Você está na página 1de 6

Wind River White paper

IEEE 802.1X in Secure Wireless


Networking
Applying the IEEE 802.1X protocol to wireless networking in conjunction with 802.11 dramatically simplifies
the management of secure wireless LANs. The IEEE 802.1X protocol can also be used to manage policy-based
bandwidth provisioning and VLAN support in conjunction with 802.11e. This paper examines and explores the
current application of 802.1X to wireless networking situations, its important role in today’s network security,
and future directions for the protocol.

Gilbert Goodwill
Member of Technical Staff
Digital Consumer Group

HOW SMART THINGS THINK ™


Wireless security Unfortunately, WEP does not provide a facility With its combination of centralized man-
Network security in a wireless LAN environment to distribute keys to deployed devices. Tradition- agement, management by user instead of
is a unique challenge. Network administrators ally, keys are delivered through some alternate device, network protection and key delivery,
face the security challenges of traditional wired communication method, usually involving a 802.1X seems to be the prescription for
networks plus additional burdens as a result wired network that is considered to be secure. correcting WEP’s failings.
of the range (often wider than intended) of Key distribution is one management prob-
wireless networks. As in wired networks, basic lem associated with WEP that causes adminis- Using 802.1X
controls needed include: trative and security headaches. Another is man- The 802.1X protocol specifies Extensible
•A host system that authenticates the user or agement of authorization for deployed devices. Authentication Protocol (EAP) to carry authen-
device attempting to access the network Device management is usually done through tication messages. As the term “Extensible”
•Encryption that protects the data as it travels MAC addresses. A deployed wireless network implies, EAP can carry any number of actual
from the user device to the access point, allows or disallows access to the network by authentication protocols.
whether to ensure confidentiality or to ensure checking the requester’s MAC address against One example of an EAP authentication
that no one has tampered with the message an access-control list. Complications arise be- method is EAP-TLS. This protocol packages
and changed its content cause most managers administer their access- Transport Layer Security (TLS), an evolution of
control lists at individual access points rather the Secure Sockets Layer (SSL) used in secure
The IEEE 802.1X protocol provides a different
than through a centralized database. This Web browsing, on top of EAP’s message struc-
approach to security and security management
decentralized approach gives rise to a large ture. Another example is EAP-OTP, which speci-
that overcomes the failings of 802.11 Wired
number of lists. If hardware is lost or stolen, fies use of “one time passwords.” For successful
Equivalent Privacy (WEP). To appreciate the
updating the access points individually is time authentication, the entity requesting access to
advantages of 802.1X fully, we must first under-
consuming. Also, access control via MAC- the network and the network’s infrastructure
stand the shortcomings of WEP .
addresses has a greater problem: MAC-address must both support the same EAP “flavor.”
spoofing is relatively trivial for the determined
WEP’s failings
hacker or espionage agent to implement. The marketplace responds
Wireless networks based on 802.11 have been
As the above issues illustrate, not only is IEEE 802.1X specifies a new protocol – EAP
plagued by some well-publicized security fail-
security flawed, but administration of the secu- Over LAN (EAPOL) – for carrying EAP between
ings. The Wireless Equivalent Privacy (WEP)
rity structure in wireless networks is flawed as the supplicant and the protected access point to
encryption built into 802.11 can be compro-
well. Instead of being able to leverage the exist- the network (the authenticator). However, it
mised relatively easily. Wireless sniffing
ing corporate infrastructure for user-based au- does not specify how to carry EAP from the au-
