SlideShare a Scribd company logo
Global Leader in Wireless Security




Hooray, 802.11w Is Ratified...
So, What Does it Mean for Your WLAN?
A Brief Tutorial on IEEE 802.11w


Gopinath K N and Hemant Chaskar

AirTight Networks
www.AirTightNetworks.com




                    2009 AirTight Networks, Inc. All Rights Reserved.
Background

 802.11 WiFi going from
 “convenience” to “mission critical”
                                                                                              Access
 However, ever since inception,                                              Client
                                                                                              Point (AP)
 WiFi has been vulnerable to
 Denial of Service (DoS) attacks
 of various types:
                                                                                        X
  • RF Jamming
  • Virtual Jamming
  • Spoofed Disconnect
  • EAP Spoofing
                                                                                      DoS Attacker
  • Connection Request Flooding
  • etc.

 Page 2                  2009 AirTight Networks, Inc. All Rights Reserved.
802.11w: A step in the direction of DoS avoidance

 802.11w gets rid of “Spoofed Disconnect” DoS attacks
 resulting from spoofing of
  • (i) Deauthentication (Deauth), (ii) Disassociation (Disassoc), (iii)
     Association (Assoc) Request in existing connection, or (iv)
     Authentication (Auth) Request in existing connection


 Certain “Action Management Frames” are also made
 anti-spoofing
  • Spectrum Management, QoS, BlockAck, Radio Measurement,
     Fast BSS Transition




 Page 3                    2009 AirTight Networks, Inc. All Rights Reserved.
How does 802.11w avoid Spoofed Disconnect DoS

 802.11w adds cryptographic protection to Deauth and
 Disassoc frames to make them anti-spoofing


 Mechanism called Security Association (SA) teardown
 protection is added to prevent spoofed Assoc Request
 or Auth Request from disconnecting the already
 connected Client




 Page 4            2009 AirTight Networks, Inc. All Rights Reserved.
Example: Deauth Attack




                                            • Deauthentication frame was
                                              meant to gracefully break the
                                              connection between AP and Client
                                            • Problem however is that it is in
                                              clear text, so it can be spoofed (in
                                              the absence of 802.11w)



 Page 5         2009 AirTight Networks, Inc. All Rights Reserved.
Example: Deauth attack averted with 802.11w

 Only legitimate Deauth is accepted                                        MIC (Message
                                                                           Integrity Code)
 Spoofed Deauth is ignored
                                                                             added using
                                                                              shared key
              Legitimate Deauth

             Legacy Deauth           MIC
                                                                               Secret key
                                                                                shared
                                                                              between AP
                                                                               and Client

                                               th
                                            eau
                                     ofed
                                          D       MIC                            No MIC or
                                 Spo          th
                                         D eau                                    bad MIC
                                    ac y
                                 Leg


 Page 6                2009 AirTight Networks, Inc. All Rights Reserved.
Where does the shared secret key come from

 It is derived using EAPOL 4-way handshake between
 AP and Client
 This also means that 802.11w can only be used if you
 are using WPA or WPA2
 Broadcast/multicast management frames are protected
 using a key called Integrity Group Temporal Key (IGTK)
 Unicast management frames are protected using
 WPA/WPA2 pair-wise encryption key (PTK)




 Page 7            2009 AirTight Networks, Inc. All Rights Reserved.
SA teardown protection

 Pre 802.11w, if AP receives Assoc or Auth Request
 from already associated Client, it terminates existing
 connection to start a new one
   • So existing connection can be broken with spoofed Auth
      Request or Assoc Request
 With SA teardown of 802.11w
   • After AP receives Assoc or Auth Request for associated Client,

   • Crypto protected probe is sent to Client
   • If crypto protected response is received, the Assoc or Auth
      Request is considered spoofed and rejected
   • Else, existing connection is terminated to start a new one

 Page 8                  2009 AirTight Networks, Inc. All Rights Reserved.
How are Action Mgmt Frames made spoof
resistant

By adding authentication & encryption using IGTK
 • Spectrum Management
 • QoS
 • DLS
 • Block Ack
 • Radio measurement
 • Fast BSS Transition
 • HT
 • SA Query
 • Protected Dual of Public Action


 Page 9                  2009 AirTight Networks, Inc. All Rights Reserved.
802.11w: A piece in WiFi security puzzle

