当前位置:高等教育资讯网  >  中国高校课件下载中心  >  大学文库  >  浏览文档

《计算机网络》课程教学资源(学习资料)VIII-wlansecurity

资源类别:文库,文档格式:PDF,文档页数:8,文件大小:234.21KB,团购合买
点击下载完整版文档(PDF)

m White Paper madge Wireless LAN Security Copyright@ 2002-2003 Madge Limited. All rights reserved

White Paper Wireless LAN Security Copyright © 2002-2003 Madge Limited. All rights reserved

Introduction s wireless LANs become widely deployed, and the business benefits become clear, concern has grown over their security. This white paper details these concerns and discusses advanced technologies that resolve the issues to produce robust security solutions. The key topics of ncryption and authentication are defined in some depth Recommendations are made on deploying enterprise class wireless LANs that are standards-compliant scalable, manageable and extensible to encompass new technologies as they emerge 2 Why is security so important? Why is there so much apprehension over security of wireless LAN technology? It all stems from the open nature of the wireless media. To connect to a wired LAN you need physical access, you have connect a PC into a live network port. With wireless you only need to be in the coverage area of an aerial (i. e. within range of an Access Point). Control for wired networks is simpler: traditional hysical access control into buildings can be used and unused network ports can be disabled by management application Wireless LANs use radio waves which pass through many modern building materials and thus coverage is not limited to the inside of a building the radio waves appear in the street where transmissions from Wireless LANs can be monitored by an eavesdropper with suitable quipment. Access to a corporate network can be achieved from outside a building using readily vailable technology Figure 1 shows how an eavesdropper can gain access to a wireless LAN from outside of an office building The solution is to implement a robust security network. For example use encryption to prevent an eavesdropper from understanding any intercepted transmissions and use strong authentication schemes to prevent unauthorised network access Wired Network LAN 3需 Blue area denotes Eaves Coverage LAN Clic s LAN Client Office Building Wireless LAN Client Figure 1: Eavesdropping example WWP-001 Copyright@ 2002-2003 Madge Limited. All rights reserved

1 Introduction As wireless LANs become widely deployed, and the business benefits become clear, concern has grown over their security. This white paper details these concerns and discusses advanced technologies that resolve the issues to produce robust security solutions. The key topics of encryption and authentication are defined in some depth. Recommendations are made on deploying enterprise class wireless LANs that are standards-compliant, scalable, manageable and extensible to encompass new technologies as they emerge. 2 Why is security so important? Why is there so much apprehension over security of wireless LAN technology? It all stems from the open nature of the wireless media. To connect to a wired LAN you need physical access, you have to connect a PC into a live network port. With wireless you only need to be in the coverage area of an aerial (i.e. within range of an Access Point). Control for wired networks is simpler: traditional physical access control into buildings can be used and unused network ports can be disabled by management application. Wireless LANs use radio waves which pass through many modern building materials and thus coverage is not limited to the inside of a building. The radio waves appear in the street where transmissions from Wireless LANs can be monitored by an eavesdropper with suitable equipment. Access to a corporate network can be achieved from outside a building using readily available technology. Figure 1 shows how an eavesdropper can gain access to a wireless LAN from outside of an office building. The solution is to implement a robust security network. For example use encryption to prevent an eavesdropper from understanding any intercepted transmissions and use strong authentication schemes to prevent unauthorised network access. Wired Network LAN Office Building Wireless LAN Client Wireless LAN Client Eavesdropper Wireless LAN Client Access Point (AP) Blue area denotes AP coverage Figure 1: Eavesdropping example WWP-001 Copyright © 2002-2003 Madge Limited. All rights reserved. Page 1