programs, such as AirSnort, can implement
thentication, administrators are forced to allow thenticator to the authentication server.
attacks that exploit these weaknesses. By
access on the basis of keys without a distribu- In an optimal configuration, this server is
gathering enough “interesting” packets, i.e.
tion mechanism and on hardware addresses. centralized and shared. Remote Authentication
those that contain weak initialization vectors
Dial In User Service (RADIUS) has been a nat-
(starting keys), these sniffers can decrypt
IEEE 802.1X’s promise ural choice here. Many network infrastructures
WEP-encoded messages by breaking the keys
IEEE 802.1X is an IEEE standard for “Port- already contain RADIUS servers for verifying
employed by WEP. Some vendors are trying to
Based Network Access Control.” It allows the dial-in users. Allowing them to authenticate
fix this problem through firmware updates that
decision of whether or not to permit network- other forms of network access, including wire-
provide “weak key avoidance.” Unfortunately, it
access to be made at the port, the point of less, is a natural sharing of an already central-
only takes one piece of hardware accessing the
contact to the network itself. Until a port is ized resource. While the use of RADIUS is only
network without these upgrades to compromise
authenticated, it can be used only to pass traffic suggested by the IEEE, it has quickly become
the network.
associated with the authentication process. the de facto authentication server to be used in
Another way of deflecting these attacks is
Authentication can be user-based and managed conjunction with 802.1X.
to change the WEP keys periodically. Before an
at a centralized authentication server. In Even the key delivery portion of 802.1X is
attacker can gather enough information to
addition, 802.1X provides optional abilities to not completely described in the standard. While
deduce the keys, the keys themselves change.
distribute keys. it is clear the EAPOL contains the ability to
deliver keys in its EAPOL-Key messages, the de-
tails of how these keys are derived, when these
key messages are sent, and how the setting of PROTOCOL PRIMER
keys is synchronized between entities are not
specified. The IEEE protocols involved are IEEE 802.11 and 802.1X. IEEE 802.11 is “Wireless LAN Medium
Access Control and Physical Layer Specifications.” This is what is often referred to as “wireless
The marketplace makes everything messier LAN.” The 802.11a specification provides details for the 5.7 gigahertz band allowing 54 Mbps
It has been said, “Wherever a standard is throughput. 802.11b and newer 802.11g are for the 2.4 gigahertz band with an 11 Mbps and
needed at least two will be created.” In the 54 Mbps throughput, respectively. IEEE 802.1X-2001, approved in June of 2001, defines the
absence of a complete specification of how to standard described above including the supplicant, authenticator and authentication server roles,
use 802.1X in conjunction with 802.11, several EAPOL protocol and associated state machines.
manufacturers came up with their own imple- Several IETF RFCs are relevant to the use of 802.1X and its use with 802.11. RFC 2284
mentations. Microsoft rolled out 802.1X in their defines EAP for use with PPP. EAP is used in other scenarios, including port authentication in
Windows XP using EAP-TLS as the EAP method 802.1X and extensions to RADIUS, RFC 2869. EAP is a simple protocol with four packet types:
and RADIUS as the communication to the request, response, success, and failure. The actual protocol “carried” by EAP is not defined in
server. Cisco Systems also chose RADIUS as the RFC 2284. It initially defined types for MD5 (like CHAP, RFC 1994, 2433, 2759), one-time
authenticator-authentication server communi- passwords (OTP), and generic token cards (GTC). RFC 2716 defines EAP-TLS to carry TLS on EAP.
cation protocol, but instead developed their Cisco’s LEAP is proprietary and hence does not have a corresponding RFC. Drafts for other EAP
own EAP method: EAP-Cisco Wireless or methods include EAP-SecurID, EAP-SIM, EAP-SKE, EAP-TTLS, EAP-GSS.
Lightweight EAP (LEAP).