802.11w averts Spoofed Disconnect DoS and makes Action
Management Frames spoof-resistant
Other DoS attacks (RF jamming, virtual jamming, EAP spoofing,
connection request flooding etc.) are outside the scope of 802.11w
WPA/WPA2 is still needed for client authentication and data
encryption. Also WPA/WPA2 is needed for 802.11w to work
Threats from unmanaged devices (rogue APs, mis-associations, ad
hoc connections, honeypots (Evil Twin), AP/client MAC spoofing,
cracking, infrastructure attacks (skyjacking) etc.) are outside the
scope of 802.11w
 You should definitely enable 802.11w in your WLAN when it
becomes available (shortly) in WLAN equipment, but one should not
be complacent that it will solve all wireless security problems

 Page 10                2009 AirTight Networks, Inc. All Rights Reserved.
Questions/comments




                     Please discuss@
     http://blog.airtightnetworks.com/802-11w-tutorial/




  Page 11              2009 AirTight Networks, Inc. All Rights Reserved.
Appendix 1: Broadcast Integrity
Protocol (BIP)


 Provides authentication and replay protection for
 broadcast/multicast Management Frames
 Uses “Integrity Group Temporal Key” (IGTK), a new
 key derived & distributed via EAPOL 4-way handshake
 Transmitter appends each protected frame with a
 Management MIC Information Element (IE)
 Receiver validates the MIC before accepting the frame




 Page 12             2009 AirTight Networks, Inc. All Rights Reserved.
Appendix 2: Message Integrity Check (MIC) IE


           ID   Length      Key ID                    IPN                    MIC
 ID
 • Information Element number

 Key ID
 • Indicates the IGTK used for computing MIC

 IPN
 • Used for replay protection
 • Monotonically increasing non-negative number

 MIC
 • The keyed cryptographic hash derived over management frame
    body (Payload + MAC header)
 Page 13                 2009 AirTight Networks, Inc. All Rights Reserved.
Appendix 3: 802.11w parameter negotiation

    Negotiated at the beginning of Association




                   MFP Mandatory                                         AES-128-CMAC
                   MFPR = 1
                   MFPC = 0
 Page 14             2009 AirTight Networks, Inc. All Rights Reserved.

More Related Content

What's hot

GRE (Generic Routing Encapsulation)
GRE (Generic Routing Encapsulation)GRE (Generic Routing Encapsulation)
GRE (Generic Routing Encapsulation)
NetProtocol Xpert
 
DDoS Threats Landscape : Countering Large-scale DDoS attacks
DDoS Threats Landscape : Countering Large-scale DDoS attacksDDoS Threats Landscape : Countering Large-scale DDoS attacks
DDoS Threats Landscape : Countering Large-scale DDoS attacks
MyNOG
 
WPA3 - What is it good for?
WPA3 - What is it good for?WPA3 - What is it good for?
WPA3 - What is it good for?
Tom Isaacson
 
5G Network Slicing
5G Network Slicing5G Network Slicing
5G Network Slicing
Sridhar Bhaskaran
 
nl80211 and libnl
nl80211 and libnlnl80211 and libnl
nl80211 and libnl
awkman
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
Nilesh Sapariya
 
DDS: The IoT Data Sharing Standard
DDS: The IoT Data Sharing StandardDDS: The IoT Data Sharing Standard
DDS: The IoT Data Sharing Standard
Angelo Corsaro
 
Spanning-Tree
Spanning-TreeSpanning-Tree
Spanning-Tree
Thomas Moegli
 
5G End to-end network slicing Demo
5G End to-end network slicing Demo5G End to-end network slicing Demo
5G End to-end network slicing Demo
ITU
 
Module 1: ConfD Technical Introduction
Module 1: ConfD Technical IntroductionModule 1: ConfD Technical Introduction
Module 1: ConfD Technical Introduction
Tail-f Systems
 
Lagopus + DockerのDPDK接続
Lagopus + DockerのDPDK接続Lagopus + DockerのDPDK接続
Lagopus + DockerのDPDK接続
Tomoya Hibi
 
Technical Overview of Cisco Catalyst 9200 Series Switches
Technical Overview of Cisco Catalyst 9200 Series SwitchesTechnical Overview of Cisco Catalyst 9200 Series Switches
Technical Overview of Cisco Catalyst 9200 Series Switches
Robb Boyd
 
