SlideShare a Scribd company logo
SESSION ID:
#RSAC
Tom Carpenter
WI-FI SECURITY: THE DETAILS MATTER
TECH-R12
CTO
CWNP
@carpentertom | @CWNP
# R S A C
Why Does Wi-Fi Security Matter?
2
541.6 million
hotspots by 2021
500 million new
mobile workforce
professionals
Wi-Fi is entering
new areas every
month
Cloud-managed
WLAN market to
grow to $3.3
billion by 2020
# R S A C
Wi-Fi Security Landscape
3
Data Link (MAC) Layer
Data encryption and authentication should be used
Network (IP) Layer
Secure infrastructure and protocols should be used
Physical Layer
Monitoring and alert systems should be used
Application Layer
Use of secure applications assists in network security
# R S A C
Focus Points
4
Authentication
EncryptionMonitoring
# R S A C
802.11 Authentication Methods
5
Open System
Pre-Shared Key
802.1X/EAP
Shared Key is deprecated as of 802.11i-2004
# R S A C
Open System Authentication
6
A null authentication method
# R S A C
Pre-Shared Key (PSK)
7
The association request frame
of a PSK-based authentication
will show the AKM Suite type as
00-0F-AC:02.
# R S A C
WPA2-Personal
Passphrase
Wr$578Hyt#4387jYu Algorithm
WPA2-Personal is also known
commonly as WPA2-PSK
# R S A C
How PSK Authenticates
9
 Authentication occurs during the 4-way handshake
 Frames 2-4 are MIC-protected
 The MIC calculation includes the KCK, which is part of
the PTK, as an input
 Mismatched MIC calculations between the supplicant
and authenticator result in termination of the 4-way
handshake
# R S A C
Port-Based 802.1X Access Control
10
An entity at one end of a
point-to-point LAN segment
that is being authenticated
by an Authenticator
attached to the other end
of that link.
An entity at one end of a point-
to-point LAN segment that
facilitates authentication of the
entity attached to the other end
of that link.
An entity that provides an authentication
service to an Authenticator. This service
determines, from the credentials
provided by the Supplicant, whether the
Supplicant is authorized to access the
services provided by the Authenticator.
# R S A C
802.1X Port Functions
11
# R S A C
802.1X/EAP
# R S A C
802.1X/EAP Architecture
# R S A C
Enterprise 802.1X/EAP Deployment
14
# R S A C
802.11 Encryption Methods
15
Authentication and Key Management suites
Temporal Key Integrity Protocol (TKIP) – Deprecated
Counter Mode Cipher Block Chaining Message Authentication Code Protocol
(CCMP)
Encryption algorithms
Rivest Cipher 4 (RC4) - Deprecated
Advanced Encryption Standard (AES)
Modern Wi-Fi generates encryption keys during the 4-way handshake
# R S A C
4-Way Handshake
16
# R S A C
Message One
17
0,0,1,0,P,0,0
1 when
initial key
exchange is
complete
1 when MIC is in
the message
1 when a
response is
required
Install bit – 1
means install
the keys
Key Type – P is
Pairwise and G is
Group
Used only in PeerKey
operations (1 is PeerKey)
Key RSC (Receive
Sequence Counter)
for GTK
MIC
Elements
defining the
key
# R S A C
Message Two
18
The client now sends its NONCE (SNONCE) to the
AP/Controller
At this point the client and the AP both have all that’s
required to generate the Pairwise Transient Key (PTK)
# R S A C
Message 3
19
The AP/Controller can now send the GTK to the client
and the install bit (bit 4) is set to 1
This is the point at which KRACK operates
# R S A C
Message 4
20
This is really just the “all is good” message so the
AP/Controller knows the client has the PTK and GTK
installed
# R S A C
KRACK Operation
21
Attacker
Client
AP
Attacker
Client
AP
Initiate
Attack
# R S A C
Who is to blame for KRACK?
 Great question; Complex answer
 Some say the IEEE because of closed processes and lack of availability of the standard early
after release
 Tom’s take: the 802.11i amendment has been easily available for 13 years with no fee most of that time, if someone
noted the problem, the IEEE could have easily included a fix in 11n, 11ac, or any other amendment since then – not
sure this is the real problem
 Some say the vendors because they should have implemented the flexible state machine
more securely
 Tom’s take: this is a hard one, the standard leaves a lot of flexibility, so each vendor would do it differently and if they
make it too complex they could introduce compatibility problems
 Tom’s opinion: Time
 Tom’s take: time is to blame; nearly every security solution degrades over time as the most brilliant minds may create
it, but other brilliant minds want to thwart it – time is usually on the side of the attackers
 End result: Security is a process not an event
# R S A C
802.11 Key Hierarchy
23
# R S A C
Pairwise Transient Key (PTK)
24
The PTK is comprised of
three keys: KCK, KEK and
TK
KCK used for key integrity
KEK used to encrypt and
send keys (GTK)
The TK is used to encrypt
data payloads
# R S A C
Wi-Fi Monitoring Methods
25
Infrastructure solutions
Overlay solutions
Mobile solutions
# R S A C
Where do I go from here?
26
Immediately
Validate the proper security of your existing Wi-Fi gear
— Verify patches
— Verify configuration
In the next 2-3 months
Ensure all newly acquired equipment supports WPA2 (amended) or WPA3
— Anything certified after November 2017 is tested for KRACK patching
In the next six months
Consider a dedicated Wi-Fi security monitoring solution
— Monitor configurations, new RF devices, anomalies
Many performance tools integrate security metrics, such as 7signal
#RSAC
THANK YOU

