SlideShare a Scribd company logo
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 1 #airheadsconf#airheadsconf
Encryption, Authentication, and Access Control
Jon Green
Rich Langston
June 2013
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 2 #airheadsconf
•  Give a basic background in cryptography and
public key infrastructure
–  What is symmetric key crypto?
–  What is asymmetric key crypto?
–  What are certificates and PKI?
•  Show how to use public certs with our controller
•  Show how these two come together to create
802.1X
Today’s Goals
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 3 #airheadsconf#airheadsconf3
Cryptography Primer
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 4 #airheadsconf
•  Plain text is normal, unencrypted text
•  A Cipher is an encryption technique
•  Cipher Text is the unreadable output on the
Cypher
Terminology
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 5 #airheadsconf
•  Bob and Alice are traditionally used in examples
of cryptography
Meet Bob and Alice
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 6 #airheadsconf
Meet The New Bob, Alice, and Eve
Max, aka “Bob” Agent 99, aka “Alice”
Konrad of Kaos, aka “Eve”
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 7 #airheadsconf
Symmetric Key Cryptography
Watch out!
Kaos is on
the way!
Watch out!
Kaos is on
the way!
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 8 #airheadsconf
Symmetric Key Cryptography (2)
•  Strength:	
  
–  Simple	
  and	
  very	
  fast	
  (order	
  of	
  1000	
  to	
  10000	
  faster	
  than	
  
asymmetric	
  mechanisms)	
  
•  Weakness:	
  
–  Must	
  agree	
  the	
  key	
  beforehand	
  
–  How	
  to	
  securely	
  pass	
  the	
  key	
  to	
  the	
  other	
  party?	
  
•  Examples:	
  	
  AES,	
  3DES,	
  DES,	
  RC4	
  
•  AES	
  is	
  the	
  current	
  “gold	
  standard”	
  for	
  security	
  
	
  
Agent 99 Max
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 9 #airheadsconf
Public Key Cryptography (Asymmetric)
Max! You
idiot! Kaos
has our key!
Max! You
idiot! Kaos
has our key!
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 10 #airheadsconf
Public Key Cryptography (2)
•  Strength	
  
–  Solves	
  problem	
  of	
  passing	
  the	
  key	
  –	
  Anyone	
  can	
  use	
  the	
  public	
  key	
  
to	
  encrypt	
  a	
  message,	
  but	
  only	
  recipient	
  can	
  decrypt	
  
–  Allows	
  establishment	
  of	
  trust	
  context	
  between	
  parNes	
  
•  Weakness:	
  
–  Slow	
  (MUCH	
  slower	
  than	
  symmetric)	
  
–  Problem	
  of	
  trusNng	
  public	
  key	
  (what	
  if	
  I’ve	
  never	
  met	
  you?)	
  
•  Examples:	
  RSA,	
  DSA,	
  ECDSA	
  
Agent 99 Max
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 11 #airheadsconf
Hybrid Cryptography
•  Randomly	
  generate	
  “session”	
  key	
  
•  Encrypt	
  data	
  with	
  “session”	
  key	
  	
  
(symmetric	
  key	
  cryptography)	
  
•  Encrypt	
  “session”	
  key	
  with	
  recipient’s	
  public	
  key	
  
(public	
  key	
  cryptography)	
  
	
  
Agent 99 Max
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 12 #airheadsconf
Hash Function
My shoe
phone
battery died
•  Properties
–  it is easy to compute the hash value for any given message
–  it is infeasible to find a message that has a given hash
–  it is infeasible to find two different messages with the same hash
–  it is infeasible to modify a message without changing its hash
•  Ensures message integrity
•  Also called message digests or fingerprints
•  Examples: MD5, SHA1, SHA2 (256/384/512)
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 13 #airheadsconf
Digital Signature
•  Combines a hash with an asymmetric crypto algorithm
•  The sender’s private key is used in the digital signature
operation
•  Digital signature calculation:
Agent 99 Max
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 14 #airheadsconf
•  Encryption provides
–  confidentiality, can provide authentication and integrity protection
•  Checksums/hash algorithms provide
–  integrity protection, can provide authentication
•  Digital signatures provide
–  authentication, integrity protection, and non-repudiation
•  For more info:
Summary: Security Building Blocks
Buy this Book!
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 15 #airheadsconf#airheadsconf15
You	
  have	
  to	
  decide	
  who	
  you	
  trust	
  before	
  you	
  decide	
  what	
  to	
  believe	
  
Cer$ficates,	
  Trust	
  &	
  PKI
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 16 #airheadsconf
What is a Certificate?
•  A	
  cerNficate	
  is	
  a	
  digitally	
  signed	
  statement	
  
that	
  binds	
  a	
  public	
  key	
  to	
  some	
  idenNfying	
  
informaNon	
  
–  The	
  signer	
  of	
  the	
  cerNficate	
  is	
  called	
  its	
  issuer	
  
–  The	
  enNty	
  talked	
  about	
  in	
  the	
  cerNficate	
  is	
  the	
  
subject	
  of	
  the	
  cerNficate	
  
•  CerNficates	
  in	
  the	
  real	
  world	
  
–  Any	
  type	
  of	
  license,	
  government-­‐issued	
  ID’s,	
  
membership	
  cards,	
  ...	
  
–  Binds	
  an	
  idenNty	
  to	
  certain	
  rights,	
  privileges,	
  or	
  
other	
  idenNfiers	
  
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 17 #airheadsconf
What is a Certificate? (2)
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 18 #airheadsconf
Trust Model
•  Agent	
  99	
  will	
  believe	
  Max’s	
  public	
  key	
  belongs	
  to	
  
Max	
  if	
  Agent	
  99	
  trusts	
  the	
  issuer	
  of	
  Max’s	
  
cerNficate	
  to	
  make	
  key-­‐name	
  binding	
  statements	
  
•  How	
  can	
  we	
  convince	
  Agent	
  99	
  to	
  trust	
  the	
  issuer	
  
of	
  Max’s	
  cerNficate?	
  
•  SoluNon:	
  Agent	
  99	
  must	
  implicitly	
  trust	
  some	
  set	
  
of	
  public	
  keys	
  
–  Once	
  she	
  does	
  that,	
  those	
  public	
  keys	
  can	
  introduce	
  
other	
  public	
  keys	
  to	
  her	
  (hierarchical	
  model)	
  
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 19 #airheadsconf
Public Key Infrastructure
•  A	
  CerNficate	
  Authority	
  (CA)	
  guarantees	
  the	
  
binding	
  between	
  a	
  public	
  key	
  and	
  another	
  CA	
  or	
  
an	
  “End	
  EnNty”	
  (EE)	
  