001 osn 9800 m wdm series main slides 202008-v1-r19c10-mo (1) (002)
001 osn 9800 m wdm series main slides 202008-v1-r19c10-mo (1) (002)001 osn 9800 m wdm series main slides 202008-v1-r19c10-mo (1) (002)
001 osn 9800 m wdm series main slides 202008-v1-r19c10-mo (1) (002)
victoriovega
 
CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1
Irsandi Hasan
 
SSL And TLS
SSL And TLS SSL And TLS
SSL And TLS
Ghanshyam Patel
 
Microsoft Active Directory
Microsoft Active DirectoryMicrosoft Active Directory
Microsoft Active Directorythebigredhemi
 
L2 over l3 ecnaspsulations (english)
L2 over l3 ecnaspsulations (english)L2 over l3 ecnaspsulations (english)
L2 over l3 ecnaspsulations (english)Motonori Shindo
 
Huawei Training slides
Huawei Training slidesHuawei Training slides
Huawei Training slidesrydenova
 
Transforming Private 5G Networks
Transforming Private 5G NetworksTransforming Private 5G Networks
Transforming Private 5G Networks
inside-BigData.com
 

What's hot (20)

GRE (Generic Routing Encapsulation)
GRE (Generic Routing Encapsulation)GRE (Generic Routing Encapsulation)
GRE (Generic Routing Encapsulation)
 
DDoS Threats Landscape : Countering Large-scale DDoS attacks
DDoS Threats Landscape : Countering Large-scale DDoS attacksDDoS Threats Landscape : Countering Large-scale DDoS attacks
DDoS Threats Landscape : Countering Large-scale DDoS attacks
 
WPA3 - What is it good for?
WPA3 - What is it good for?WPA3 - What is it good for?
WPA3 - What is it good for?
 
5G Network Slicing
5G Network Slicing5G Network Slicing
5G Network Slicing
 
nl80211 and libnl
nl80211 and libnlnl80211 and libnl
nl80211 and libnl
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
 
DDS: The IoT Data Sharing Standard
DDS: The IoT Data Sharing StandardDDS: The IoT Data Sharing Standard
DDS: The IoT Data Sharing Standard
 
Spanning-Tree
Spanning-TreeSpanning-Tree
Spanning-Tree
 
5G End to-end network slicing Demo
5G End to-end network slicing Demo5G End to-end network slicing Demo
5G End to-end network slicing Demo
 
Module 1: ConfD Technical Introduction
Module 1: ConfD Technical IntroductionModule 1: ConfD Technical Introduction
Module 1: ConfD Technical Introduction
 
Lagopus + DockerのDPDK接続
Lagopus + DockerのDPDK接続Lagopus + DockerのDPDK接続
Lagopus + DockerのDPDK接続
 
Technical Overview of Cisco Catalyst 9200 Series Switches
Technical Overview of Cisco Catalyst 9200 Series SwitchesTechnical Overview of Cisco Catalyst 9200 Series Switches
Technical Overview of Cisco Catalyst 9200 Series Switches
 
001 osn 9800 m wdm series main slides 202008-v1-r19c10-mo (1) (002)
001 osn 9800 m wdm series main slides 202008-v1-r19c10-mo (1) (002)001 osn 9800 m wdm series main slides 202008-v1-r19c10-mo (1) (002)
001 osn 9800 m wdm series main slides 202008-v1-r19c10-mo (1) (002)
 
CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1CCNA RS_ITN - Chapter 1
CCNA RS_ITN - Chapter 1
 
SSL And TLS
SSL And TLS SSL And TLS
SSL And TLS
 
Payment Hsm Payshield9000
Payment Hsm Payshield9000Payment Hsm Payshield9000
Payment Hsm Payshield9000
 
Microsoft Active Directory
Microsoft Active DirectoryMicrosoft Active Directory
Microsoft Active Directory
 
L2 over l3 ecnaspsulations (english)
L2 over l3 ecnaspsulations (english)L2 over l3 ecnaspsulations (english)
L2 over l3 ecnaspsulations (english)
 
Huawei Training slides
Huawei Training slidesHuawei Training slides
Huawei Training slides
 
Transforming Private 5G Networks
Transforming Private 5G NetworksTransforming Private 5G Networks
Transforming Private 5G Networks
 