More Related Content

What's hot

Wireless network security
Wireless network securityWireless network security
Wireless network security
Vishal Agarwal
 
Sguil
SguilSguil
Network Simulation Tools Projects
Network Simulation Tools ProjectsNetwork Simulation Tools Projects
Network Simulation Tools Projects
Phdtopiccom
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
Shahid Beheshti University
 
What's New in StealthWatch v6.5
What's New in StealthWatch v6.5 What's New in StealthWatch v6.5
What's New in StealthWatch v6.5
Lancope, Inc.
 
Wpa vs Wpa2
Wpa vs Wpa2Wpa vs Wpa2
Wpa vs Wpa2
Nzava Luwawa
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
Nilesh Sapariya
 
Introduction To NIDS
Introduction To NIDSIntroduction To NIDS
Introduction To NIDS
Michael Boman
 
Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2
Fábio Afonso
 
Mitigating worm attacks
Mitigating worm attacksMitigating worm attacks
Mitigating worm attacks
dkaya
 
SDN and NFV
SDN and NFVSDN and NFV
Microsoft Infopedia webinar "Secure Your Azure Cloud Deployments with VNS3 Ov...
Microsoft Infopedia webinar "Secure Your Azure Cloud Deployments with VNS3 Ov...Microsoft Infopedia webinar "Secure Your Azure Cloud Deployments with VNS3 Ov...
Microsoft Infopedia webinar "Secure Your Azure Cloud Deployments with VNS3 Ov...
Cohesive Networks
 
Wireless security837
Wireless security837Wireless security837
Wireless security837
mark scott
 
FIWARE Global Summit - Real-time Media Stream Processing Using Kurento
FIWARE Global Summit - Real-time Media Stream Processing Using KurentoFIWARE Global Summit - Real-time Media Stream Processing Using Kurento
FIWARE Global Summit - Real-time Media Stream Processing Using Kurento
FIWARE
 
PhD Thesis NS2 Projects
PhD Thesis NS2 ProjectsPhD Thesis NS2 Projects
PhD Thesis NS2 Projects
Phdtopiccom
 
Kracking WPA2
Kracking WPA2Kracking WPA2
WLAN and IP security
WLAN and IP securityWLAN and IP security
WLAN and IP security
Chaitanya Tata, PMP
 
Network Engineering Projects in NS3
 Network Engineering Projects in NS3 Network Engineering Projects in NS3
Network Engineering Projects in NS3
Phdtopiccom
 
Network-Simulator-Master-Thesis-in-Canada
Network-Simulator-Master-Thesis-in-CanadaNetwork-Simulator-Master-Thesis-in-Canada
Network-Simulator-Master-Thesis-in-Canada
Phdtopiccom
 
Wpa3
Wpa3Wpa3

What's hot (20)

Wireless network security
Wireless network securityWireless network security
Wireless network security
 
Sguil
SguilSguil
Sguil
 
Network Simulation Tools Projects
Network Simulation Tools ProjectsNetwork Simulation Tools Projects
Network Simulation Tools Projects
 
Wireless network security
Wireless network securityWireless network security
Wireless network security
 
What's New in StealthWatch v6.5
What's New in StealthWatch v6.5 What's New in StealthWatch v6.5
What's New in StealthWatch v6.5
 
Wpa vs Wpa2
Wpa vs Wpa2Wpa vs Wpa2
Wpa vs Wpa2
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
 
Introduction To NIDS
Introduction To NIDSIntroduction To NIDS
Introduction To NIDS
 
Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2Wi-Fi security – WEP, WPA and WPA2
Wi-Fi security – WEP, WPA and WPA2
 
Mitigating worm attacks
Mitigating worm attacksMitigating worm attacks
Mitigating worm attacks
 
SDN and NFV
SDN and NFVSDN and NFV
SDN and NFV
 
Microsoft Infopedia webinar "Secure Your Azure Cloud Deployments with VNS3 Ov...
Microsoft Infopedia webinar "Secure Your Azure Cloud Deployments with VNS3 Ov...Microsoft Infopedia webinar "Secure Your Azure Cloud Deployments with VNS3 Ov...
Microsoft Infopedia webinar "Secure Your Azure Cloud Deployments with VNS3 Ov...
 