Standard bodies respond as well


IEEE 802.11 has a task group for security is- tocols are considered quite secure but involve that would eliminate the benefit of having a
sues, Task Group I (TGi) developing what will tradeoffs in their use, such as cost of deploy- single authentication server centrally located
become 802.11i. The failings of the original ment, computational burden, and throughput and managed being used by many authentica-
security in the WEP specification have made overhead. VPN type solutions often encrypt only tors (access points). The authentication server
TGi cautious about releasing another flawed at the IP layer, and hence non-IP traffic is not is in most cases a RADIUS server supporting the
model. They have been torn between a com- secured. In addition, the endpoints of VPN RADIUS extensions for EAP.
plete solution that requires deploying new communication usually extend past the wire-
hardware, and a “patch” solution that gives less access point causing an additional burden Comparing authentication in different EAP
adequate security without making current on infrastructure. methods
hardware obsolete. In the meantime, the Cisco Looking at some of the details of EAP methods
and Microsoft-backed solutions, as well as 802.1X roles and protocols used in conjunction with 802.1X will help to
others, gained rapid acceptance. In the wake of There are three roles in 802.1X. While these clarify some of the differences, advantages,
publicity about the WEP failings, corporations roles correspond nicely to some of those used in and disadvantages among them.
and institutions seek to secure their networks 802.11, they do not share the same names. The
and still offer the flexibility of wireless access. device requesting access to the network is the Common framework for 802.1X
supplicant. The supplicant, in 802.11, is a sta- authentication
Other approaches tion device such as a PDA or laptop. The device Regardless of EAP method, all authentication
There are other security options that do not in- “guarding” access to the network and enforc- conversations on 802.1X follow the same gen-
volve 802.1X. Intel and Colubris have each put ing the need for authentication is the authenti- eral structure. The supplicant sends an EAPOL-
out white papers suggesting the use of Virtual cator. The authenticator in 802.11 is an access Start packet to indicate it wishes to be authenti-
Private Network (VPN) technologies such as point – the junction between the protected cated. The authenticator then sends an
IPSec on top of 802.11. Others, such as Symbol, (wired) and unprotected (wireless) networks. EAP-Request/Identity to determine which user
suggest the use of Kerberos instead. These pro- The final role in 802.1X is that of the authenti- wishes access. The authenticator may send this
cation server. While the standard does allow
this to be co-located with the authenticator,
cannot secure delivery of key updates. Follow-
802.1X ROLES
ing that, we can tackle more complex protocols
such as EAP-TLS and LEAP.
There are three roles in 802.1X:
The simple challenge-response is much like
• Supplicant: An end device requesting access to a 802.1X protected network. Laptops, PDAs, and so on. are
CHAP and RFC 1994, with MD5 and RFC 1321.
common supplicants. The supplicant must properly complete the exchange with the authenticator in EAPOL in
Note, following the initial Identity request
order to gain access to the network. Hence, the supplicant must contain the EAPOL protocol, the supplicant
and response, there is only one request (the
state machines and at least one of the specific EAP authentication methods that the authenticator/
challenge from the authentication server)
authentication server of the protected network support. If the EAP method supports it, the supplicant may, in
and one supplicant response before the access
conjunction with the authentication server, generate the “session key” that will be used to encrypt encryption
decision is delivered to the supplicant.
keys delivered to it.
• Authenticator: Typically implemented on an access point, switch or router. This role communicates with that of EAP-TLS
the supplicant in EAPOL. The authenticator’s communication with the authentication server is generally done EAP-TLS was Microsoft’s choice for including
in RADIUS. Hence, the authenticator includes the EAPOL protocol, the authenticator state machines and 802.1X support in Windows XP. TLS is the same
whatever is needed to communicate to the authentication server, typically a RADIUS client. Between initially well-tested security used for online Web-based
engaging a supplicant and completing the authentication process, much of what the authenticator does is transactions. As such, it requires certificates
moving EAP packets between the supplicant (in EAPOL) and the authentication server (typically in RADIUS). and the somewhat heavy infrastructure to cre-
While the authenticator has carried all the traffic between the supplicant and authentication server it does ate, deploy, and verify these certificates. At a
not know the private passwords or certificates used to generate the session key. Following a successful minimum, client certificates must be deployed
authentication, the authenticator receives the session key from the authentication server and distributes (or to supplicants so that the supplicants can prove
indicates) the encryption keys for unicast and multicast traffic. that they are indeed authenticated to access the
• Authentication server: Generally a RADIUS server authenticates users. It derives the session key in network. Server certificates should also be used
conjunction with the supplicant, and, following a successful authentication, delivers the key to the to take advantage of the mutual authentication
authenticator. As long as the RADIUS server supports the RFC 2869 extensions for EAP, and the required available, and prevent “rogue access points”