Viewers also liked

Dos on 802.11 and other security issues ( Case Study )
Dos on 802.11 and other security issues ( Case Study ) Dos on 802.11 and other security issues ( Case Study )
Dos on 802.11 and other security issues ( Case Study )
Shrobon Biswas
 
Proposta de avaliação de uma WLAN com padrão 802.11w sob ataques RF Jamming
Proposta de avaliação de uma WLAN com padrão 802.11w sob ataques RF Jamming Proposta de avaliação de uma WLAN com padrão 802.11w sob ataques RF Jamming
Proposta de avaliação de uma WLAN com padrão 802.11w sob ataques RF Jamming
Felipe Cesar Costa
 
When WLANs Launch Self DoS Attacks
When WLANs Launch Self DoS AttacksWhen WLANs Launch Self DoS Attacks
When WLANs Launch Self DoS Attacks
AirTight Networks
 
802.11-2012 Update
802.11-2012 Update802.11-2012 Update
802.11-2012 Update
Savvius, Inc
 
802.11i
802.11i802.11i
WLAN Attacks and Protection
WLAN Attacks and ProtectionWLAN Attacks and Protection
WLAN Attacks and Protection
Chandrak Trivedi
 
Aruba OS 6.4 User Guide
Aruba OS 6.4 User GuideAruba OS 6.4 User Guide
Best Practices on Migrating to 802.11ac Wi-Fi
Best Practices on Migrating to 802.11ac Wi-FiBest Practices on Migrating to 802.11ac Wi-Fi
Best Practices on Migrating to 802.11ac Wi-Fi
Aruba, a Hewlett Packard Enterprise company
 

Viewers also liked (8)

Dos on 802.11 and other security issues ( Case Study )
Dos on 802.11 and other security issues ( Case Study ) Dos on 802.11 and other security issues ( Case Study )
Dos on 802.11 and other security issues ( Case Study )
 
Proposta de avaliação de uma WLAN com padrão 802.11w sob ataques RF Jamming
Proposta de avaliação de uma WLAN com padrão 802.11w sob ataques RF Jamming Proposta de avaliação de uma WLAN com padrão 802.11w sob ataques RF Jamming
Proposta de avaliação de uma WLAN com padrão 802.11w sob ataques RF Jamming
 
When WLANs Launch Self DoS Attacks
When WLANs Launch Self DoS AttacksWhen WLANs Launch Self DoS Attacks
When WLANs Launch Self DoS Attacks
 
802.11-2012 Update
802.11-2012 Update802.11-2012 Update
802.11-2012 Update
 
802.11i
802.11i802.11i
802.11i
 
WLAN Attacks and Protection
WLAN Attacks and ProtectionWLAN Attacks and Protection
WLAN Attacks and Protection
 
Aruba OS 6.4 User Guide
Aruba OS 6.4 User GuideAruba OS 6.4 User Guide
Aruba OS 6.4 User Guide
 
Best Practices on Migrating to 802.11ac Wi-Fi
Best Practices on Migrating to 802.11ac Wi-FiBest Practices on Migrating to 802.11ac Wi-Fi
Best Practices on Migrating to 802.11ac Wi-Fi
 

Similar to 802.11w Tutorial

Pentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 IssuePentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 Issue
Ishan Girdhar
 
F5 Networks: architecture and risk management
F5 Networks: architecture and risk managementF5 Networks: architecture and risk management
F5 Networks: architecture and risk management
AEC Networks
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
WPA/WPA2 TKIP Exploit
WPA/WPA2 TKIP ExploitWPA/WPA2 TKIP Exploit
WPA/WPA2 TKIP Exploit
AirTight Networks
 
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Dr. Amarjeet Singh
 
Wi Fi
Wi FiWi Fi
Protect your guest wifi - NOW
Protect your guest wifi - NOWProtect your guest wifi - NOW
Protect your guest wifi - NOW
Joshua Sibaja
 
Bapinger Network Security
Bapinger Network SecurityBapinger Network Security
Bapinger Network Security
Djadja Sardjana
 
D2 d wifi
D2 d wifiD2 d wifi
D2 d wifi
brkavyashree
 
Bloombase Spitfire Link Encryptor Server Brochure
Bloombase Spitfire Link Encryptor Server BrochureBloombase Spitfire Link Encryptor Server Brochure
Bloombase Spitfire Link Encryptor Server BrochureBloombase
 