Wireless security837
Wireless security837Wireless security837
Wireless security837
 
FIWARE Global Summit - Real-time Media Stream Processing Using Kurento
FIWARE Global Summit - Real-time Media Stream Processing Using KurentoFIWARE Global Summit - Real-time Media Stream Processing Using Kurento
FIWARE Global Summit - Real-time Media Stream Processing Using Kurento
 
PhD Thesis NS2 Projects
PhD Thesis NS2 ProjectsPhD Thesis NS2 Projects
PhD Thesis NS2 Projects
 
Kracking WPA2
Kracking WPA2Kracking WPA2
Kracking WPA2
 
WLAN and IP security
WLAN and IP securityWLAN and IP security
WLAN and IP security
 
Network Engineering Projects in NS3
 Network Engineering Projects in NS3 Network Engineering Projects in NS3
Network Engineering Projects in NS3
 
Network-Simulator-Master-Thesis-in-Canada
Network-Simulator-Master-Thesis-in-CanadaNetwork-Simulator-Master-Thesis-in-Canada
Network-Simulator-Master-Thesis-in-Canada
 
Wpa3
Wpa3Wpa3
Wpa3
 

Similar to Wi fi-security-the-details-matter

Webinar: Comunicação TCP/IP segura
Webinar: Comunicação TCP/IP seguraWebinar: Comunicação TCP/IP segura
Webinar: Comunicação TCP/IP segura
Embarcados
 
[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl
CODE BLUE
 
Advancing IoT Communication Security with TLS and DTLS v1.3
Advancing IoT Communication Security with TLS and DTLS v1.3Advancing IoT Communication Security with TLS and DTLS v1.3
Advancing IoT Communication Security with TLS and DTLS v1.3
Hannes Tschofenig
 
Wireless Security
Wireless SecurityWireless Security
IRJET- Public Key Infrastructure (PKI) Understanding for Vxworks RTOS using A...
IRJET- Public Key Infrastructure (PKI) Understanding for Vxworks RTOS using A...IRJET- Public Key Infrastructure (PKI) Understanding for Vxworks RTOS using A...
IRJET- Public Key Infrastructure (PKI) Understanding for Vxworks RTOS using A...
IRJET Journal
 
Chapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptxChapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptx
AmanuelZewdie4
 
Analysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithmsAnalysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithms
IRJET Journal
 
Making Threat Intelligence Actionable Final
Making Threat Intelligence Actionable FinalMaking Threat Intelligence Actionable Final
Making Threat Intelligence Actionable Final
Priyanka Aash
 
GREAT MINDS
GREAT MINDSGREAT MINDS
GREAT MINDS
Sione Taukinukufili
 
Project
ProjectProject
Project
Faraz Shahid
 
Conference Paper: Formal Verification of the Security for Dual Connectivity i...
Conference Paper: Formal Verification of the Security for Dual Connectivity i...Conference Paper: Formal Verification of the Security for Dual Connectivity i...
Conference Paper: Formal Verification of the Security for Dual Connectivity i...
Ericsson
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
IRJET Journal
 
IRJET-Security Enhancement in Next Generation Networks using Enhanced AES wit...
IRJET-Security Enhancement in Next Generation Networks using Enhanced AES wit...IRJET-Security Enhancement in Next Generation Networks using Enhanced AES wit...
IRJET-Security Enhancement in Next Generation Networks using Enhanced AES wit...
IRJET Journal
 
Security Enhancement in Next Generation Networks using Enhanced AES with RC4 ...
Security Enhancement in Next Generation Networks using Enhanced AES with RC4 ...Security Enhancement in Next Generation Networks using Enhanced AES with RC4 ...
Security Enhancement in Next Generation Networks using Enhanced AES with RC4 ...
IRJET Journal
 
R43019698
R43019698R43019698
R43019698
IJERA Editor
 
Ccna 4 Chapter 4 V4.0 Answers
Ccna 4 Chapter 4 V4.0 AnswersCcna 4 Chapter 4 V4.0 Answers
Ccna 4 Chapter 4 V4.0 Answers
ccna4discovery
 
Simplifying the secure data center
Simplifying the secure data centerSimplifying the secure data center
Simplifying the secure data center
Cisco Canada
 
Ip sec
Ip secIp sec
Hacking a Professional Drone
Hacking a Professional DroneHacking a Professional Drone
Hacking a Professional Drone
Priyanka Aash
 