EAP authentication method, no additional components are mandated here by the 802.1X standard. from fooling supplicants into accessing the
wrong network.
The EAP-TLS conversation is more compli-
cated than that of EAP-MD5, and the details are
message upon initially detecting a supplicant If the authentication succeeds, the RADIUS not covered here. It begins as all 802.1X EAP
without having received the EAPOL-Start mes- server delivers an Access-Accept to the authenti- conversations do, then is followed by TLS start
sage. This will occur when the port is activated, cator, and the authenticator can indicate and hello messages. Certificates are then ex-
as when the 802.11 layer association and au- EAP-Success to the supplicant. If a session key changed and verified, cipher suites negotiated,
thentication is complete. The supplicant identi- has been derived as a result of the EAP method, and finally access is granted, with the session
fies itself with an EAP-Response/Identity re- it will generally be delivered with the Access- key delivered to the authenticator as an MS-
sponse. The authenticator puts the response Accept as a Microsoft or Cisco vendor-specific MPPE attribute. As is the general case when a
into a RADIUS Access-Request to the server. attribute. If the authentication fails, the session key is available, EAPOL Key messages
At this point, a sequence of EAP-Requests authentication server delivers an Access-Reject are delivered from the authenticator to the sup-
and EAP-Responses that are specific to the EAP to the authenticator, which generates an plicant. The multicast key is generated by the
method ensue: EAP-Failure message to the supplicant. access point from random numbers, and is
•from the server in RADIUS to the authentica- encrypted by the session key. The unicast key
tor EAP-MD5 is typically an EAPOL Key message without a
•in EAPOL from authenticator to supplicant Let’s look at EAP-MD5. Its simplicity makes it a key included, indicating that the session key
•in EAPOL from supplicant to authenticator, good starting point to understand what is going itself should be used as the WEP key for
and on, although it is inappropriate for wireless be- unicast traffic.
•from authenticator to authentication server cause it does not generate session keys and thus
in RADIUS.
up a secure channel, and let the supplicant ver-
EAP-MD5 ify it is not dealing with a rogue access point.
Once TLS server certificates establish the
Supplicant Authenticator Authentication “tunnel,” both EAP-TTLS and PEAP run an
Server
“inner” authentication algorithm with that
EAPOL RADIUS tunnel. In EAP-TTLS, the inner algorithm can
be of any sort: PAP, CHAP, etc. In PEAP the in-
EAPOL-Start ner algorithm must be an EAP method. Efforts
EAP-Request/Identity are underway to standardize between the two.
EAP-Response/Identity
802.1X’s Failings?
Access-Request In February, 2002, a paper* was published from
EAP-Response/Identity the University of Maryland detailing problems
Access-Challenge with 802.1X. This paper generated a lot of at-
tention, as 802.1X had seemed to be prescribed
EAP-Request/MD5-Challenge
for the security problems in 802.11 and now
EAP-Request/MD5-Challenge was subject to its own failings. Fortunately, the
EAP-Response/MD5-Response specific attacks described in the paper can be
mitigated by proper use of 802.1X. The attacks
Access-Request
described do not allow unwanted access to the
EAP-Response/MD5-Response network or eavesdropping of encrypted data.
Access-Accept They do allow denial of service and interfering
EAP-Success with proper network access. IEEE 802.11i is
working on some of the issues relating to tying
802.11 and 802.1X’s state machines together.
IEEE 802.1aa also proposes amendments to
802.1X to clarify ambiguities in the original
LEAP from the authentication server and responses standard.
LEAP is Cisco’s proprietary EAP method. The from the supplicant, and as a result cannot ac-
“L” in LEAP is for lightweight. While it provides commodate LEAP’s symmetric traffic. In addi- Wind River’s offerings for wireless security
mutual authentication and generates a session tion, Cisco uses the term LEAP to apply not only Wind River’s WindNet™ 802.1X provides both
key (making it appropriate for wireless use), it to the EAP authentication method, but to supplicant and authenticator roles for 802.1X.
does not require certificates and the burden of changes in 802.11b’s own authentication val- The supplicant can be combined with WindNet
their infrastructure. Instead, LEAP is password- ues. Hence implementing LEAP may require 802.11b Device Driver Kit (DDK) to create de-
based. further control to the underlying 802.11 hard- vices capable of accessing today’s secured wire-
LEAP is a “symmetric” challenge and re- ware than other EAP methods. less network. In combination with WindNet
sponse. The supplicant and then the authenti- 802.11b DDK and WindNet RADIUS Client,
cation server each generate a challenge and EAP-TTLS and PEAP WindNet 802.1X provides a complete solution
verify the other’s response. A session key is gen- Two new EAP methods have recently emerged for creating secure access points.
erated from a combination of these challenges, that combine the security of EAP-TLS and the Wind River’s authenticator role design
their responses, and a password. simplicity of LEAP. Both EAP-TTLS (Tunneled allows any EAP method to pass between the
While LEAP seems to provide all the benefits TLS) and PEAP (Protected EAP) use TLS. But supplicant and authentication server. The
without the impact of certificates, it does have a they only use TLS with server certificates to set authentication state machines are generic
downside. LEAP is Cisco-proprietary and not enough to handle any 802.1X standard con-
widely handled. 802.1X standard defined state forming EAP method, but also to include mod-
machines are designed to pass only requests ifications necessary in order to include LEAP
HOW SMART THINGS THINK ™