Monetizing the Enterprise: Borderless Networks
Monetizing the Enterprise: Borderless NetworksMonetizing the Enterprise: Borderless Networks
Monetizing the Enterprise: Borderless Networks
Cisco Service Provider Mobility
 
Authenticated Identites in VoIP Call Control
Authenticated Identites in VoIP Call ControlAuthenticated Identites in VoIP Call Control
Authenticated Identites in VoIP Call Control
Warren Bent
 
Presentation To Vo Ip Round Table V2
Presentation To Vo Ip Round Table V2Presentation To Vo Ip Round Table V2
Presentation To Vo Ip Round Table V2Warren Bent
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and Solutions
hemantchaskar
 
Wireless security
Wireless securityWireless security
Wireless securityparipec
 
Pangpse training q12011
Pangpse training q12011Pangpse training q12011
Pangpse training q12011Joe Palo Alto
 
Cat6500 Praesentation
Cat6500 PraesentationCat6500 Praesentation
Cat6500 Praesentation
Sophan_Pheng
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
siDz
 
IoT Security
IoT SecurityIoT Security
IoT Security
Peter Waher
 

Similar to 802.11w Tutorial (20)

Pentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 IssuePentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 Issue
 
F5 Networks: architecture and risk management
F5 Networks: architecture and risk managementF5 Networks: architecture and risk management
F5 Networks: architecture and risk management
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
WPA/WPA2 TKIP Exploit
WPA/WPA2 TKIP ExploitWPA/WPA2 TKIP Exploit
WPA/WPA2 TKIP Exploit
 
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
 
Wi Fi
Wi FiWi Fi
Wi Fi
 
Protect your guest wifi - NOW
Protect your guest wifi - NOWProtect your guest wifi - NOW
Protect your guest wifi - NOW
 
Bapinger Network Security
Bapinger Network SecurityBapinger Network Security
Bapinger Network Security
 
Airheads vail 2011 pci 2.0 compliance
Airheads vail 2011   pci 2.0 complianceAirheads vail 2011   pci 2.0 compliance
Airheads vail 2011 pci 2.0 compliance
 
D2 d wifi
D2 d wifiD2 d wifi
D2 d wifi
 
Bloombase Spitfire Link Encryptor Server Brochure
Bloombase Spitfire Link Encryptor Server BrochureBloombase Spitfire Link Encryptor Server Brochure
Bloombase Spitfire Link Encryptor Server Brochure
 
Monetizing the Enterprise: Borderless Networks
Monetizing the Enterprise: Borderless NetworksMonetizing the Enterprise: Borderless Networks
Monetizing the Enterprise: Borderless Networks
 
Authenticated Identites in VoIP Call Control
Authenticated Identites in VoIP Call ControlAuthenticated Identites in VoIP Call Control
Authenticated Identites in VoIP Call Control
 
Presentation To Vo Ip Round Table V2
Presentation To Vo Ip Round Table V2Presentation To Vo Ip Round Table V2
Presentation To Vo Ip Round Table V2
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and Solutions
 
Wireless security
Wireless securityWireless security
Wireless security
 
Pangpse training q12011
Pangpse training q12011Pangpse training q12011
Pangpse training q12011
 
Cat6500 Praesentation
Cat6500 PraesentationCat6500 Praesentation
Cat6500 Praesentation
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
 
IoT Security
IoT SecurityIoT Security
IoT Security
 

More from AirTight Networks

Is 11ac Right for Your Network?
Is 11ac Right for Your Network?Is 11ac Right for Your Network?
Is 11ac Right for Your Network?
AirTight Networks
 
Air tight 11ac webinar series session 2 - 11ac feature deep dive - june 2014
Air tight 11ac webinar series   session 2 - 11ac feature deep dive - june 2014Air tight 11ac webinar series   session 2 - 11ac feature deep dive - june 2014
Air tight 11ac webinar series session 2 - 11ac feature deep dive - june 2014
AirTight Networks
 
Wi-Fi Offload Summit - Monetise Thyself
Wi-Fi Offload Summit - Monetise ThyselfWi-Fi Offload Summit - Monetise Thyself
Wi-Fi Offload Summit - Monetise ThyselfAirTight Networks
 
AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014
AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014
AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014
AirTight Networks
 
Restaurant Wi-Fi Primer: Retail Analytics and Social Integration
Restaurant Wi-Fi Primer: Retail Analytics and Social Integration Restaurant Wi-Fi Primer: Retail Analytics and Social Integration
Restaurant Wi-Fi Primer: Retail Analytics and Social Integration
AirTight Networks
 
AirTight Networks Evolution - Cloud & MSP
AirTight Networks Evolution - Cloud & MSPAirTight Networks Evolution - Cloud & MSP
AirTight Networks Evolution - Cloud & MSP
AirTight Networks
 
AirTight Networks WIPS at Wireless Field Day 6 WFD6
AirTight Networks WIPS at Wireless Field Day 6 WFD6AirTight Networks WIPS at Wireless Field Day 6 WFD6
AirTight Networks WIPS at Wireless Field Day 6 WFD6
AirTight Networks
 
AirTight social wifi solution brief
AirTight social wifi solution briefAirTight social wifi solution brief
AirTight social wifi solution brief
AirTight Networks
 
Considerations for a secure enterprise wlan data connectors 2013
Considerations for a secure enterprise wlan   data connectors 2013Considerations for a secure enterprise wlan   data connectors 2013
Considerations for a secure enterprise wlan data connectors 2013
AirTight Networks
 
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
AirTight Networks
 
Survey on the Impact of BYOD on Enterprise Security
Survey on the Impact of BYOD on Enterprise SecuritySurvey on the Impact of BYOD on Enterprise Security
Survey on the Impact of BYOD on Enterprise Security
AirTight Networks
 
AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...
AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...
AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...
AirTight Networks
 
Non WiFi interference combat guide 1
Non WiFi interference combat guide 1Non WiFi interference combat guide 1
Non WiFi interference combat guide 1
AirTight Networks
 
WPA2 Hole196 Vulnerability FAQs
WPA2 Hole196 Vulnerability FAQsWPA2 Hole196 Vulnerability FAQs
WPA2 Hole196 Vulnerability FAQs
AirTight Networks
 
WPA2 Hole196 Vulnerability: Exploits and Remediation Strategies
WPA2 Hole196 Vulnerability: Exploits and Remediation StrategiesWPA2 Hole196 Vulnerability: Exploits and Remediation Strategies
WPA2 Hole196 Vulnerability: Exploits and Remediation Strategies
AirTight Networks
 
Conquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the EnterpriseConquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the Enterprise
AirTight Networks
 
Windows 7 - A New Wireless Risk to the Enterprise
Windows 7 - A New Wireless Risk to the EnterpriseWindows 7 - A New Wireless Risk to the Enterprise
Windows 7 - A New Wireless Risk to the Enterprise
AirTight Networks
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and Solutions
AirTight Networks
 
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And CountermeasuresSkyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
AirTight Networks
 
Retail Stores and Wireless Security—Recommendations
Retail Stores and Wireless Security—RecommendationsRetail Stores and Wireless Security—Recommendations
Retail Stores and Wireless Security—Recommendations
AirTight Networks
 

More from AirTight Networks (20)

Is 11ac Right for Your Network?
Is 11ac Right for Your Network?Is 11ac Right for Your Network?
Is 11ac Right for Your Network?
 
Air tight 11ac webinar series session 2 - 11ac feature deep dive - june 2014
Air tight 11ac webinar series   session 2 - 11ac feature deep dive - june 2014Air tight 11ac webinar series   session 2 - 11ac feature deep dive - june 2014
Air tight 11ac webinar series session 2 - 11ac feature deep dive - june 2014
 
Wi-Fi Offload Summit - Monetise Thyself
Wi-Fi Offload Summit - Monetise ThyselfWi-Fi Offload Summit - Monetise Thyself
Wi-Fi Offload Summit - Monetise Thyself
 
AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014
AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014
AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014
 
Restaurant Wi-Fi Primer: Retail Analytics and Social Integration
Restaurant Wi-Fi Primer: Retail Analytics and Social Integration Restaurant Wi-Fi Primer: Retail Analytics and Social Integration
Restaurant Wi-Fi Primer: Retail Analytics and Social Integration
 