3 Weaknesses in 802.11 security he IEEE 802.11 standard defines wired Equivalent Privacy(WEP) to protect wireless transmissions WEP employs the RC4 symmetric stream cipher using an encryption key that is shared by all participants in the wireless network. 802.11 defines 64-bit WeP keys but most suppliers also support 128-bit keys. 802.11 does not define how keys are distributed. A WEP key consists of two parts: a 24-bit Initialisation Vector(Iv and a secret key. The Iv is transmitted in plain text in the headers of 802.11 packets and can therefore be easily intercepted Armed with the Iv there are well-documented techniques available to"crack" WEP encrypted transmissions given sufficient sample data. The solution is to use dynamic Wep keys that change frequently The 802. 11 standard defines very basic wireless client authentication that also uses the WeP key. The industry has adopted the 802.1x authentication framework(see section 7 entitled"Wireless Authentication" ) to overcome the deficiencies of the 802.11 standard. Recently the University of Maryland has documented potential security risks with the 802. 1x protocol. Today's solution is to use mutual authentication to prevent "man in the middle"attacks and dynamic WEP keys that are distributed over secure, encrypted channels. Both these techniques are supported by the Transport Layer Security (tLs) protocol. Further enhancements include per-packet keying and message integrity checks-these are proposed enhancements to the 802 1 1i security standard 4 Madge Wireless LAN architecture The Madge wireless LAN architecture consists of three components: Wireless Clients, which communicate with Access Points, which in turn can communicate with and can be controlled by Access Servers. Wireless clients are typically laptop computers with a wireless Network Interface Card(NIC) installed to allow access to the wireless network. An Access Point(AP)provides radio coverage to a particular area(known as a cell)and connects to the wired network. Both 802. 11b (11Mbps LANs at 2.4 GHz) and Bluetooth APs are supported An Access Server (i.e. the Enterprise Access server or EAs)provides control, management and advanced security features to the Enterprise wireless network Wireless-side 802.11 Corporate Switched or Routed Access Point Intranet Network Enterprise Access server cts as gateway for all wired to wireless Bluetooth 802.11 Access point Access Point Figure 2: Enterprise Access Server in Gateway Mode A Madge wireless infrastructure can be connected to existing wired networks in a number of ways. Common architectures include deploying the EAs in " Gateway Mode"or "Controller Mode". In Gateway Mode(see figure 2 above) the EAs is placed between the AP network and the rest of the enterprise network. The Eas therefore controls all traffic flow between the wired and wireless networks and acts as a firewall WWP-001 Copyright@ 2002-2003 Madge Limited. All rights reserved Page 2

3 Weaknesses in 802.11 security The IEEE 802.11 standard defines Wired Equivalent Privacy (WEP) to protect wireless transmissions. WEP employs the RC4 symmetric stream cipher using an encryption key that is shared by all participants in the wireless network. 802.11 defines 64-bit WEP keys but most suppliers also support 128-bit keys. 802.11 does not define how keys are distributed. A WEP key consists of two parts: a 24-bit Initialisation Vector (IV) and a secret key. The IV is transmitted in plain text in the headers of 802.11 packets and can therefore be easily intercepted. Armed with the IV there are well-documented techniques available to “crack” WEP encrypted transmissions given sufficient sample data. The solution is to use dynamic WEP keys that change frequently. The 802.11 standard defines very basic wireless client authentication that also uses the WEP key. The industry has adopted the 802.1x authentication framework (see section 7 entitled “Wireless Authentication”) to overcome the deficiencies of the 802.11 standard. Recently the University of Maryland has documented potential security risks with the 802.1x protocol. Today’s solution is to use mutual authentication to prevent “man in the middle” attacks and dynamic WEP keys that are distributed over secure, encrypted channels. Both these techniques are supported by the Transport Layer Security (TLS) protocol. Further enhancements include per-packet keying and message integrity checks – these are proposed enhancements to the 802.11i security standard. 4 Madge Wireless LAN architecture The Madge wireless LAN architecture consists of three components: Wireless Clients, which communicate with Access Points, which in turn can communicate with and can be controlled by Access Servers. Wireless clients are typically laptop computers with a wireless Network Interface Card (NIC) installed to allow access to the wireless network. An Access Point (AP) provides radio coverage to a particular area (known as a cell) and connects to the wired network. Both 802.11b (11Mbps LANs at 2.4 GHz) and Bluetooth APs are supported. An Access Server (i.e. the Enterprise Access Server or EAS) provides control, management and advanced security features to the Enterprise wireless network. Wired-side Wireless-side Switched or Routed Network Corporate Intranet Enterprise Access Server Bluetooth Access Point 802.11 Access Point 802.11 Access Point Acts as gateway for all wired to wireless traffic Figure 2: Enterprise Access Server in Gateway Mode A Madge wireless infrastructure can be connected to existing wired networks in a number of ways. Common architectures include deploying the EAS in “Gateway Mode” or “Controller Mode”. In Gateway Mode (see figure 2 above) the EAS is placed between the AP network and the rest of the enterprise network. The EAS therefore controls all traffic flow between the wired and wireless networks and acts as a firewall. WWP-001 Copyright © 2002-2003 Madge Limited. All rights reserved. Page 2