•  CA	
  Hierarchies	
  
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 20 #airheadsconf
•  Normally, self-signed root CAs are created, then
these create subordinate CAs
•  Once subordinate CAs have been created, the
root is taken offline
–  If the root is compromised, the trust model is broken and the
bad guys can fool you into trusting a cert that is bogus
Certificate Authority Best Practice
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 21 #airheadsconf
Certificate Authority Best Practices
Symantec/VeriSign Data Center
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 22 #airheadsconf
Who do you trust?
Windows: Start->Run->certmgr.msc
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 23 #airheadsconf
•  Windows Server includes a domain-aware CA –
why not just use it?
•  Disadvantages:
–  PKI is complex. Might be easier to let Verisign/Thawte/etc.
do it for you.
–  Nobody outside your Windows domain will trust your
certificates
•  Advantages:
–  Less costly
–  Better security possible. Low chances of someone outside
organization getting a certificate from your internal PKI
Public CA versus Private CA
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 24 #airheadsconf
•  Only intended for BYOD – not a general-purpose
CA
–  No Web enrollment interface
–  No manual enrollment interface
–  Limited (BYOD-focused) policy controls
•  Recommendation: Use for deploying BYOD
certs which have limited applicability
–  Valid for WLAN access to a limited access zone
–  Not valid for other enterprise services (email, VPN, app sign-
on, etc.)
ClearPass as a CA
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 25 #airheadsconf
Public Key Infrastructure (3)
•  Agent	
  Agent	
  99	
  trusts	
  Max’s	
  public	
  key	
  if	
  there	
  is	
  a	
  
valid	
  chain	
  of	
  cerNficates	
  from	
  Max’s	
  public	
  key	
  to	
  a	
  
root	
  CA	
  that	
  Agent	
  99	
  implicitly	
  trusts	
  
•  Web	
  browsers	
  also	
  check	
  DNS	
  hostname	
  ==	
  
cerNficate	
  Common	
  Name	
  (CN)	
  
•  Chain	
  Building	
  &	
  ValidaNon	
  
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 26 #airheadsconf
Certificate Validity
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 27 #airheadsconf
•  With the latest version of Apple TV iOS, WPA2
Enterprise can be used
•  However, the Apple TV does not have a clock
•  So when it is rebooted, it thinks it is January,
1970, aka the “epoch”
•  It will not authenticate successfully because it
will not trust the network’s cert is valid
•  NTP must complete first to fix the time
Good to Know: Apple TV
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 28 #airheadsconf
•  Can be used by the client (e.g. web browser) to
verify server’s certificate validity
–  OCSP URL is read from server certificate’s AIA field
•  Can be used by the server (e.g. mobility
controller) to verify client’s certificate validity
–  OCSP URL is most often configured on the server to point to
specific OCSP responders
•  OCSP transactions use HTTP for transport
protocol
•  Important: Nonce Extension required for replay
prevention
–  Some public CAs don’t like this…
OCSP
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 29 #airheadsconf
•  OCSP Direct Trust Model
–  Each OCSP responder has an OCSP Responder certificate
–  Each Responder cert must be installed on relying party
(controller)
–  ArubaOS only supports a single Responder cert – problem
for redundancy
•  OCSP Delegated Trust Model
–  OCSP responder has an OCSP Responder cert issued by
each issuing CA for which it can respond
–  Relying party checks to see that OCSP response is signed
by a known cert
–  Requires each issuing CA cert to be installed on relying party
(controller) because chaining is not supported
–  Requires ArubaOS 6.1.4.1-FIPS or ArubaOS 6.3+
OCSP – Two Variants
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 30 #airheadsconf
For More Info
Buy this Book!
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 31 #airheadsconf#airheadsconf31
Aruba Certificate Operations
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 32 #airheadsconf
• PEM / PKCS#7
– Contains a certificate in base64 encoding (open in
a text editor)
• DER
– Contains a certificate in binary encoding
• PFX / PKCS#12
– Contains a certificate AND private key, protected
by a password
Certificate Formats
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 33 #airheadsconf
• Server Certificate
– Used by controller to authenticate to the
client (EAP-TLS, PEAP, Web)
• CA Certificate
– Used by controller to validate client
certificate (EAP-TLS only)
• Client Certificate
– Used by client to authenticate to the
network (EAP-TLS only)
Relevant Certificate Types
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 34 #airheadsconf
• Private key stays on controller
• CSR is sent to CA
– How this works depends on the CA type
• CA issues certificate in PEM/CER or
DER format
• Certificate is uploaded to controller
• Controller puts certificate back
together with private key
automatically
Using Certificate Signing Request
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 35 #airheadsconf
Generating Certificate Signing Request
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 36 #airheadsconf
Send CSR to your CA of choice
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 37 #airheadsconf
Uploading Certificates
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 38 #airheadsconf
Uploading Certificate
Certificate only
(PEM format)
Certificate and
private key in PFX
format
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 39 #airheadsconf#airheadsconf39
Putting it all together: 802.1X
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 40 #airheadsconf
Authentication with 802.1X
•  Authenticates users
before granting access
to L2 media
•  Makes use of EAP
(Extensible
Authentication Protocol)
•  802.1X authentication
happens at L2 – users
will be authenticated
before an IP address is
assigned
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 41 #airheadsconf
Sample EAP Transaction
2-stage process
– Outer tunnel establishment
– Credential exchange happens inside the encrypted
tunnel
Client
AuthenticationServer
Request Identity
Response Identity (anonymous) Response Identity
TLS Start
Certificate
Client Key exchange
Cert. verification
Request credentials
Response credentials
Success (w/attributes)
EAPOL RADIUS
Authenticator
EAPOL Start
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 42 #airheadsconf
802.1X Acronym Soup
PEAP (Protected EAP)
–  Uses a digital certificate on the network side
–  Password or certificate on the client side
EAP-TLS (EAP with Transport Level Security)
–  Uses a certificate on network side
–  Uses a certificate on client side
TTLS (Tunneled Transport Layer Security)
–  Uses a certificate on the network side
–  Password, token, or certificate on the client side
EAP-FAST
–  Cisco proprietary
–  Do not use – known security weaknesses
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 43 #airheadsconf
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 44 #airheadsconf
Configure Supplicant Properly
•  Configure the Common
Name of your RADIUS
server (matches CN in
server certificate)
•  Configure trusted CAs
(an in-house CA is
better than a public CA)
•  ALWAYS validate the
server certificate
•  Do not allow users to
add new CAs or trust
new servers
•  Enforce with group
policy
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 45 #airheadsconf
Multiple classes of users on same
infrastructure easily separated
ClearPass
Policy Manager
(AAA)
Security Services
Anti-Virus, IPS, URL Filtering
Access On-Ramps
Access Point
SSID: Corp
Access Point
SSID: GUEST
S2500/3500
Wired Ports
Mobility Controller
QoSFW
QoSFW
QoSFW
QoSFW
QoSFWGuest
Mobile Device
VoIP Device
Contractor
Employee
Role-based Access Control
Role-Based Security
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 46 #airheadsconf
Why Worry About Access Control?
Where is the “network perimeter” today?
§  Mobility brings us:
§  Disappearance of physical
security
§  New mobile users, devices
appearing everyday
§  Increased exposure to
malware
§  Assuming that “the bad guys
are outside the firewall, the
good guys are inside” is a
recipe for disaster
We meet
again, Agent
99!
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 47 #airheadsconf
•  Sequenced authentication
–  Machine credential followed by user credential
–  Sequencing must be tracked by auth server (CPPM)
–  Supported in Windows domain environment…. but nowhere else
–  Timing / user behavior dependencies
•  Hardware tokens
–  Viable option, but users don’t like them…
–  Use EAP-GTC, EAP-POTP
–  RSA supplicant available
•  Stacked authentication
–  Machine and user credential in same EAP transaction
–  Theoretically possible, but not supported by any known
supplicant (Aruba is developing one for Windows…)
Multi-Factor 802.1X Authentication?
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 48 #airheadsconf
•  Short answer: Yes – because of things like
rainbow tables, distributed cracking, fast GPUs,
etc.
•  This is why we use MSCHAPv2 inside a TLS
tunnel for Wi-Fi
•  Still using PPTP for VPN? Watch out…
Isn’t MSCHAPv2 broken?
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 49 #airheadsconf
•  The problem: Today’s password-based auth
exposes password hashes to a possibly
unknown entity
•  Goal of PWD: Mutual authentication using a
password
•  Both sides prove they possess the password
without actually exposing the password or a
password derivative
•  Developed by Dan Harkins of Aruba Networks –
standardized in RFC5931
Future directions: EAP-PWD
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 50 #airheadsconf
•  Some slides stolen from:
http://cevi-users.cevi.be/Portals/ceviusers/
images/default/Userdag-20101125-Certs.pptx
•  Some others stolen from:
http://acs.lbl.gov/~mrt/talks/secPrimer.ppt
•  Get Smart images used without permission
Credits
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 51 #airheadsconf#airheadsconf51