AirTight Networks Evolution - Cloud & MSP
AirTight Networks Evolution - Cloud & MSPAirTight Networks Evolution - Cloud & MSP
AirTight Networks Evolution - Cloud & MSP
 
AirTight Networks WIPS at Wireless Field Day 6 WFD6
AirTight Networks WIPS at Wireless Field Day 6 WFD6AirTight Networks WIPS at Wireless Field Day 6 WFD6
AirTight Networks WIPS at Wireless Field Day 6 WFD6
 
AirTight social wifi solution brief
AirTight social wifi solution briefAirTight social wifi solution brief
AirTight social wifi solution brief
 
Considerations for a secure enterprise wlan data connectors 2013
Considerations for a secure enterprise wlan   data connectors 2013Considerations for a secure enterprise wlan   data connectors 2013
Considerations for a secure enterprise wlan data connectors 2013
 
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
Drive Revenue, Protect Data, & Automate PCI Compliance by Dwight Agriel | @Ai...
 
Survey on the Impact of BYOD on Enterprise Security
Survey on the Impact of BYOD on Enterprise SecuritySurvey on the Impact of BYOD on Enterprise Security
Survey on the Impact of BYOD on Enterprise Security
 
AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...
AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...
AirTight Secure Wi-Fi™ Cloud-based Secure Wi-Fi Access with PCI Wireless Scan...
 
Non WiFi interference combat guide 1
Non WiFi interference combat guide 1Non WiFi interference combat guide 1
Non WiFi interference combat guide 1
 
WPA2 Hole196 Vulnerability FAQs
WPA2 Hole196 Vulnerability FAQsWPA2 Hole196 Vulnerability FAQs
WPA2 Hole196 Vulnerability FAQs
 
WPA2 Hole196 Vulnerability: Exploits and Remediation Strategies
WPA2 Hole196 Vulnerability: Exploits and Remediation StrategiesWPA2 Hole196 Vulnerability: Exploits and Remediation Strategies
WPA2 Hole196 Vulnerability: Exploits and Remediation Strategies
 
Conquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the EnterpriseConquering the Minefield of Soft Rogue APs in the Enterprise
Conquering the Minefield of Soft Rogue APs in the Enterprise
 
Windows 7 - A New Wireless Risk to the Enterprise
Windows 7 - A New Wireless Risk to the EnterpriseWindows 7 - A New Wireless Risk to the Enterprise
Windows 7 - A New Wireless Risk to the Enterprise
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and Solutions
 
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And CountermeasuresSkyjacking A Cisco Wlan Attack Analysis And Countermeasures
Skyjacking A Cisco Wlan Attack Analysis And Countermeasures
 
Retail Stores and Wireless Security—Recommendations
Retail Stores and Wireless Security—RecommendationsRetail Stores and Wireless Security—Recommendations
Retail Stores and Wireless Security—Recommendations
 

Recently uploaded

To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 

Recently uploaded (20)