In Controller Mode(see figure 3)the EAs manages the APs and controls access to the wireless network but is not involved in the transfer of user data. in this mode the wireless network can be separated from the wired network with an additional firewall or fully integrated into the enterprise wired network access and manages Access Points Enterprise Switched or routed Access serve Firewall and/or VPN server Bluetooth 802.11 Access Point Access Point Figure 3: Enterprise Access Server in Controller Mode 5 Madge Wireless Security Model The Madge wireless LAN architecture supports a comprehensive and extensible security model based on industry-standards as shown in figure 4. Each element within the model is configurable allowing twork administrators to balance usability and security appropriate to their needs VPN wireless client connectivity(IPSec) Firewall Packet filtering/port blocking to protect enterprise networks from wireless intruders Mutual authentication between client Authentication devices, users and the network (802.1x EAP-TLS using certificates) Encryption Encrypting data to prevent eavesdropping Dynamic WEP, 802.1x EAP-TLS and 3DES) Device Authorization Authorizing network access to wireless devices(MAC address access control) Figure 4: Wireless security model Device Authorisation: wireless clients can be excluded from the network according to their hardware address(e.g. MAC address). The EAs maintains a database of authorised wireless clients and individual APs either pass or block traffic accordingly Encryption: the Madge WLAN family of products support the WEP, 3DES and TLs standards that use encryption to prevent eavesdropping. WEP keys can be generated on a per-user, per session basis WWP-001 Copyright@ 2002-2003 Madge Limited. All rights reserved Page 3

In Controller Mode (see figure 3) the EAS manages the APs and controls access to the wireless network but is not involved in the transfer of user data. In this mode the wireless network can be separated from the wired network with an additional firewall or fully integrated into the enterprise wired network. Wired-side Wireless-side Switched or Routed Network Corporate Intranet Firewall and/or VPN server (optional) Bluetooth Access Point 802.11 Access Point Enterprise Access Server Controls access and manages Access Points Figure 3: Enterprise Access Server in Controller Mode 5 Madge Wireless Security Model The Madge wireless LAN architecture supports a comprehensive and extensible security model based on industry-standards as shown in figure 4. Each element within the model is configurable allowing network administrators to balance usability and security appropriate to their needs. Device Authorization Encryption Authentication Firewall VPN Packet filtering/port blocking to protect enterprise networks from wireless intruders Encrypting data to prevent eavesdropping (Dynamic WEP, 802.1x EAP-TLS and 3DES) Device Authorization Encryption Authentication Firewall VPN Packet filtering/port blocking to protect enterprise networks from wireless intruders Encrypting data to prevent eavesdropping (Dynamic WEP, 802.1x EAP-TLS and 3DES) VPN wireless client connectivity (IPSec) Mutual authentication between client devices, users and the network (802.1x EAP-TLS using certificates) Authorizing network access to wireless devices (MAC address access control) VPN wireless client connectivity (IPSec) Mutual authentication between client devices, users and the network (802.1x EAP-TLS using certificates) Authorizing network access to wireless devices (MAC address access control) Figure 4: Wireless security model Device Authorisation: wireless clients can be excluded from the network according to their hardware address (e.g. MAC address). The EAS maintains a database of authorised wireless clients and individual APs either pass or block traffic accordingly. Encryption: the Madge WLAN family of products support the WEP, 3DES and TLS standards that use encryption to prevent eavesdropping. WEP keys can be generated on a per-user, per session basis. WWP-001 Copyright © 2002-2003 Madge Limited. All rights reserved. Page 3