More Related Content

What's hot

Case study migrating 1800 a ps to 7240 mobility controllers_douglas burke_ste...
Case study migrating 1800 a ps to 7240 mobility controllers_douglas burke_ste...Case study migrating 1800 a ps to 7240 mobility controllers_douglas burke_ste...
Case study migrating 1800 a ps to 7240 mobility controllers_douglas burke_ste...Aruba, a Hewlett Packard Enterprise company
 
8 software defined networking and traffic engineering partha narasimhan_ash c...
8 software defined networking and traffic engineering partha narasimhan_ash c...8 software defined networking and traffic engineering partha narasimhan_ash c...
8 software defined networking and traffic engineering partha narasimhan_ash c...Aruba, a Hewlett Packard Enterprise company
 

What's hot (20)

Industry breakout government military forum_jon green_stuart schulte
Industry breakout government military forum_jon green_stuart schulteIndustry breakout government military forum_jon green_stuart schulte
Industry breakout government military forum_jon green_stuart schulte
 
2012 ah vegas deploying byod
2012 ah vegas   deploying byod2012 ah vegas   deploying byod
2012 ah vegas deploying byod
 
Advanced rf troubleshooting_peter lane
Advanced rf troubleshooting_peter laneAdvanced rf troubleshooting_peter lane
Advanced rf troubleshooting_peter lane
 
2012 ah apj wlan design fundamentals
2012 ah apj   wlan design fundamentals2012 ah apj   wlan design fundamentals
2012 ah apj wlan design fundamentals
 
Remote Wireless LANs
Remote Wireless LANsRemote Wireless LANs
Remote Wireless LANs
 
Top 10 tips_aruba_tac_madison lee
Top 10 tips_aruba_tac_madison leeTop 10 tips_aruba_tac_madison lee
Top 10 tips_aruba_tac_madison lee
 
Building an aruba proof of concept lab javier urtubia
Building an aruba proof of concept lab javier urtubiaBuilding an aruba proof of concept lab javier urtubia
Building an aruba proof of concept lab javier urtubia
 
Case study migrating 1800 a ps to 7240 mobility controllers_douglas burke_ste...
Case study migrating 1800 a ps to 7240 mobility controllers_douglas burke_ste...Case study migrating 1800 a ps to 7240 mobility controllers_douglas burke_ste...
Case study migrating 1800 a ps to 7240 mobility controllers_douglas burke_ste...
 
Security advanced rich langston_jon green
Security advanced rich langston_jon greenSecurity advanced rich langston_jon green
Security advanced rich langston_jon green
 
Mobility switch security architecture scott calzia madani adjali
Mobility switch security architecture scott calzia madani adjaliMobility switch security architecture scott calzia madani adjali
Mobility switch security architecture scott calzia madani adjali
 
Aruba wireless and clear pass 6 integration guide v1 1.3
Aruba wireless and clear pass 6 integration guide v1 1.3Aruba wireless and clear pass 6 integration guide v1 1.3
Aruba wireless and clear pass 6 integration guide v1 1.3
 
8 software defined networking and traffic engineering partha narasimhan_ash c...
8 software defined networking and traffic engineering partha narasimhan_ash c...8 software defined networking and traffic engineering partha narasimhan_ash c...
8 software defined networking and traffic engineering partha narasimhan_ash c...
 
2 top10 tips from aruba tac rizwan shaikh
2 top10 tips from aruba tac rizwan shaikh2 top10 tips from aruba tac rizwan shaikh
2 top10 tips from aruba tac rizwan shaikh
 
Cisco switch setup with cppm v1.2
Cisco switch setup with cppm v1.2Cisco switch setup with cppm v1.2
Cisco switch setup with cppm v1.2
 
2012 ah vegas rf troubleshooting
2012 ah vegas   rf troubleshooting2012 ah vegas   rf troubleshooting
2012 ah vegas rf troubleshooting
 
2012 ah emea top 10 tips from aruba tac
2012 ah emea   top 10 tips from aruba tac 2012 ah emea   top 10 tips from aruba tac
2012 ah emea top 10 tips from aruba tac
 
2012 ah emea advanced mobility design
2012 ah emea   advanced mobility design2012 ah emea   advanced mobility design
2012 ah emea advanced mobility design
 
Aruba instant the easy button for wireless gokul rajagopalan
Aruba instant the easy button for wireless gokul rajagopalanAruba instant the easy button for wireless gokul rajagopalan
Aruba instant the easy button for wireless gokul rajagopalan
 
Designing for the all wireless office ash chowdappa-kelly griffin
Designing for the all wireless office ash chowdappa-kelly griffinDesigning for the all wireless office ash chowdappa-kelly griffin
Designing for the all wireless office ash chowdappa-kelly griffin
 
Airheads vail 2011 air wave overview
Airheads vail 2011   air wave overviewAirheads vail 2011   air wave overview
Airheads vail 2011 air wave overview
 

Viewers also liked

Viewers also liked (20)

Spectralink airheads 2013
Spectralink airheads 2013Spectralink airheads 2013
Spectralink airheads 2013
 
Gigabit wifi 802.11 ac in depth_peter thornycroft
Gigabit wifi 802.11 ac in depth_peter thornycroftGigabit wifi 802.11 ac in depth_peter thornycroft
Gigabit wifi 802.11 ac in depth_peter thornycroft
 
Hello instant 0612_1a
Hello instant 0612_1aHello instant 0612_1a
Hello instant 0612_1a
 
2012 ah vegas guest access fundamentals
2012 ah vegas   guest access fundamentals2012 ah vegas   guest access fundamentals
2012 ah vegas guest access fundamentals
 
Aruba webinar dorm wi fi design v4
Aruba webinar   dorm wi fi design v4Aruba webinar   dorm wi fi design v4
Aruba webinar dorm wi fi design v4
 
