wpa basics 064-ieee.802

4
TECHNICAL SHEET Page 1 of 4 IEEE 802.1X is the standard protocol for allowing hosts and users to be authenticated to the network before obtaining a connection (port-based network admission control). As well as providing very effective access control to wireless and other networks, it is being used increasingly for other aspects of host security and management. (Note that IEEE 802.1X is dependent on the Extensible Authentication Protocol (EAP) , which is covered by a companion factsheet.) The Basics IEEE 802.1X provides the following core capabilities: port authorisation on a per-user or per-host basis (the authenticator will not forward frames until the RADIUS server signals that the supplicant is authorised) support for multiple authentication methods (thanks to the use of EAP) separation of the authenticator from the back-end authentication server, allowing user management and policy decision making to be centralised. An overview of IEEE 802.1X [1] is shown in Figure 1 below. An EAP [2] exchange encapsulated directly within Ethernet frames is performed between the supplicant and a RADIUS/EAP Server (henceforth RADIUS server), via the authenticator. The EAP exchange between the authenticator and the RADIUS Server is transported by the RADIUS [3] protocol. The RADIUS Server attempts to validate the supplicant’s credentials against a user database server, and signals the result to the authenticator. If the result is a success, the authenticator permits forwarding of frames to and from the supplicant. Figure 1: IEEE 802.1X overview Dynamic VLAN Assignment Besides authentication, perhaps the most useful feature of IEEE 802.1X is dynamic VLAN assignment [4]. A supplicant authenticates to the RADIUS Server, which returns a RADIUS Access-Accept packet to the authenticator. The packet also includes attributes indicating which VLAN to assign to the supplicant’s port. For example, a student logging into a terminal could be assigned the ‘student VLAN’; a member of staff logging in to the same terminal could be assigned the ‘staff VLAN’. If no one is logged in, the terminal may have ‘computer’ credentials that permit access to a ‘maintenance VLAN’ for software updates and remote administration. Note that dynamic VLAN assignment is not part of the IEEE 802.1X specification, but most vendors have implemented it. Figure 2 below illustrates dynamic VLAN assignment. IEEE 802.1X Supplicant Authenticator EAP exchange EAP over LAN EAP over RADIUS RADIUS/EAP server Access-Accept or Access-Deny User database server Request for password Password e.g. LDAP

Upload: api-3710188

Post on 11-Apr-2015

31 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Wpa Basics 064-Ieee.802

TE

CH

NIC

AL

SH

EE

T

Page 1 of 4

IEEE 802.1X is the standard protocol for allowing hosts and users to be authenticated to the network before obtaining a connection (port-based network admission control). As well as providing very effective access control to wireless and other networks, it is being used increasingly for other aspects of host security and management. (Note that IEEE 802.1X is dependent on the Extensible Authentication Protocol (EAP) , which is covered by a companion factsheet.)

The BasicsIEEE 802.1X provides the following core capabilities:

• port authorisation on a per-user or per-host basis (the authenticator will not forward frames until the RADIUS server signals that the supplicant is authorised)

• support for multiple authentication methods (thanks to the use of EAP)

• separation of the authenticator from the back-end authentication server, allowing user management and policy decision making to be centralised.

An overview of IEEE 802.1X [1] is shown in Figure 1 below. An EAP [2] exchange encapsulated directly within Ethernet frames is performed between the supplicant and a RADIUS/EAP Server (henceforth RADIUS server), via the authenticator. The EAP exchange between the authenticator and the RADIUS Server is transported by the RADIUS [3] protocol. The RADIUS Server attempts to validate the supplicant’s credentials against a user database server, and signals the result to the authenticator. If the result is a success, the authenticator permits forwarding of frames to and from the supplicant.