Authentication: the Madge WLAN family of products support mutual authentication(using 802.1x EAP-TLS)to ensure only authorised wireless clients are permitted to access the wireless network. The EAs uses an internal RADIUs server for authentication using digital certificates. Digital certificates can be obtained from the internal Certificate Authority(CA)or imported from an externa CA. This maximises security and minimises administrative overhead Firewall: the EAs incorporates a customisable packet filtering and port blocking firewall based on Linux IPchains Built-in preset configurations allow common traffic types to be enabled or disabled VPN the eas contains an ipsec vpn server that allows wireless clients to establish secure VPN sessions over the wireless network to the eas 6 Encryption Encryption is about transforming data so that only authorised parties can decode it. The encryption process combines some plaintext with a key to produce Ciphertext. Decryption reverses the process figure 5. The process of defining and distributing the keys is known as key management. shown in Key Management Key Key Ciphertext Plaintext H Encryption Decryption Plaintext Eavesdrop Figure 5: Encryption If the same key is used for both encryption and decryption then the keys are known as symmetric If different keys are used then they are known as"asymmetric". asymmetric keys are typically used in Public Key Infrastructures(PKIs) where one key is"public" and the other is"private There are two main encryption methods: block ciphers and stream ciphers. Block ciphers operate on plaintext in groups of bits, called blocks that are typically 64 or 128 bits long. Examples of block ciphers are: DES, triple DES (3DES), AES and Blowfish. Stream ciphers convert a key into a random keystream"(a stream of small keys of typically 8 bits each) that is then combined with the plaintext to encode it Stream ciphers are generally much more efficient than block ciphers Examples of stream ciphers are: RC4(used in 802.11 wireless LANs), SEAL and SOBER. WWP-001 Copyright@ 2002-2003 Madge Limited. All rights reserved Page 4

Authentication: the Madge WLAN family of products support mutual authentication (using 802.1x EAP-TLS) to ensure only authorised wireless clients are permitted to access the wireless network. The EAS uses an internal RADIUS server for authentication using digital certificates. Digital certificates can be obtained from the internal Certificate Authority (CA) or imported from an external CA. This maximises security and minimises administrative overhead. Firewall: the EAS incorporates a customisable packet filtering and port blocking firewall based on Linux IPchains. Built-in preset configurations allow common traffic types to be enabled or disabled. VPN: the EAS contains an IPSec VPN server that allows wireless clients to establish secure VPN sessions over the wireless network to the EAS. 6 Encryption Encryption is about transforming data so that only authorised parties can decode it. The encryption process combines some plaintext with a key to produce Ciphertext. Decryption reverses the process by taking the Ciphertext and combining it with a key to reproduce the original plaintext as shown in figure 5. The process of defining and distributing the keys is known as key management. Plaintext Encryption Decryption Plaintext Key Key Management Eavesdropper Ciphertext KeKeyy Key Figure 5: Encryption If the same key is used for both encryption and decryption then the keys are known as “symmetric”. If different keys are used then they are known as “asymmetric”. Asymmetric keys are typically used in Public Key Infrastructures (PKIs) where one key is “public” and the other is “private”. There are two main encryption methods: block ciphers and stream ciphers. Block ciphers operate on plaintext in groups of bits, called blocks that are typically 64 or 128 bits long. Examples of block ciphers are: DES, triple DES (3DES), AES and Blowfish. Stream ciphers convert a key into a random “keystream” (a stream of small keys of typically 8 bits each) that is then combined with the plaintext to encode it. Stream ciphers are generally much more efficient than block ciphers. Examples of stream ciphers are: RC4 (used in 802.11 wireless LANs), SEAL and SOBER. WWP-001 Copyright © 2002-2003 Madge Limited. All rights reserved. Page 4