2012 ah apj guest access fundamentals
2012 ah apj   guest access fundamentals2012 ah apj   guest access fundamentals
2012 ah apj guest access fundamentals
 
Creating an 802 1 xv3
Creating an 802 1 xv3Creating an 802 1 xv3
Creating an 802 1 xv3
 
Airheads vail 2011 pci 2.0 compliance
Airheads vail 2011   pci 2.0 complianceAirheads vail 2011   pci 2.0 compliance
Airheads vail 2011 pci 2.0 compliance
 
Do d directives regarding wireless lan
Do d directives regarding wireless lanDo d directives regarding wireless lan
Do d directives regarding wireless lan
 
Aruba networks webinar_wi-fi_without_interruption_sep20_2012
Aruba networks webinar_wi-fi_without_interruption_sep20_2012Aruba networks webinar_wi-fi_without_interruption_sep20_2012
Aruba networks webinar_wi-fi_without_interruption_sep20_2012
 
2012 ah vegas unified access fundamentals
2012 ah vegas   unified access fundamentals2012 ah vegas   unified access fundamentals
2012 ah vegas unified access fundamentals
 
Guest wlan via gu iv3
Guest wlan via gu iv3Guest wlan via gu iv3
Guest wlan via gu iv3
 
2012 ah vegas top10 tips from aruba tac
2012 ah vegas   top10 tips from aruba tac2012 ah vegas   top10 tips from aruba tac
2012 ah vegas top10 tips from aruba tac
 
2012 ah vegas remote networking fundamentals
2012 ah vegas   remote networking fundamentals2012 ah vegas   remote networking fundamentals
2012 ah vegas remote networking fundamentals
 
Mac authentication amigopod radius
Mac authentication amigopod radiusMac authentication amigopod radius
Mac authentication amigopod radius
 
Mac address authentication
Mac address authenticationMac address authentication
Mac address authentication
 
Air waveupdate sujathamandava
Air waveupdate sujathamandavaAir waveupdate sujathamandava
Air waveupdate sujathamandava
 
Airheads vail 2011 amigopod overview
Airheads vail 2011   amigopod overviewAirheads vail 2011   amigopod overview
Airheads vail 2011 amigopod overview
 
Creating an 802 1 xv3
Creating an 802 1 xv3Creating an 802 1 xv3
Creating an 802 1 xv3
 
Instant overview gokul_rajagopalan
Instant overview gokul_rajagopalanInstant overview gokul_rajagopalan
Instant overview gokul_rajagopalan
 

Similar to Encryption authentication access_control_jon green

Wireless LAN Security Fundamentals #AirheadsConf Italy
Wireless LAN Security Fundamentals #AirheadsConf ItalyWireless LAN Security Fundamentals #AirheadsConf Italy
Wireless LAN Security Fundamentals #AirheadsConf Italy
Aruba, a Hewlett Packard Enterprise company
 
Wi-Fi Security Fundamentals
Wi-Fi Security FundamentalsWi-Fi Security Fundamentals
Wi-Fi Security Fundamentals
Aruba, a Hewlett Packard Enterprise company
 
Breakout - Airheads Macau 2013 - ClearPass Access Management Basics
Breakout - Airheads Macau 2013 - ClearPass Access Management Basics Breakout - Airheads Macau 2013 - ClearPass Access Management Basics
Breakout - Airheads Macau 2013 - ClearPass Access Management Basics
Aruba, a Hewlett Packard Enterprise company
 
computer-security-and-cryptography-a-simple-presentation
computer-security-and-cryptography-a-simple-presentationcomputer-security-and-cryptography-a-simple-presentation
computer-security-and-cryptography-a-simple-presentation
Alex Punnen
 
Shanghai Breakout: Access Management with Aruba ClearPass
Shanghai Breakout: Access Management with Aruba ClearPassShanghai Breakout: Access Management with Aruba ClearPass
Shanghai Breakout: Access Management with Aruba ClearPass
Aruba, a Hewlett Packard Enterprise company
 
Decrease Your Circle of Trust: An Investigation of PKI CAs on Mobile Devices
Decrease Your Circle of Trust: An Investigation of PKI CAs on Mobile DevicesDecrease Your Circle of Trust: An Investigation of PKI CAs on Mobile Devices
Decrease Your Circle of Trust: An Investigation of PKI CAs on Mobile Devices
Blueboxer2014
 
Alfresco DevCon 2019: Encryption at-rest and in-transit
Alfresco DevCon 2019: Encryption at-rest and in-transitAlfresco DevCon 2019: Encryption at-rest and in-transit
Alfresco DevCon 2019: Encryption at-rest and in-transit
Toni de la Fuente
 
Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021
lior mazor
 
Real-world 802.1X Deployment Challenges
Real-world 802.1X Deployment ChallengesReal-world 802.1X Deployment Challenges
Real-world 802.1X Deployment Challenges
Aruba, a Hewlett Packard Enterprise company
 
Secure socket layer
Secure socket layerSecure socket layer
Secure socket layer
BU
 
#Morecrypto (with tis) - version 2.2
#Morecrypto (with tis) - version 2.2#Morecrypto (with tis) - version 2.2
#Morecrypto (with tis) - version 2.2
Olle E Johansson
 
Holland safenet livehack hid usb pineapple_cain_oph_with_video
Holland safenet livehack hid usb pineapple_cain_oph_with_videoHolland safenet livehack hid usb pineapple_cain_oph_with_video
Holland safenet livehack hid usb pineapple_cain_oph_with_video
robbuddingh
 
Toronto MuleSoft Meetup: Virtual Meetup #3
Toronto MuleSoft Meetup: Virtual Meetup #3Toronto MuleSoft Meetup: Virtual Meetup #3
Toronto MuleSoft Meetup: Virtual Meetup #3
Alexandra N. Martinez
 
Protecting Financial Networks from Cyber Crime
Protecting Financial Networks from Cyber CrimeProtecting Financial Networks from Cyber Crime
Protecting Financial Networks from Cyber Crime
Lancope, Inc.
 
The world of encryption
The world of encryptionThe world of encryption
The world of encryption
Mohammad Yousri
 
HTTPS, Here and Now
HTTPS, Here and NowHTTPS, Here and Now
HTTPS, Here and Now
Philippe De Ryck
 

Similar to Encryption authentication access_control_jon green (20)

Shanghai Breakout: Wireless LAN Security Fundamentals
Shanghai Breakout: Wireless LAN Security Fundamentals Shanghai Breakout: Wireless LAN Security Fundamentals
Shanghai Breakout: Wireless LAN Security Fundamentals
 
Wireless LAN Security Fundamentals #AirheadsConf Italy
Wireless LAN Security Fundamentals #AirheadsConf ItalyWireless LAN Security Fundamentals #AirheadsConf Italy
Wireless LAN Security Fundamentals #AirheadsConf Italy
 
Wi-Fi Security Fundamentals
Wi-Fi Security FundamentalsWi-Fi Security Fundamentals
Wi-Fi Security Fundamentals
 
2012 ah vegas wlan security fundamentals
2012 ah vegas   wlan security fundamentals2012 ah vegas   wlan security fundamentals
2012 ah vegas wlan security fundamentals
 