To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 

802.11w Tutorial

  • 1. Global Leader in Wireless Security Hooray, 802.11w Is Ratified... So, What Does it Mean for Your WLAN? A Brief Tutorial on IEEE 802.11w Gopinath K N and Hemant Chaskar AirTight Networks www.AirTightNetworks.com 2009 AirTight Networks, Inc. All Rights Reserved.
  • 2. Background 802.11 WiFi going from “convenience” to “mission critical” Access However, ever since inception, Client Point (AP) WiFi has been vulnerable to Denial of Service (DoS) attacks of various types: X • RF Jamming • Virtual Jamming • Spoofed Disconnect • EAP Spoofing DoS Attacker • Connection Request Flooding • etc. Page 2 2009 AirTight Networks, Inc. All Rights Reserved.
  • 3. 802.11w: A step in the direction of DoS avoidance 802.11w gets rid of “Spoofed Disconnect” DoS attacks resulting from spoofing of • (i) Deauthentication (Deauth), (ii) Disassociation (Disassoc), (iii) Association (Assoc) Request in existing connection, or (iv) Authentication (Auth) Request in existing connection Certain “Action Management Frames” are also made anti-spoofing • Spectrum Management, QoS, BlockAck, Radio Measurement, Fast BSS Transition Page 3 2009 AirTight Networks, Inc. All Rights Reserved.
  • 4. How does 802.11w avoid Spoofed Disconnect DoS 802.11w adds cryptographic protection to Deauth and Disassoc frames to make them anti-spoofing Mechanism called Security Association (SA) teardown protection is added to prevent spoofed Assoc Request or Auth Request from disconnecting the already connected Client Page 4 2009 AirTight Networks, Inc. All Rights Reserved.
  • 5. Example: Deauth Attack • Deauthentication frame was meant to gracefully break the connection between AP and Client • Problem however is that it is in clear text, so it can be spoofed (in the absence of 802.11w) Page 5 2009 AirTight Networks, Inc. All Rights Reserved.
  • 6. Example: Deauth attack averted with 802.11w Only legitimate Deauth is accepted MIC (Message Integrity Code) Spoofed Deauth is ignored added using shared key Legitimate Deauth Legacy Deauth MIC Secret key shared between AP and Client th eau ofed D MIC No MIC or Spo th D eau bad MIC ac y Leg Page 6 2009 AirTight Networks, Inc. All Rights Reserved.
  • 7. Where does the shared secret key come from It is derived using EAPOL 4-way handshake between AP and Client This also means that 802.11w can only be used if you are using WPA or WPA2 Broadcast/multicast management frames are protected using a key called Integrity Group Temporal Key (IGTK) Unicast management frames are protected using WPA/WPA2 pair-wise encryption key (PTK) Page 7 2009 AirTight Networks, Inc. All Rights Reserved.
  • 8. SA teardown protection Pre 802.11w, if AP receives Assoc or Auth Request from already associated Client, it terminates existing connection to start a new one • So existing connection can be broken with spoofed Auth Request or Assoc Request With SA teardown of 802.11w • After AP receives Assoc or Auth Request for associated Client, • Crypto protected probe is sent to Client • If crypto protected response is received, the Assoc or Auth Request is considered spoofed and rejected • Else, existing connection is terminated to start a new one Page 8 2009 AirTight Networks, Inc. All Rights Reserved.
  • 9. How are Action Mgmt Frames made spoof resistant By adding authentication & encryption using IGTK • Spectrum Management • QoS • DLS • Block Ack • Radio measurement • Fast BSS Transition • HT • SA Query • Protected Dual of Public Action Page 9 2009 AirTight Networks, Inc. All Rights Reserved.
  • 10. 802.11w: A piece in WiFi security puzzle 802.11w averts Spoofed Disconnect DoS and makes Action Management Frames spoof-resistant Other DoS attacks (RF jamming, virtual jamming, EAP spoofing, connection request flooding etc.) are outside the scope of 802.11w WPA/WPA2 is still needed for client authentication and data encryption. Also WPA/WPA2 is needed for 802.11w to work Threats from unmanaged devices (rogue APs, mis-associations, ad hoc connections, honeypots (Evil Twin), AP/client MAC spoofing, cracking, infrastructure attacks (skyjacking) etc.) are outside the scope of 802.11w You should definitely enable 802.11w in your WLAN when it becomes available (shortly) in WLAN equipment, but one should not be complacent that it will solve all wireless security problems Page 10 2009 AirTight Networks, Inc. All Rights Reserved.
  • 11. Questions/comments Please discuss@ http://blog.airtightnetworks.com/802-11w-tutorial/ Page 11 2009 AirTight Networks, Inc. All Rights Reserved.
  • 12. Appendix 1: Broadcast Integrity Protocol (BIP) Provides authentication and replay protection for broadcast/multicast Management Frames Uses “Integrity Group Temporal Key” (IGTK), a new key derived & distributed via EAPOL 4-way handshake Transmitter appends each protected frame with a Management MIC Information Element (IE) Receiver validates the MIC before accepting the frame Page 12 2009 AirTight Networks, Inc. All Rights Reserved.
  • 13. Appendix 2: Message Integrity Check (MIC) IE ID Length Key ID IPN MIC ID • Information Element number Key ID • Indicates the IGTK used for computing MIC IPN • Used for replay protection • Monotonically increasing non-negative number MIC • The keyed cryptographic hash derived over management frame body (Payload + MAC header) Page 13 2009 AirTight Networks, Inc. All Rights Reserved.
  • 14. Appendix 3: 802.11w parameter negotiation Negotiated at the beginning of Association MFP Mandatory AES-128-CMAC MFPR = 1 MFPC = 0 Page 14 2009 AirTight Networks, Inc. All Rights Reserved.