7 Wireless Authentication Authentication is about proving or disproving someone's or somethings claimed identity Traditionally authentication is a one-way process, e.g. a user logs onto a computer and proves their identity with a username and password. In wireless networking mutual authentication should be employed where the network authenticates the client and the client authenticates the network. This prevents rogue devices from masquerading as network equipment to gain access to sensitive data on the wireless client (e.g. usernames and passwords) The original 802. 11 wireless LAN standards did not include comprehensive authentication, so the industry has adopted the 802. 1x protocol for its authentication framework. 802. 1x defines port based network access control that uses the Extensible Authentication Protocol(EAP)and a RADIUS erver. 802. 1x doesn't define the actual authentication protocol but specifies eaP that in turn upports a number of authentication protocols such as CHAP-MD5, Transport Layer Security(tLs) and Kerberos. EAP is extensible so that new authentication protocols can be supported as they are developed. EAP was originally specified to operate over the Point-to-Point Protocol(PPP); in order to make it compatible with other data link layer protocols(such as 802.5 Token Ring or 802.11 Wireless LANs)EAP Over LANS(EAPOL) was developed. The resulting Authentication model is shown in figure 6 Kerberos Other Authentication Layer Extensible Authentication Protocol(EAP) EAP EAP Over Lans(EAPOL) 8023 802.11 802.5 Data link Ethernet Token Ring Layer Figure 6: Authentication model 802.1x EAP-TLs is used in certificate-based environments and is highly secure. The EAP-TLS exchange of messages provides mutual authentication, negotiation of the encryption method and secured key exchange between a wireless client and the network. EAP-TLs is the mechanism that provides per-user, per-session dynamic encryption keys. This significantly improves security and overcomes many of the weaknesses in wireless network Figure 7 shows the sequence of events that occur when a wireless client is authenticated using 802. 1x EAP-TLS. Two digital certificates are required: one on the RADIUs server(e. g. the EAS)and one on the wireless client note that network access is denied until authentication has succeeded and dynamic wep keys have been established WWP-001 Copyright@ 2002-2003 Madge Limited. All rights reserved Page 5

7 Wireless Authentication Authentication is about proving or disproving someone’s or something’s claimed identity. Traditionally authentication is a one-way process, e.g. a user logs onto a computer and proves their identity with a username and password. In wireless networking mutual authentication should be employed where the network authenticates the client and the client authenticates the network. This prevents rogue devices from masquerading as network equipment to gain access to sensitive data on the wireless client (e.g. usernames and passwords). The original 802.11 wireless LAN standards did not include comprehensive authentication, so the industry has adopted the 802.1x protocol for its authentication framework. 802.1x defines port￾based network access control that uses the Extensible Authentication Protocol (EAP) and a RADIUS server. 802.1x doesn’t define the actual authentication protocol but specifies EAP that in turn supports a number of authentication protocols such as CHAP-MD5, Transport Layer Security (TLS) and Kerberos. EAP is extensible so that new authentication protocols can be supported as they are developed. EAP was originally specified to operate over the Point-to-Point Protocol (PPP); in order to make it compatible with other data link layer protocols (such as 802.5 Token Ring or 802.11 Wireless LANs) EAP Over LANs (EAPOL) was developed. The resulting Authentication model is shown in figure 6. PPP 802.3 Ethernet 802.5 Token Ring 802.11 Wireless LAN TLS CHAP-MD5 Kerberos Extensible Authentication Protocol (EAP) EAP Over Lans (EAPOL) Authentication Layer EAP Layer Data Link Layer Other Figure 6: Authentication model 802.1x EAP-TLS is used in certificate-based environments and is highly secure. The EAP-TLS exchange of messages provides mutual authentication, negotiation of the encryption method and secured key exchange between a wireless client and the network. EAP-TLS is the mechanism that provides per-user, per-session dynamic encryption keys. This significantly improves security and overcomes many of the weaknesses in wireless networks. Figure 7 shows the sequence of events that occur when a wireless client is authenticated using 802.1x EAP-TLS. Two digital certificates are required: one on the RADIUS server (e.g. the EAS) and one on the wireless client. Note that network access is denied until authentication has succeeded and dynamic WEP keys have been established. WWP-001 Copyright © 2002-2003 Madge Limited. All rights reserved. Page 5