Breakout - Airheads Macau 2013 - ClearPass Access Management Basics
Breakout - Airheads Macau 2013 - ClearPass Access Management Basics Breakout - Airheads Macau 2013 - ClearPass Access Management Basics
Breakout - Airheads Macau 2013 - ClearPass Access Management Basics
 
Clear pass policy manager advanced_ashwath murthy
Clear pass policy manager advanced_ashwath murthyClear pass policy manager advanced_ashwath murthy
Clear pass policy manager advanced_ashwath murthy
 
computer-security-and-cryptography-a-simple-presentation
computer-security-and-cryptography-a-simple-presentationcomputer-security-and-cryptography-a-simple-presentation
computer-security-and-cryptography-a-simple-presentation
 
Shanghai Breakout: Access Management with Aruba ClearPass
Shanghai Breakout: Access Management with Aruba ClearPassShanghai Breakout: Access Management with Aruba ClearPass
Shanghai Breakout: Access Management with Aruba ClearPass
 
Decrease Your Circle of Trust: An Investigation of PKI CAs on Mobile Devices
Decrease Your Circle of Trust: An Investigation of PKI CAs on Mobile DevicesDecrease Your Circle of Trust: An Investigation of PKI CAs on Mobile Devices
Decrease Your Circle of Trust: An Investigation of PKI CAs on Mobile Devices
 
Alfresco DevCon 2019: Encryption at-rest and in-transit
Alfresco DevCon 2019: Encryption at-rest and in-transitAlfresco DevCon 2019: Encryption at-rest and in-transit
Alfresco DevCon 2019: Encryption at-rest and in-transit
 
Airheads dallas 2011 wireless security
Airheads dallas 2011   wireless securityAirheads dallas 2011   wireless security
Airheads dallas 2011 wireless security
 
Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021
 
Real-world 802.1X Deployment Challenges
Real-world 802.1X Deployment ChallengesReal-world 802.1X Deployment Challenges
Real-world 802.1X Deployment Challenges
 
Secure socket layer
Secure socket layerSecure socket layer
Secure socket layer
 
#Morecrypto (with tis) - version 2.2
#Morecrypto (with tis) - version 2.2#Morecrypto (with tis) - version 2.2
#Morecrypto (with tis) - version 2.2
 
Holland safenet livehack hid usb pineapple_cain_oph_with_video
Holland safenet livehack hid usb pineapple_cain_oph_with_videoHolland safenet livehack hid usb pineapple_cain_oph_with_video
Holland safenet livehack hid usb pineapple_cain_oph_with_video
 
Toronto MuleSoft Meetup: Virtual Meetup #3
Toronto MuleSoft Meetup: Virtual Meetup #3Toronto MuleSoft Meetup: Virtual Meetup #3
Toronto MuleSoft Meetup: Virtual Meetup #3
 
Protecting Financial Networks from Cyber Crime
Protecting Financial Networks from Cyber CrimeProtecting Financial Networks from Cyber Crime
Protecting Financial Networks from Cyber Crime
 
The world of encryption
The world of encryptionThe world of encryption
The world of encryption
 
HTTPS, Here and Now
HTTPS, Here and NowHTTPS, Here and Now
HTTPS, Here and Now
 

More from Aruba, a Hewlett Packard Enterprise company

Airheads Tech Talks: Cloud Guest SSID on Aruba Central
Airheads Tech Talks: Cloud Guest SSID on Aruba CentralAirheads Tech Talks: Cloud Guest SSID on Aruba Central
Airheads Tech Talks: Cloud Guest SSID on Aruba Central
Aruba, a Hewlett Packard Enterprise company
 
Airheads Tech Talks: Understanding ClearPass OnGuard Agents
Airheads Tech Talks: Understanding ClearPass OnGuard AgentsAirheads Tech Talks: Understanding ClearPass OnGuard Agents
Airheads Tech Talks: Understanding ClearPass OnGuard Agents
Aruba, a Hewlett Packard Enterprise company
 
Airheads Tech Talks: Advanced Clustering in AOS 8.x
Airheads Tech Talks: Advanced Clustering in AOS 8.xAirheads Tech Talks: Advanced Clustering in AOS 8.x
Airheads Tech Talks: Advanced Clustering in AOS 8.x
Aruba, a Hewlett Packard Enterprise company
 
EMEA Airheads_ Advance Aruba Central
EMEA Airheads_ Advance Aruba CentralEMEA Airheads_ Advance Aruba Central
EMEA Airheads_ Advance Aruba Central
Aruba, a Hewlett Packard Enterprise company
 
EMEA Airheads_ Aruba AppRF – AOS 6.x & 8.x
EMEA Airheads_ Aruba AppRF – AOS 6.x & 8.xEMEA Airheads_ Aruba AppRF – AOS 6.x & 8.x
EMEA Airheads_ Aruba AppRF – AOS 6.x & 8.x
Aruba, a Hewlett Packard Enterprise company
 
EMEA Airheads- Switch stacking_ ArubaOS Switch
EMEA Airheads- Switch stacking_ ArubaOS SwitchEMEA Airheads- Switch stacking_ ArubaOS Switch
EMEA Airheads- Switch stacking_ ArubaOS Switch
Aruba, a Hewlett Packard Enterprise company
 
EMEA Airheads- LACP and distributed LACP – ArubaOS Switch
EMEA Airheads- LACP and distributed LACP – ArubaOS SwitchEMEA Airheads- LACP and distributed LACP – ArubaOS Switch
EMEA Airheads- LACP and distributed LACP – ArubaOS Switch
Aruba, a Hewlett Packard Enterprise company
 
Introduction to AirWave 10
Introduction to AirWave 10Introduction to AirWave 10
EMEA Airheads- Virtual Switching Framework- Aruba OS Switch
EMEA Airheads- Virtual Switching Framework- Aruba OS SwitchEMEA Airheads- Virtual Switching Framework- Aruba OS Switch
EMEA Airheads- Virtual Switching Framework- Aruba OS Switch
Aruba, a Hewlett Packard Enterprise company
 
EMEA Airheads- Aruba Central with Instant AP
EMEA Airheads- Aruba Central with Instant APEMEA Airheads- Aruba Central with Instant AP
EMEA Airheads- Aruba Central with Instant AP
Aruba, a Hewlett Packard Enterprise company
 
EMEA Airheads- AirGroup profiling changes across 8.1 & 8.2 – ArubaOS 8.x
EMEA Airheads- AirGroup profiling changes across 8.1 & 8.2 – ArubaOS 8.xEMEA Airheads- AirGroup profiling changes across 8.1 & 8.2 – ArubaOS 8.x
EMEA Airheads- AirGroup profiling changes across 8.1 & 8.2 – ArubaOS 8.x
Aruba, a Hewlett Packard Enterprise company
 
EMEA Airheads- Getting Started with the ClearPass REST API – CPPM
EMEA Airheads-  Getting Started with the ClearPass REST API – CPPMEMEA Airheads-  Getting Started with the ClearPass REST API – CPPM
EMEA Airheads- Getting Started with the ClearPass REST API – CPPM
Aruba, a Hewlett Packard Enterprise company
 