amongst the supported protocols. Integration


EAP-TLS efforts with Wind River’s 802.11 offering assure
Supplicant Authenticator Authentication that LEAP’s variations at the 802.11 layer can
Server be accounted for as well. For additional
EAPOL RADIUS manageability of the authenticator/access
point, there is support for 802.11 and 802.1X
EAPOL-Start
EAP-Request/Identity
MIBs and optional use of Envoy Epilogue
EAP-Response/Identity SNMP 9.2.
Access-Request Wind River’s supplicant provides an
EAP-Response/Identity architecture currently supporting LEAP while
Access-Challenge
EAP-Request/TLS-Start
allowing additional EAP methods to be added.
EAP-Request/TLS-Start
EAP-Response/TLS-client_hello Summary
Access-Request
Due to the failings of WEP’s security mecha-
EAP-Response/TLS-client_hello
Access-Challenge nism, additional layers must be employed. De-
EAP-Request/TLS-{server_hello, ployment of effective security cannot wait for
certificate,server_key_exchange, upcoming amendments from the IEEE stan-
certificate_request,
server_hello_done}
dards bodies. While 802.1X will be part of the
EAP-Request/TLS-{server_hello, 802.11i amendments, it is being used effectively
certificate,server_key_exchange, for its increased security and management
certificate_request, benefits. While a deployment requires adminis-
server_hello_done}
EAP-Response/TLS-{certificate,
trators to consider infrastructure costs and in-
client_key_exchange, teroperability, the technology is presently avail-
certificate_verify, able, and deploying a wireless network without
change_cipher_spec,finished}
it would be a critical oversight.
Access-Request
EAP-Response/TLS-{certificate,
client_key_exchange, For more information
certificate_verify, Wind River currently offers leading-edge
change_cipher_spec,finished}
Access-Challenge
802.1X technology. For more information, con-
EAP-Request/TLS-{ tact your local Wind River sales representative
change_cipher_spec,finished} at 1-800-545-9463. Outside the U.S., contact
EAP-Request/TLS-{ the Wind River sales office nearest you.
change_cipher_spec,finished}
EAP-Response/TLS
Access-Request
EAP-Response/TLS
Access-Accept
MS-MPPE-Send-Key
EAP-Success
EAPOL-Key
RC4/indexA-multi *”An Initial Security Analysis of the IEEE 802.1X Standard,”
Arunesh Mishra and William A. Arbaugh, University of
EAPOL-Key Maryland, Feb. 2002.
RC4/indexC-uni

Wind River Worldwide Headquarters Tornado, VxWorks, Wind River and the Wind River logo are trademarks,
500 Wind River Way registered trademarks, or service marks of Wind River Systems, Inc., or its
subsidiaries. All other names mentioned are trademarks, registered trademarks,
Alameda, CA 94501 USA
or service marks of their respective companies.
Toll free 1-800-545-WIND
Phone 1-510-748-4100 ©2002 Wind River Systems MCL-WHP-80X-0208
Fax 1-510-749-2010
Inquiries@windriver.com
Nasdaq: WIND
For additional contact information,
please see our Web site at www.windriver.com.

Você também pode gostar