Access RADIUS Client Point Server Network Certificate 802.11 Associatio EAP-TLS Sessic Wireless Client authenticates RADIUS Serve RADIUS server sends its Certificate) TLS RADIUS Server authenticates Wireless Client encry ption (Wireless Client sends its Certificate) Denied ves WEP key Access Point sends WEP key to Wireless Client WEP encrypted traffic Decrypted traffic passed to network Figure 7: 802.1x EAP-TLS authentication 802. 1x EAP-TLs operation with the eas in Controller Mode is shown in figure 8. The wireless client has its digital certificate pre-installed, as does the EAs. the wireless client communicates with the EAs via the AP. All three components(wireless client, AP and EAs) support the 802.1x EAP-TLS process. The wireless client can use Windows XP(which has built-in support for 802. 1x EAP-TLs)or can also be used with the EAS configured in Gateway Mode sing t U). once authenticated the user's Wired-side Wireless-side Server Certificate Corpor Switched or Router Access server Firewall and/or VPN serve Client Certificate 802.11 WLAN Client Access Point Figure 8: 802.1x EAP-TLS operation in Controller Mode WWP-001 Copyright@ 2002-2003 Madge Limited. All rights reserved 6

RADIUS Server authenticates Wireless Client (Wireless Client sends its Certificate) 802.11 Association Wireless Client authenticates RADIUS Server (RADIUS server sends its Certificate) WEP encrypted traffic Decrypted traffic passed to network Access Point Wireless Client RADIUS Server Network Network access denied WEP encryption TLS negotiated encryption Network Access Denied Server Certificate Client Certificate Access Point sends WEP key to Wireless Client Access Point derives WEP key EAP-TLS Session Figure 7: 802.1x EAP-TLS authentication 802.1x EAP-TLS operation with the EAS in Controller Mode is shown in figure 8. The wireless client has its digital certificate pre-installed, as does the EAS. The wireless client communicates with the EAS via the AP. All three components (wireless client, AP and EAS) support the 802.1x EAP-TLS process. The wireless client can use Windows XP (which has built-in support for 802.1x EAP-TLS) or Windows 98/Me/2000 by using the Madge Wireless LAN Utility (WLU). Once authenticated the user’s data is routed directly to the corporate intranet without passing through the SWAS. 802.1x EAP-TLS can also be used with the EAS configured in Gateway Mode. Wired-side Wireless-side Switched or Routed Network Corporate Intranet Firewall and/or VPN server (optional) 802.11 Access Point Enterprise Access Server WLAN Client Client Certificate 802.1x Authentication Server Certificate Figure 8: 802.1x EAP-TLS operation in Controller Mode WWP-001 Copyright © 2002-2003 Madge Limited. All rights reserved. Page 6

8 New Technologies and Future directions he IEEE 802. 1li Task Group is working on enhancements to both encryption and authentication in wireless LANs. 802. 1x will be incorporated into the 802. 11i specifications. Enhancements to WEP include the Temporal Key Integrity protocol (TKIP). TkiP provides three security improvements fast-packet keying(key-hashing per packet), real message integrity checking(to prevent forgery) and dynamic key management (re-keying). The Advanced Encryption Standard(aes)is also in the draft 8011li specifications. AES is a symmetric block cipher operating on blocks of 128 bits using three possible key sizes: 128, 192 and 256 bits. There is anadvanced subset"of 802. 1li, known as WiFi Protected Access (WPA), which is compatible with existing hardware; it includes both 802.1x and tKIp The Internet Engineering Task Force(IETF) has produced an Internet-Draft document defining a new authentication protocol based on EAP called Protected EAP(PEAP). It works by wrapping the EAP protocol within tLs thus protecting the EAP message exchanges. Any EAP authentication method running within peaP is provided with protected key exchange and session resumption(which allows fast re-authentication when a wireless client roams from one ap to another Madge is committed to tracking emerging standards and extending its product family to support these when appropriate. With its extensible field-upgradeable, software architecture madge can incorporate new security technologies as they develop Recommendations Madge recommends deploying robust wireless LAn security solutions ploy an extensible networking and security architecture that can evolve as new standards based wireless LAN technologies emerge(e.g PEAP and 802. 11i) Implement a robust security network that incorporates 802. 1x EAP-TLS using digital certificates and dynamic per-user, per-session WEP keys Where 802.1x EAP-TLS isnt practical consider using IPSec VPNs to secure wireless traffic. When deploying VPNs ensure that the network design accommodates the increased performance requirements of the encryption technology (e.g. 3DES) Centralise security management by using enhanced security products such as the Madge Enterprise Access Server(EAs) Separate a wireless network from a wired network by deploying firewalls Always use WEP encryption, never implement an open system". Use 128-bit WEP keys for maximum security Change WeP keys frequently when not using dynamic keys. Deploy security management products that simplify this process Use device authorisation (e.g. MAC access control) to exclude unwanted wireless clients Change default passwords, network names(e.g. SSIDs) and snMP community strings that are pre-configured in the factory. Change passwords regularly. Use difficult to crack" passwords that are not susceptible to dictionary attacks". Enable "Bios" passwords and screen saver passwords to prevent unauthorised people accessing wireless LAN configuration parameters such as static WEP keys WWP-001 Copyright@ 2002-2003 Madge Limited. All rights reserved 7