Figure 1: IEEE 802.1X overview

Dynamic VLAN AssignmentBesides authentication, perhaps the most useful feature of IEEE 802.1X is dynamic VLAN assignment [4]. A supplicant authenticates to the RADIUS Server, which returns a RADIUS Access-Accept packet to the authenticator. The packet also includes attributes indicating which VLAN to assign to the supplicant’s port. For example, a student logging into a terminal could be assigned the ‘student VLAN’; a member of staff logging in to the same terminal could be assigned the ‘staff VLAN’. If no one is logged in, the terminal may have ‘computer’ credentials that permit access to a ‘maintenance VLAN’ for software updates and remote administration. Note that dynamic VLAN assignment is not part of the IEEE 802.1X specifi cation, but most vendors have implemented it. Figure 2 below illustrates dynamic VLAN assignment.

IEEE 802.1X

Supplicant Authenticator

EAP exchange

EAP over LAN EAP over RADIUS RADIUS/EAP server

Access-Accept or Access-Deny

User databaseserver

Request for password Password

e.g. LDAP

Page 2: Wpa Basics 064-Ieee.802

TE

CH

NIC

AL

SH

EE

T

Page 2 of 4

Figure 2: Dynamic VLAN assignment

Dynamic KeyingIEEE 802.1X can also improve the encryption provided by IEEE 802.11 [5] wireless networks. The original IEEE 802.11 specifi cation’s privacy and authorisation system, Wired Equivalent Privacy (WEP), required that all wireless clients and access points shared the same secret encryption key. While manageable for a few stations, distributing the key to a large number of clients and access points becomes a signifi cant problem. Moreover, because the key is shared, any host can read any other hosts’ data. To address these problems, many vendors have used IEEE 802.1X to distribute a unique key to each wireless client. This is called dynamic keying. EAP authentication may produce a key, called the Master Session Key (MSK), that is known only by the supplicant and the RADIUS Server. With WEP (see Figure 3 below), the RADIUS server sends the MSK to the Wireless Access Point (WAP) within the RADIUS Access-Accept packet. The WAP generates a new random key, known as the EAPOL key, encrypts it with the MSK and sends it to the supplicant. The supplicant, knowing the MSK, decrypts the EAPOL key and uses it to encrypt subsequent transmissions between the supplicant and the WAP.

Figure 3: dynamic WEP keying

Dynamic keying for WEP’s successors, WPA and WPA2 (both are based on IEEE 802.11i [6]; see also [7]), is similar but differs in a couple of important ways. First, to avoid the poor cryptographic practice of re-using a key in different contexts (in this instance, EAP and WPA/WPA2), the supplicant and RADIUS Server derive a second key from the MSK, called the Pairwise Master Key (PMK) which is used in its place. Secondly, WPA and WPA replace WEP’s one-way transmission of the EAPOL key (from the WAP to the supplicant) with a four-way handshake between the WAP and the supplicant. The four-way handshake uses the PMK to derive further keying material used to encrypt subsequent wireless communications.

Network Admission ControlNetwork Admission Control (NAC) systems enable a network administrator to defi ne a security policy (such as a requirement for a specifi ed patch level) that is tested and enforced whenever a host connects to a network access point, such as a switch, WAP or VPN concentrator. NAC systems typically provide mechanisms for placing non-compliant devices into a quarantine VLAN for patching. At time of writing (October 2005), three NAC solutions are available or imminent: Cisco®’s Network Admission Control [8], Microsoft®’s Network Access Protection [9] and the Trusted Computing Group’s Trusted Network Connect [10]. IEEE 802.1X is a key component of all three solutions.

SupplicantsThe table below provides a comparison of the supplicants available in October 2005.

Supplicant Authenticator

EAP exchange

RADIUS/EAP server

Access-Accept + VLAN 2

VLAN 2

Supplicant Authenticator

EAP exchange

RADIUS server

Access-Accept + MSK (1) EAPOL-Key encrypted with MSK (2)

Protected by EAPOL key (3)