EMEA Airheads - AP Discovery Logic and AP Deployment
EMEA Airheads - AP Discovery Logic and AP DeploymentEMEA Airheads - AP Discovery Logic and AP Deployment
EMEA Airheads - AP Discovery Logic and AP Deployment
Aruba, a Hewlett Packard Enterprise company
 
EMEA Airheads- Layer-3 Redundancy for Mobility Master - ArubaOS 8.x
EMEA Airheads- Layer-3 Redundancy for Mobility Master - ArubaOS 8.xEMEA Airheads- Layer-3 Redundancy for Mobility Master - ArubaOS 8.x
EMEA Airheads- Layer-3 Redundancy for Mobility Master - ArubaOS 8.x
Aruba, a Hewlett Packard Enterprise company
 
EMEA Airheads- Manage Devices at Branch Office (BOC)
EMEA Airheads- Manage Devices at Branch Office (BOC)EMEA Airheads- Manage Devices at Branch Office (BOC)
EMEA Airheads- Manage Devices at Branch Office (BOC)
Aruba, a Hewlett Packard Enterprise company
 
EMEA Airheads - What does AirMatch do differently?v2
 EMEA Airheads - What does AirMatch do differently?v2 EMEA Airheads - What does AirMatch do differently?v2
EMEA Airheads - What does AirMatch do differently?v2
Aruba, a Hewlett Packard Enterprise company
 
Airheads Meetups: 8400 Presentation
Airheads Meetups: 8400 PresentationAirheads Meetups: 8400 Presentation
Airheads Meetups: 8400 Presentation
Aruba, a Hewlett Packard Enterprise company
 
Airheads Meetups: Ekahau Presentation
Airheads Meetups: Ekahau PresentationAirheads Meetups: Ekahau Presentation
Airheads Meetups: Ekahau Presentation
Aruba, a Hewlett Packard Enterprise company
 
Airheads Meetups- High density WLAN
Airheads Meetups- High density WLANAirheads Meetups- High density WLAN
Airheads Meetups- High density WLAN
Aruba, a Hewlett Packard Enterprise company
 
Airheads Meetups- Avans Hogeschool goes Aruba
Airheads Meetups- Avans Hogeschool goes ArubaAirheads Meetups- Avans Hogeschool goes Aruba
Airheads Meetups- Avans Hogeschool goes Aruba
Aruba, a Hewlett Packard Enterprise company
 

More from Aruba, a Hewlett Packard Enterprise company (20)

Airheads Tech Talks: Cloud Guest SSID on Aruba Central
Airheads Tech Talks: Cloud Guest SSID on Aruba CentralAirheads Tech Talks: Cloud Guest SSID on Aruba Central
Airheads Tech Talks: Cloud Guest SSID on Aruba Central
 
Airheads Tech Talks: Understanding ClearPass OnGuard Agents
Airheads Tech Talks: Understanding ClearPass OnGuard AgentsAirheads Tech Talks: Understanding ClearPass OnGuard Agents
Airheads Tech Talks: Understanding ClearPass OnGuard Agents
 
Airheads Tech Talks: Advanced Clustering in AOS 8.x
Airheads Tech Talks: Advanced Clustering in AOS 8.xAirheads Tech Talks: Advanced Clustering in AOS 8.x
Airheads Tech Talks: Advanced Clustering in AOS 8.x
 
EMEA Airheads_ Advance Aruba Central
EMEA Airheads_ Advance Aruba CentralEMEA Airheads_ Advance Aruba Central
EMEA Airheads_ Advance Aruba Central
 
EMEA Airheads_ Aruba AppRF – AOS 6.x & 8.x
EMEA Airheads_ Aruba AppRF – AOS 6.x & 8.xEMEA Airheads_ Aruba AppRF – AOS 6.x & 8.x
EMEA Airheads_ Aruba AppRF – AOS 6.x & 8.x
 
EMEA Airheads- Switch stacking_ ArubaOS Switch
EMEA Airheads- Switch stacking_ ArubaOS SwitchEMEA Airheads- Switch stacking_ ArubaOS Switch
EMEA Airheads- Switch stacking_ ArubaOS Switch
 
EMEA Airheads- LACP and distributed LACP – ArubaOS Switch
EMEA Airheads- LACP and distributed LACP – ArubaOS SwitchEMEA Airheads- LACP and distributed LACP – ArubaOS Switch
EMEA Airheads- LACP and distributed LACP – ArubaOS Switch
 
Introduction to AirWave 10
Introduction to AirWave 10Introduction to AirWave 10
Introduction to AirWave 10
 
EMEA Airheads- Virtual Switching Framework- Aruba OS Switch
EMEA Airheads- Virtual Switching Framework- Aruba OS SwitchEMEA Airheads- Virtual Switching Framework- Aruba OS Switch
EMEA Airheads- Virtual Switching Framework- Aruba OS Switch
 
EMEA Airheads- Aruba Central with Instant AP
EMEA Airheads- Aruba Central with Instant APEMEA Airheads- Aruba Central with Instant AP
EMEA Airheads- Aruba Central with Instant AP
 
EMEA Airheads- AirGroup profiling changes across 8.1 & 8.2 – ArubaOS 8.x
EMEA Airheads- AirGroup profiling changes across 8.1 & 8.2 – ArubaOS 8.xEMEA Airheads- AirGroup profiling changes across 8.1 & 8.2 – ArubaOS 8.x
EMEA Airheads- AirGroup profiling changes across 8.1 & 8.2 – ArubaOS 8.x
 
EMEA Airheads- Getting Started with the ClearPass REST API – CPPM
EMEA Airheads-  Getting Started with the ClearPass REST API – CPPMEMEA Airheads-  Getting Started with the ClearPass REST API – CPPM
EMEA Airheads- Getting Started with the ClearPass REST API – CPPM
 
EMEA Airheads - AP Discovery Logic and AP Deployment
EMEA Airheads - AP Discovery Logic and AP DeploymentEMEA Airheads - AP Discovery Logic and AP Deployment
EMEA Airheads - AP Discovery Logic and AP Deployment
 
EMEA Airheads- Layer-3 Redundancy for Mobility Master - ArubaOS 8.x
EMEA Airheads- Layer-3 Redundancy for Mobility Master - ArubaOS 8.xEMEA Airheads- Layer-3 Redundancy for Mobility Master - ArubaOS 8.x
EMEA Airheads- Layer-3 Redundancy for Mobility Master - ArubaOS 8.x
 
EMEA Airheads- Manage Devices at Branch Office (BOC)
EMEA Airheads- Manage Devices at Branch Office (BOC)EMEA Airheads- Manage Devices at Branch Office (BOC)
EMEA Airheads- Manage Devices at Branch Office (BOC)
 
EMEA Airheads - What does AirMatch do differently?v2
 EMEA Airheads - What does AirMatch do differently?v2 EMEA Airheads - What does AirMatch do differently?v2
EMEA Airheads - What does AirMatch do differently?v2
 
Airheads Meetups: 8400 Presentation
Airheads Meetups: 8400 PresentationAirheads Meetups: 8400 Presentation
Airheads Meetups: 8400 Presentation
 
Airheads Meetups: Ekahau Presentation
Airheads Meetups: Ekahau PresentationAirheads Meetups: Ekahau Presentation
Airheads Meetups: Ekahau Presentation
 