8 New Technologies and Future directions The IEEE 802.11i Task Group is working on enhancements to both encryption and authentication in wireless LANs. 802.1x will be incorporated into the 802.11i specifications. Enhancements to WEP include the Temporal Key Integrity Protocol (TKIP). TKIP provides three security improvements: fast-packet keying (key-hashing per packet), real message integrity checking (to prevent forgery) and dynamic key management (re-keying). The Advanced Encryption Standard (AES) is also in the draft 801.11i specifications. AES is a symmetric block cipher operating on blocks of 128 bits using three possible key sizes: 128, 192 and 256 bits. There is an “advanced subset” of 802.11i, known as WiFi Protected Access (WPA), which is compatible with existing hardware; it includes both 802.1x and TKIP. The Internet Engineering Task Force (IETF) has produced an Internet-Draft document defining a new authentication protocol based on EAP called Protected EAP (PEAP). It works by wrapping the EAP protocol within TLS thus protecting the EAP message exchanges. Any EAP authentication method running within PEAP is provided with protected key exchange and session resumption (which allows fast re-authentication when a wireless client roams from one AP to another). Madge is committed to tracking emerging standards and extending its product family to support these when appropriate. With its extensible, field-upgradeable, software architecture Madge can incorporate new security technologies as they develop. 9 Recommendations Madge recommends deploying robust wireless LAN security solutions: Deploy an extensible networking and security architecture that can evolve as new standards￾based wireless LAN technologies emerge (e.g. PEAP and 802.11i). „ „ „ „ „ „ „ „ „ „ Implement a robust security network that incorporates 802.1x EAP-TLS using digital certificates and dynamic per-user, per-session WEP keys. Where 802.1x EAP-TLS isn’t practical consider using IPSec VPNs to secure wireless traffic. When deploying VPNs ensure that the network design accommodates the increased performance requirements of the encryption technology (e.g. 3DES). Centralise security management by using enhanced security products such as the Madge Enterprise Access Server (EAS). Separate a wireless network from a wired network by deploying firewalls. Always use WEP encryption, never implement an “open system”. Use 128-bit WEP keys for maximum security. Change WEP keys frequently when not using dynamic keys. Deploy security management products that simplify this process. Use device authorisation (e.g. MAC access control) to exclude unwanted wireless clients. Change default passwords, network names (e.g. SSIDs) and SNMP community strings that are pre-configured in the factory. Change passwords regularly. Use “difficult to crack” passwords that are not susceptible to “dictionary attacks”. Enable “BIOS” passwords and screen saver passwords to prevent unauthorised people accessing wireless LAN configuration parameters such as static WEP keys (if used). WWP-001 Copyright © 2002-2003 Madge Limited. All rights reserved. Page 7

点击下载完整版文档(PDF)VIP每日下载上限内不扣除下载券和下载次数;
按次数下载不扣除下载券;
24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
已到末页,全文结束
相关文档

关于我们|帮助中心|下载说明|相关软件|意见反馈|联系我们

Copyright © 2008-现在 cucdc.com 高等教育资讯网 版权所有