WiNG How-To Guide Digital Certificates - Overview
Security in 802.11 systems relies on digital
certificates to provide mutual authentication and encryption. Mutual authentication or trust is provided by
leveraging Public Key Infrastructure (PKI) which allows all parties in the
security exchange to verify and validate digital certificates on each party.
Authentication and encryption is provided using standard public key and private
key algorithms to protect credentials exchanged over the air as well as
exchange credentials.
Certification Authority:
To verify that a digital certificate is not forged,
you need a mechanism to validate it which is provided by a certification
authority (CA). The CA is a trusted third party that can be a private secure
server deployed in an enterprise data center or a public server from a
specialized company offering certificates such as Entrust, Go Daddy or,
VeriSign.
The CA is charged with signing all user and server
certificates and signs a certificate by running a hash of the certificate
contents, encrypting the hash with its Private Key (creating a digital
signature), then appending this signature to the end of the certificate. The CA
also has a certificate of its own called a CA certificate or root certificate.
The root certificate contains the CA’s Public Key and can be freely distributed
any party. Anyone that has the CA’s root certificate installed can validate
certificates issued from the CA.
Most operating systems include root certificates
issued from top public certificate providers allowing secure transactions to be
made on-line without having to manually install root certificates.
Using a CA to sign user and server certificates and
validate them is the simplest form of Public Key Infrastructure (PKI). A
certificate chain includes information about the CA or CA’s involved in issuing
certificates and the user or server certificates themselves. There are other
PKI functions such as certificate revocation lists, cross-certification and
certificate chaining that are used but are beyond the scope of a guide.
Trustpoints:
Server and CA certificates are installed in pairs on
the RF Switch into trustpoints which are assigned to the local RADIUS and HTTPS
services. Each service on the RF Switch supports a single trustpoint allowing
separate server certificates to be used for RADIUS and HTTPS services.
WiNG provides a default trustpoint which includes a
self-signed server certificate which is assigned to the local RADIUS and HTTPS
services. However as the default server certificate is self-signed, no mutual authentication
can be provided as no Certificate Authority (CA) root certificate exists to
allow the end users to trust the self-signed certificate.
To provide mutual authentication and trust for
management, EAP and Hotspot services a trustpoint needs to be created on the RF
Switch and a certificate request generated to a public or enterprise CA. Once
the certificate request has been signed by the CA, the server and CA certificate
can be installed on the RF Switch. Once installed the RF Switch mutual
authentication can occur between all parties with certificates issued from the
CA.
Server Certificates:
Server certificates are digital identifications
containing information about a server, service or organization. Server
certificates contain a public key which is used to create a secure TLS
connection between the service and end user device. In WLAN environments server
certificates are used to provide secure encrypted HTTPS management connections
to RF Switches and Access Points as well as protect credentials over the air
for Hotspot and EAP authentication.Server certificates are required for all
external RADIUS servers providing EAP authentication as well as the RF Switches
providing RADIUS, Hotspot or secure web based management. The RF Switch
supports a single server certificate for local RADIUS services and a single
server certificate to provide Hotspot and secure web based management.
Root Certificates:
A root certificate is a self-signed certificate or
an unsigned public key certificate which forms the foundation of a public key
infrastructure (PKI). A root certificate is the top-most certificate in the
Certificate Authority (CA) tree, and its private key is used sign all
certificates issued from the CA.
Root certificates are installed on end user devices
to identify and verify digital certificates issued from CAs. Root certificates
for common public CAs such as Entrust and VeriSign are typically pre-installed
on most operating systems allowing the end user devices to automatically trust
servers and applications using digital certificates issued from these CAs.
However in enterprise environments, a private CA is often deployed and CA
certificates are automatically or manually distributed to end user devices
before certificate verification and trust can occur.It’s not mandatory that a
CA root certificate be installed on the end user device for WLAN authentication
as web browsers and 802.1X supplicants can establish a secure connection to a
peer without a CA certificate being present. However in WLAN deployments it is
strongly recommended that a CA root be installed as the CA certificate provides
the only mechanism for the end device to verify the identity of the presented
digital certificate prior to credentials being exchanged. Without a CA
certificate being installed, the device is susceptible to man-in-the-middle
(MIN) attacks.
Applications:
Digital certificates are required to enable the
following services on the RF Switch:
1) Secure Web
UI Management – Provides secure remote web based management of the RF Switch.
When enabled all web management configuration transactions are encrypted using Transactional
Layered Services (TLS). In addition PKI allows the remote management station to
verify the identity of the RF Switch prior to submitting management
credentials.
2) EAP
Authentication – When using the integrated RADIUS server, PKI allows the RF
Switch to authenticate users using PEAP, EAP-TLS and EAP-TTLS. These EAP
methods provide mutual authentication between the RF Switch and 802.1X
supplicant as well as a secure TLS tunnel to exchange credentials over the air.
3) Hotspot
Authentication – Provides web based authentication for users. When users
authenticate to the RF Switch by presenting a username and password which is
encrypted over the air using TLS. In addition PKI provides the ability to allow
the end user to verify the identity of the RF Switch prior to submitting
credentials.
1.3
Restrictions:
At this time only a single trustpoint can be
assigned to the HTTPS service which is shared for both secure Web-UI management
and Hotspot services.
If Hotspot authentication is required, Motorola
recommends that the hostname for the CN field in the server certificate be
defined to resolve to the IP address assigned to the Hotspot virtual interface.
This will ensure compatibility with Mozilla Firefox and Microsoft Internet
Explorer which uses the CN field to detect phishing attacks.
0 nhận xét:
Post a Comment