Airheads Meetups- High density WLAN
Airheads Meetups- High density WLANAirheads Meetups- High density WLAN
Airheads Meetups- High density WLAN
 
Airheads Meetups- Avans Hogeschool goes Aruba
Airheads Meetups- Avans Hogeschool goes ArubaAirheads Meetups- Avans Hogeschool goes Aruba
Airheads Meetups- Avans Hogeschool goes Aruba
 

Recently uploaded

Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 

Recently uploaded (20)

Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 

Encryption authentication access_control_jon green

  • 1. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 1 #airheadsconf#airheadsconf Encryption, Authentication, and Access Control Jon Green Rich Langston June 2013
  • 2. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 2 #airheadsconf •  Give a basic background in cryptography and public key infrastructure –  What is symmetric key crypto? –  What is asymmetric key crypto? –  What are certificates and PKI? •  Show how to use public certs with our controller •  Show how these two come together to create 802.1X Today’s Goals
  • 3. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 3 #airheadsconf#airheadsconf3 Cryptography Primer
  • 4. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 4 #airheadsconf •  Plain text is normal, unencrypted text •  A Cipher is an encryption technique •  Cipher Text is the unreadable output on the Cypher Terminology
  • 5. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 5 #airheadsconf •  Bob and Alice are traditionally used in examples of cryptography Meet Bob and Alice
  • 6. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 6 #airheadsconf Meet The New Bob, Alice, and Eve Max, aka “Bob” Agent 99, aka “Alice” Konrad of Kaos, aka “Eve”
  • 7. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 7 #airheadsconf Symmetric Key Cryptography Watch out! Kaos is on the way! Watch out! Kaos is on the way!
  • 8. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 8 #airheadsconf Symmetric Key Cryptography (2) •  Strength:   –  Simple  and  very  fast  (order  of  1000  to  10000  faster  than   asymmetric  mechanisms)   •  Weakness:   –  Must  agree  the  key  beforehand   –  How  to  securely  pass  the  key  to  the  other  party?   •  Examples:    AES,  3DES,  DES,  RC4   •  AES  is  the  current  “gold  standard”  for  security     Agent 99 Max
  • 9. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 9 #airheadsconf Public Key Cryptography (Asymmetric) Max! You idiot! Kaos has our key! Max! You idiot! Kaos has our key!
  • 10. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 10 #airheadsconf Public Key Cryptography (2) •  Strength   –  Solves  problem  of  passing  the  key  –  Anyone  can  use  the  public  key   to  encrypt  a  message,  but  only  recipient  can  decrypt   –  Allows  establishment  of  trust  context  between  parNes   •  Weakness:   –  Slow  (MUCH  slower  than  symmetric)   –  Problem  of  trusNng  public  key  (what  if  I’ve  never  met  you?)   •  Examples:  RSA,  DSA,  ECDSA   Agent 99 Max
  • 11. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 11 #airheadsconf Hybrid Cryptography •  Randomly  generate  “session”  key   •  Encrypt  data  with  “session”  key     (symmetric  key  cryptography)   •  Encrypt  “session”  key  with  recipient’s  public  key   (public  key  cryptography)     Agent 99 Max
  • 12. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 12 #airheadsconf Hash Function My shoe phone battery died •  Properties –  it is easy to compute the hash value for any given message –  it is infeasible to find a message that has a given hash –  it is infeasible to find two different messages with the same hash –  it is infeasible to modify a message without changing its hash •  Ensures message integrity •  Also called message digests or fingerprints •  Examples: MD5, SHA1, SHA2 (256/384/512)
  • 13. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 13 #airheadsconf Digital Signature •  Combines a hash with an asymmetric crypto algorithm •  The sender’s private key is used in the digital signature operation •  Digital signature calculation: Agent 99 Max
  • 14. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 14 #airheadsconf •  Encryption provides –  confidentiality, can provide authentication and integrity protection •  Checksums/hash algorithms provide –  integrity protection, can provide authentication •  Digital signatures provide –  authentication, integrity protection, and non-repudiation •  For more info: Summary: Security Building Blocks Buy this Book!
  • 15. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 15 #airheadsconf#airheadsconf15 You  have  to  decide  who  you  trust  before  you  decide  what  to  believe   Cer$ficates,  Trust  &  PKI
  • 16. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 16 #airheadsconf What is a Certificate? •  A  cerNficate  is  a  digitally  signed  statement   that  binds  a  public  key  to  some  idenNfying   informaNon   –  The  signer  of  the  cerNficate  is  called  its  issuer   –  The  enNty  talked  about  in  the  cerNficate  is  the   subject  of  the  cerNficate   •  CerNficates  in  the  real  world   –  Any  type  of  license,  government-­‐issued  ID’s,   membership  cards,  ...   –  Binds  an  idenNty  to  certain  rights,  privileges,  or   other  idenNfiers  
  • 17. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 17 #airheadsconf What is a Certificate? (2)
  • 18. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 18 #airheadsconf Trust Model •  Agent  99  will  believe  Max’s  public  key  belongs  to   Max  if  Agent  99  trusts  the  issuer  of  Max’s   cerNficate  to  make  key-­‐name  binding  statements   •  How  can  we  convince  Agent  99  to  trust  the  issuer   of  Max’s  cerNficate?   •  SoluNon:  Agent  99  must  implicitly  trust  some  set   of  public  keys   –  Once  she  does  that,  those  public  keys  can  introduce   other  public  keys  to  her  (hierarchical  model)  
  • 19. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 19 #airheadsconf Public Key Infrastructure •  A  CerNficate  Authority  (CA)  guarantees  the   binding  between  a  public  key  and  another  CA  or   an  “End  EnNty”  (EE)   •  CA  Hierarchies  
  • 20. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 20 #airheadsconf •  Normally, self-signed root CAs are created, then these create subordinate CAs •  Once subordinate CAs have been created, the root is taken offline –  If the root is compromised, the trust model is broken and the bad guys can fool you into trusting a cert that is bogus Certificate Authority Best Practice
  • 21. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 21 #airheadsconf Certificate Authority Best Practices Symantec/VeriSign Data Center
  • 22. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 22 #airheadsconf Who do you trust? Windows: Start->Run->certmgr.msc
  • 23. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 23 #airheadsconf •  Windows Server includes a domain-aware CA – why not just use it? •  Disadvantages: –  PKI is complex. Might be easier to let Verisign/Thawte/etc. do it for you. –  Nobody outside your Windows domain will trust your certificates •  Advantages: –  Less costly –  Better security possible. Low chances of someone outside organization getting a certificate from your internal PKI Public CA versus Private CA
  • 24. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 24 #airheadsconf •  Only intended for BYOD – not a general-purpose CA –  No Web enrollment interface –  No manual enrollment interface –  Limited (BYOD-focused) policy controls •  Recommendation: Use for deploying BYOD certs which have limited applicability –  Valid for WLAN access to a limited access zone –  Not valid for other enterprise services (email, VPN, app sign- on, etc.) ClearPass as a CA
  • 25. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 25 #airheadsconf Public Key Infrastructure (3) •  Agent  Agent  99  trusts  Max’s  public  key  if  there  is  a   valid  chain  of  cerNficates  from  Max’s  public  key  to  a   root  CA  that  Agent  99  implicitly  trusts   •  Web  browsers  also  check  DNS  hostname  ==   cerNficate  Common  Name  (CN)   •  Chain  Building  &  ValidaNon  