Page 3: Wpa Basics 064-Ieee.802

Ope

ratin

g sy

stem

sE

AP

type

s80

2.11

cip

hers

Oth

er

Supp

lican

tsW

95W

98W

ME

W2K

WX

PL

inux

OSX

PPC

TL

SPE

AP

TT

LS

WE

PW

PAW

PA2

Avai

labi

lity

Eas

e of

us

eN

ativ

e W

indo

ws

ü1

üü

ü2

üü

4In

clud

ed w

ith W

indo

ws

XP

JJ

5

Nat

ive

Mac

OS

ü6

üü

üü

üü

7In

clud

ed w

ith M

acO

S X

JJJ

HP

ProC

urve

C

lient

üü

üü

ü8

ü9

üü

üü

üC

omm

erci

alJJJ

Funk

O

dyss

eyü

üü

üü

üü

üü

üü

Com

mer

cial

JJJ

Mee

tingh

ouse

A

egis

üü

üü

üü

üü

üü

üü

Com

mer

cial

JJJ

Secu

reW

üü

üü

10Fr

ee (G

PL li

cenc

e)JJJ

wpa

_su

pplic

ant

ü11

ü11

ü11

üü

üü

üü

üü

üFr

ee (G

PL/B

SD

licen

ces)

JJ

12

Xsu

pplic

ant

üü

üü

üü

üFr

ee (G

PL/B

SD

licen

ces)

JJJ

Wire

1Xü

üü

üü

üü

Free

(GPL

/BSD

lic

ence

s)J

13

Not

es: 1

. Req

uire

s SP3

. 2. E

AP-

MSC

HA

Pv2

inne

r-met

hod

only

. 3. R

equi

res W

PA d

river

from

ada

pter

ven

dor.

4. R

equi

res S

P2 o

r SP1

and

WPA

driv

er

from

ada

pter

ven

dor.

5. C

ache

s cre

dent

ials

per

man

ently

in re

gist

ry. 6

. Req

uire

s Mac

OS

10.3

. 7. R

equi

res A

irpor

t Ext

rem

e. 8

. Req

uire

s Red

hat 9

+. 9

. R

equi

res M

acO

S 10

.2. 1

0. W

XP

only

. 11.

WEP

and

WPA

onl

y. 1

2. A

dvan

ced

802.

1X a

nd 8

02.1

1 fe

atur

es; b

asic

, but

impr

ovin

g, G

UI.

13. N

o kn

own

prod

uctio

n us

e.Ta

ble

1: a

com

pari

son

of su

pplic

ants

Page 3 of 4

Page 4: Wpa Basics 064-Ieee.802

Page 4 of 4

Bibliography1: IEEE Computer Society, 802.1X - Port Based Network Access Control, 2001.

2: B. Aboba, L. Blunk, J. Vollbrecht, J. Carlson, H. Levkowetz, Ed., RFC3748 - Extensible Authentication Protocol (EAP), 2004.

3: C. Rigney, S. Willens, A. Rubens, W. Simpson, RFC2865 - Remote Authentication Dial In User Service (RADIUS) , 2000.

4: P. Congdon, B. Aboba, A. Smith, G. Zorn, J. Roese, RFC3580 - IEEE 802.1X Remote Authentication Dial In User Service (RADIUS) Usage Guidelines, 2003.

5: IEEE Computer Society, Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifi cations, 1999.

6: IEEE Computer Society, Medium Access Control (MAC) Security Enhancements, 2004.

7: WiFi Alliance, WiFi security at work and on the road: http://www.wi-fi .org/OpenSection/secure.asp?TID=2

8: Cisco Systems, Network Admission Control: http://www.cisco.com/en/US/netsol/ns466/networking_solutions_package.html

9: Microsoft Corp, Network Access Protection: http://www.microsoft.com/nap

10: Trusted Computing Group, Trusted Network Connect: https://www.trustedcomputinggroup.org/downloads/TNC/

TrademarksCisco® is a registered trademark of Cisco Systems, Inc. and/or its affi liates in the US and certain other countries.

Microsoft® is a registered trademark of Microsoft Corporation in the United States and/or other countries.

JANET®, SuperJANET® and UKERNA® are registered trademarks of the Higher Education Funding Councils for England, Scotland and Wales. The JNT Association, trading as UKERNA, is the registered user of these trademarks. JANET, the United Kingdom’s education and research network, is funded by the Joint Information Systems Committee (JISC).

© The JNT Association 2005 Page 4 Page 4 of 4 of 4 PB/INFO/064 (05/11)