WiNG How-To Guide 802.11i - Overview
The IEEE 802.11i standard ratified in 2004 provides
enhanced security for WLANs and supersedes the initial 802.11 security
specification Wired Equivalent Privacy (WEP) which was shown to have severe security
weaknesses. The 802.11i standard improves WLAN security by implementing
Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES)
for encryption and data integrity. In addition the 802.11i amends the original
802.11 standard by mandating authentication ether using 802.1X authentication
or pre-shared keys.
The Wi-Fi Alliance that is an organization that
created the “Wi-Fi” brand. The Wi-Fi Alliance promotes and certifies
inter-operability WLAN products and promotes them as the global WLAN standard
across all market segments. The Wi-Fi Alliance has instituted a test suite that
defines how member products are tested to certify that they are interoperable
with other Wi-Fi Certified products.
During the 802.11i standard ratification the Wi-Fi
alliance introduced Wi-Fi Protected Access (WPA) as an intermediate solution to
address WEP vulnerabilities. WPA uses TKIP for encryption and dynamic encryption
key generation. WPA was also designed to be supported on existing WLAN
infrastructure without requiring hardware upgrades.
Wi-Fi Protected Access 2 (WPA2) is the next
generation of Wi-Fi security based on the final 802.11i standard supporting
AES. The new AES encryption mechanism introduced in 802.11i generally requires
a hardware upgrade from earlier versions of WLAN clients and APs, however all
current shipping MotorolaRF Switches and Access Ports / Access Points support
WPA2.
Applications:
802.11i with AES should be considered for all new
WLAN applications as it represents the strongest encryption scheme available
today for data privacy. 802.11i with AES encryption is supported by all new WLAN
client devices including workstations, handhelds and voice handsets.For legacy
deployments which include devices that cannot support AES, it is recommended
that TKIP with 802.1x or pre-shared-keys be utilized. TKIP is supported by most
(but not all) legacy devices via a software update provided by the device
manufacturer.For legacy devices cannot support AES or TKIP, dynamic WEP or VPN
should be considered. Static WEP should only be considered when no other
encryption options are available and should be augmented with firewalls to
reduce the attack footprint.
Restrictions:
WPA/802.11i provides support for pre-shared-keys as
an alternative to 802.1x. A pre-shared-key is typically entered as an 8 - 63
character passphrase on the WLAN infrastructure which the client must know
before being permitted access to the WLAN.WPA and 802.11i pre-shared-key implementations
are potentially susceptible to dictionary attacks when short or weak
passphrases are utilized. This vulnerability is not the fault of WPA/802.11i
and can be thwarted by implementing strong passphrases utilizing 20 or more
random alphanumerical and special characters. Random passphrase generators are
available on the World Wide Web which can generate strong random passphrases of
varying complexity.
Attacks can also be thwarted by implementing Mobile
Unit Intrusion Detection on the RF Switch which can alert administrators of
excessive authentication failures and provide automatic mitigation against attacking
devices.
Finally as a general best practice it is also
recommended to frequently refresh passphrases. The frequency of the refresh
will depend on each specific environment as the passphrases will also need to be
updated on the client devices.
0 nhận xét:
Post a Comment