  • 26. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 26 #airheadsconf Certificate Validity
  • 27. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 27 #airheadsconf •  With the latest version of Apple TV iOS, WPA2 Enterprise can be used •  However, the Apple TV does not have a clock •  So when it is rebooted, it thinks it is January, 1970, aka the “epoch” •  It will not authenticate successfully because it will not trust the network’s cert is valid •  NTP must complete first to fix the time Good to Know: Apple TV
  • 28. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 28 #airheadsconf •  Can be used by the client (e.g. web browser) to verify server’s certificate validity –  OCSP URL is read from server certificate’s AIA field •  Can be used by the server (e.g. mobility controller) to verify client’s certificate validity –  OCSP URL is most often configured on the server to point to specific OCSP responders •  OCSP transactions use HTTP for transport protocol •  Important: Nonce Extension required for replay prevention –  Some public CAs don’t like this… OCSP
  • 29. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 29 #airheadsconf •  OCSP Direct Trust Model –  Each OCSP responder has an OCSP Responder certificate –  Each Responder cert must be installed on relying party (controller) –  ArubaOS only supports a single Responder cert – problem for redundancy •  OCSP Delegated Trust Model –  OCSP responder has an OCSP Responder cert issued by each issuing CA for which it can respond –  Relying party checks to see that OCSP response is signed by a known cert –  Requires each issuing CA cert to be installed on relying party (controller) because chaining is not supported –  Requires ArubaOS 6.1.4.1-FIPS or ArubaOS 6.3+ OCSP – Two Variants
  • 30. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 30 #airheadsconf For More Info Buy this Book!
  • 31. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 31 #airheadsconf#airheadsconf31 Aruba Certificate Operations
  • 32. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 32 #airheadsconf • PEM / PKCS#7 – Contains a certificate in base64 encoding (open in a text editor) • DER – Contains a certificate in binary encoding • PFX / PKCS#12 – Contains a certificate AND private key, protected by a password Certificate Formats
  • 33. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 33 #airheadsconf • Server Certificate – Used by controller to authenticate to the client (EAP-TLS, PEAP, Web) • CA Certificate – Used by controller to validate client certificate (EAP-TLS only) • Client Certificate – Used by client to authenticate to the network (EAP-TLS only) Relevant Certificate Types
  • 34. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 34 #airheadsconf • Private key stays on controller • CSR is sent to CA – How this works depends on the CA type • CA issues certificate in PEM/CER or DER format • Certificate is uploaded to controller • Controller puts certificate back together with private key automatically Using Certificate Signing Request
  • 35. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 35 #airheadsconf Generating Certificate Signing Request
  • 36. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 36 #airheadsconf Send CSR to your CA of choice
  • 37. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 37 #airheadsconf Uploading Certificates
  • 38. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 38 #airheadsconf Uploading Certificate Certificate only (PEM format) Certificate and private key in PFX format
  • 39. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 39 #airheadsconf#airheadsconf39 Putting it all together: 802.1X
  • 40. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 40 #airheadsconf Authentication with 802.1X •  Authenticates users before granting access to L2 media •  Makes use of EAP (Extensible Authentication Protocol) •  802.1X authentication happens at L2 – users will be authenticated before an IP address is assigned
  • 41. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 41 #airheadsconf Sample EAP Transaction 2-stage process – Outer tunnel establishment – Credential exchange happens inside the encrypted tunnel Client AuthenticationServer Request Identity Response Identity (anonymous) Response Identity TLS Start Certificate Client Key exchange Cert. verification Request credentials Response credentials Success (w/attributes) EAPOL RADIUS Authenticator EAPOL Start
  • 42. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 42 #airheadsconf 802.1X Acronym Soup PEAP (Protected EAP) –  Uses a digital certificate on the network side –  Password or certificate on the client side EAP-TLS (EAP with Transport Level Security) –  Uses a certificate on network side –  Uses a certificate on client side TTLS (Tunneled Transport Layer Security) –  Uses a certificate on the network side –  Password, token, or certificate on the client side EAP-FAST –  Cisco proprietary –  Do not use – known security weaknesses
  • 43. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 43 #airheadsconf
  • 44. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 44 #airheadsconf Configure Supplicant Properly •  Configure the Common Name of your RADIUS server (matches CN in server certificate) •  Configure trusted CAs (an in-house CA is better than a public CA) •  ALWAYS validate the server certificate •  Do not allow users to add new CAs or trust new servers •  Enforce with group policy
  • 45. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 45 #airheadsconf Multiple classes of users on same infrastructure easily separated ClearPass Policy Manager (AAA) Security Services Anti-Virus, IPS, URL Filtering Access On-Ramps Access Point SSID: Corp Access Point SSID: GUEST S2500/3500 Wired Ports Mobility Controller QoSFW QoSFW QoSFW QoSFW QoSFWGuest Mobile Device VoIP Device Contractor Employee Role-based Access Control Role-Based Security
  • 46. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 46 #airheadsconf Why Worry About Access Control? Where is the “network perimeter” today? §  Mobility brings us: §  Disappearance of physical security §  New mobile users, devices appearing everyday §  Increased exposure to malware §  Assuming that “the bad guys are outside the firewall, the good guys are inside” is a recipe for disaster We meet again, Agent 99!
  • 47. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 47 #airheadsconf •  Sequenced authentication –  Machine credential followed by user credential –  Sequencing must be tracked by auth server (CPPM) –  Supported in Windows domain environment…. but nowhere else –  Timing / user behavior dependencies •  Hardware tokens –  Viable option, but users don’t like them… –  Use EAP-GTC, EAP-POTP –  RSA supplicant available •  Stacked authentication –  Machine and user credential in same EAP transaction –  Theoretically possible, but not supported by any known supplicant (Aruba is developing one for Windows…) Multi-Factor 802.1X Authentication?
  • 48. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 48 #airheadsconf •  Short answer: Yes – because of things like rainbow tables, distributed cracking, fast GPUs, etc. •  This is why we use MSCHAPv2 inside a TLS tunnel for Wi-Fi •  Still using PPTP for VPN? Watch out… Isn’t MSCHAPv2 broken?
  • 49. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 49 #airheadsconf •  The problem: Today’s password-based auth exposes password hashes to a possibly unknown entity •  Goal of PWD: Mutual authentication using a password •  Both sides prove they possess the password without actually exposing the password or a password derivative •  Developed by Dan Harkins of Aruba Networks – standardized in RFC5931 Future directions: EAP-PWD
  • 50. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 50 #airheadsconf •  Some slides stolen from: http://cevi-users.cevi.be/Portals/ceviusers/ images/default/Userdag-20101125-Certs.pptx •  Some others stolen from: http://acs.lbl.gov/~mrt/talks/secPrimer.ppt •  Get Smart images used without permission Credits
  • 51. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 51 #airheadsconf#airheadsconf51