of Ubiquity: The Future of Wireless Securityn The future standard uses two forms of identity: MAC address at the link layer, and a user ID at the network layer. n Requires

w ALL past, current, and future Wi-Fi standards are susceptible to Denial of Service attacks at multiple layers.n Layer 3 (EAP DoS)n Layer 2 (Michael DoS, unauthenticated

management frames)n Layer 1 (CTS, Power Save)

Denial of Service

Page 31: The Convergence of Ubiquity: The Future of Wireless Securityn The future standard uses two forms of identity: MAC address at the link layer, and a user ID at the network layer. n Requires

The Ghosts of Wireless Security

Future

Page 32: The Convergence of Ubiquity: The Future of Wireless Securityn The future standard uses two forms of identity: MAC address at the link layer, and a user ID at the network layer. n Requires

Trendsw Computing devices shrinking and becoming

more capable

w Networks becoming ubiquitous

w Users becoming more mobile

w Content becoming active

w Software defined radios appearing

Page 33: The Convergence of Ubiquity: The Future of Wireless Securityn The future standard uses two forms of identity: MAC address at the link layer, and a user ID at the network layer. n Requires

What is Interworkingw Interworking permits the user to

transparently roam between different networks- usually with different PHY and administrative domains.

Page 34: The Convergence of Ubiquity: The Future of Wireless Securityn The future standard uses two forms of identity: MAC address at the link layer, and a user ID at the network layer. n Requires

Transparent Roaming / Interworking

WLAN

CDMA

Page 35: The Convergence of Ubiquity: The Future of Wireless Securityn The future standard uses two forms of identity: MAC address at the link layer, and a user ID at the network layer. n Requires

Why is Interworking Important?

w Ubiquity : User’s are demanding continuous connectivity. w Ease of use requirements demand

transparency.w Sound business practice (and user privacy

requirements) demand security.

Page 36: The Convergence of Ubiquity: The Future of Wireless Securityn The future standard uses two forms of identity: MAC address at the link layer, and a user ID at the network layer. n Requires

Interworking Properties

w Securityw Transparencyw Simplicity

AvailabilityUser’s :-)

$$$} ODenial of Service

FraudUser Complaints

Page 37: The Convergence of Ubiquity: The Future of Wireless Securityn The future standard uses two forms of identity: MAC address at the link layer, and a user ID at the network layer. n Requires

Wireless Device Security and Firewallsw In the future everything will radiate- your

fridge, your picture frame, even down to small parts (RFID).

w Most of these devices will also have IP addresses- Imagine the headline:

Amazon DoS’d by Fridges, Toasters and phones - oh my!

Page 38: The Convergence of Ubiquity: The Future of Wireless Securityn The future standard uses two forms of identity: MAC address at the link layer, and a user ID at the network layer. n Requires

Current Environmentw Small and large companies using Firewalls and

anti-virus as the ONLY means of protection.w Many home users connect via cable or DSL

with no protection.w Users are moderately mobile (Discrete

Operation)w Laptops while travelingw VPN used to connect to office

w This simple operating model has created a significant management problem

Page 39: The Convergence of Ubiquity: The Future of Wireless Securityn The future standard uses two forms of identity: MAC address at the link layer, and a user ID at the network layer. n Requires

Some of the Problems with Firewalls

Captive Portal

STA

Protected Intranet

InternetSTA

Access Point

STA

Page 40: The Convergence of Ubiquity: The Future of Wireless Securityn The future standard uses two forms of identity: MAC address at the link layer, and a user ID at the network layer. n Requires

Today’s Firewallw Not as effective as a decade ago because of

multiple “piercings”

w User mobility creates potential vector for malice

w Active content

w User “creativity”

w Crappy software

w Peer to Peer programs

Page 41: The Convergence of Ubiquity: The Future of Wireless Securityn The future standard uses two forms of identity: MAC address at the link layer, and a user ID at the network layer. n Requires

Future Environmentw Dramatic increase in mobility (always on)w Ubiquity of network accessw Ubiquity of more powerful computing

devicesw IPv6, i.e. every device has a routable IP

addressw Active content increasingw Peer to Peer increasing

Page 42: The Convergence of Ubiquity: The Future of Wireless Securityn The future standard uses two forms of identity: MAC address at the link layer, and a user ID at the network layer. n Requires

Future Environmentw Devices may require multiple management

sources

w A handset may need to receive updates from the manufacturer,

w The developers of installed applications, and

w Receive user and/or organizational data

Page 43: The Convergence of Ubiquity: The Future of Wireless Securityn The future standard uses two forms of identity: MAC address at the link layer, and a user ID at the network layer. n Requires

Future Environmentw Management will become significantly more

difficult

w Separation of management instructions is a MUST,

w Many organizations will want to be “in the loop” on all management instructions,

w Devices are “always on”

Page 44: The Convergence of Ubiquity: The Future of Wireless Securityn The future standard uses two forms of identity: MAC address at the link layer, and a user ID at the network layer. n Requires

The Future

STA

STA

STA

STAAuthentication Server

Authentication Server Captive Portal

Page 45: The Convergence of Ubiquity: The Future of Wireless Securityn The future standard uses two forms of identity: MAC address at the link layer, and a user ID at the network layer. n Requires

w Things are bad, but they are getting better. However, numerous challenges exist before we can have complete and secure ubiquitous computing.

Conclusions