CCNA Wireless Summary Notes: Wireless Security Fundamentals – Part 2

Wireless Privacy and Integrity Methods

  1. WEP
    • deprecated
  2. Temporal Key Integrity Protocol (TKIP)
    • Developed by 802.11i working group and the Wi-Fi Alliance
    • Adds following features to legacy hardware with WEP
      • MIC — Algorithm that adds a hash value to each frame as a message integrity
        check to prevent tamperin
      • Time stamp —Added into the MIC to prevent replay attacks
      • Sender’s MAC address — Added to the MIC
      • TKIP sequence counter —Provides a record of frames sent by a unique MAC
        address
      • Key mixing algorithm —Computes a unique 128-bit WEP key for each frame.
      • Longer Initialization Vector (IV) —The IV size is 48 bits, making it  impossible to exhaust all WEP keys by brute force calculation.
    • Should be avoided
    • deprecated in the 802.11-2012 standard
  3. Counter/CBC-MAC Protocol (CCMP)
    • Best method so far
    • Cannot be used in legacy devices that support only WEP or TKIP.
    • Has 2 algorithms:
      • AES counter mode encryption – used in US gov etc. Its open and publicly available and most secure.
      • Cipher Block Chaining Message Authentication Code (CBC-MAC) for integrity checks
    • The wireless network must support both AES counter mode and CBC-MAC in hardware

WPA and WPA2

IEEE 802.11i standard defines best practice wireless security methods.

The Wi-Fi Alliance introduced its Wi-Fi Protected Access (WPA) industry standard while IEEE 802.11i standard was being developed. WPA was based on parts of 802.11i and included 802.1x authentication, TKIP, and a method for dynamic encryption key management. They later developed WPA2 standared that is compared below.

2014_07_09_10_25_47_CCNA_Wireless_640_722_Official_Cert_Guide_SECURED_Adobe_Reader

Wi-Fi Alliance certifies interoperability with methods like EAP-TLS, PEAP, EAP-TTLS, and EAP-SIM.

Both can have the following authentication modes:

  • Personal mode – uses preshared key for smaller deployments.
  • Enterprise mode – uses 802.1x EAP-based authentication

Best Practice is to use WPA2 and CCMP.

Management Frame Protection (MFP)

Developed by Cisco to mitigate attacks that leverage AP management frames in 2 forms:

  1. Infrastructure MFP – APs add a MIC toward the end of each frame. Neighbouring APs in the same infrastructure can understand and determine if the frame has been altered and alert controller. Participating APs compute and tag management frames with a MIC value and then listen
    to detect any evidence of tampering. Clients do not participate in this.
  2. Client MFP – only associated clients and neighboring APs can understand the MIC and encryption of the management frames. Client MFP, in contrast, uses a MIC to protect management frame integrity and adds
    end-to-end encryption to protect the privacy of management frame contents. Clients must be capable of participating too, to decrypt the management frames and validate the MIC value.

Clients must support CCXv5 and must use WPA2 with  TKIP or CCMP.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s