Making networks secure with multi-layer encryption
Making networks secure with multi-layer encryptionMaking networks secure with multi-layer encryption
Making networks secure with multi-layer encryption
ADVA
 

Similar to Wi fi-security-the-details-matter (20)

Webinar: Comunicação TCP/IP segura
Webinar: Comunicação TCP/IP seguraWebinar: Comunicação TCP/IP segura
Webinar: Comunicação TCP/IP segura
 
[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl
 
Advancing IoT Communication Security with TLS and DTLS v1.3
Advancing IoT Communication Security with TLS and DTLS v1.3Advancing IoT Communication Security with TLS and DTLS v1.3
Advancing IoT Communication Security with TLS and DTLS v1.3
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
 
IRJET- Public Key Infrastructure (PKI) Understanding for Vxworks RTOS using A...
IRJET- Public Key Infrastructure (PKI) Understanding for Vxworks RTOS using A...IRJET- Public Key Infrastructure (PKI) Understanding for Vxworks RTOS using A...
IRJET- Public Key Infrastructure (PKI) Understanding for Vxworks RTOS using A...
 
Chapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptxChapter 7 - Wireless Network Security.pptx
Chapter 7 - Wireless Network Security.pptx
 
Analysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithmsAnalysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithms
 
Making Threat Intelligence Actionable Final
Making Threat Intelligence Actionable FinalMaking Threat Intelligence Actionable Final
Making Threat Intelligence Actionable Final
 
GREAT MINDS
GREAT MINDSGREAT MINDS
GREAT MINDS
 
Project
ProjectProject
Project
 
Conference Paper: Formal Verification of the Security for Dual Connectivity i...
Conference Paper: Formal Verification of the Security for Dual Connectivity i...Conference Paper: Formal Verification of the Security for Dual Connectivity i...
Conference Paper: Formal Verification of the Security for Dual Connectivity i...
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
 
IRJET-Security Enhancement in Next Generation Networks using Enhanced AES wit...
IRJET-Security Enhancement in Next Generation Networks using Enhanced AES wit...IRJET-Security Enhancement in Next Generation Networks using Enhanced AES wit...
IRJET-Security Enhancement in Next Generation Networks using Enhanced AES wit...
 
Security Enhancement in Next Generation Networks using Enhanced AES with RC4 ...
Security Enhancement in Next Generation Networks using Enhanced AES with RC4 ...Security Enhancement in Next Generation Networks using Enhanced AES with RC4 ...
Security Enhancement in Next Generation Networks using Enhanced AES with RC4 ...
 
R43019698
R43019698R43019698
R43019698
 
Ccna 4 Chapter 4 V4.0 Answers
Ccna 4 Chapter 4 V4.0 AnswersCcna 4 Chapter 4 V4.0 Answers
Ccna 4 Chapter 4 V4.0 Answers
 
Simplifying the secure data center
Simplifying the secure data centerSimplifying the secure data center
Simplifying the secure data center
 
Ip sec
Ip secIp sec
Ip sec
 
Hacking a Professional Drone
Hacking a Professional DroneHacking a Professional Drone
Hacking a Professional Drone
 
Making networks secure with multi-layer encryption
Making networks secure with multi-layer encryptionMaking networks secure with multi-layer encryption
Making networks secure with multi-layer encryption
 

More from DESMOND YUEN

2022-AI-Index-Report_Master.pdf
2022-AI-Index-Report_Master.pdf2022-AI-Index-Report_Master.pdf
2022-AI-Index-Report_Master.pdf
DESMOND YUEN
 
Small Is the New Big
Small Is the New BigSmall Is the New Big
Small Is the New Big
DESMOND YUEN
 
Intel® Blockscale™ ASIC Product Brief
Intel® Blockscale™ ASIC Product BriefIntel® Blockscale™ ASIC Product Brief
Intel® Blockscale™ ASIC Product Brief
DESMOND YUEN
 
Cryptography Processing with 3rd Gen Intel Xeon Scalable Processors
Cryptography Processing with 3rd Gen Intel Xeon Scalable ProcessorsCryptography Processing with 3rd Gen Intel Xeon Scalable Processors
Cryptography Processing with 3rd Gen Intel Xeon Scalable Processors
DESMOND YUEN
 
Intel 2021 Product Security Report
Intel 2021 Product Security ReportIntel 2021 Product Security Report
Intel 2021 Product Security Report
DESMOND YUEN
 
How can regulation keep up as transformation races ahead? 2022 Global regulat...
How can regulation keep up as transformation races ahead? 2022 Global regulat...How can regulation keep up as transformation races ahead? 2022 Global regulat...
How can regulation keep up as transformation races ahead? 2022 Global regulat...
DESMOND YUEN
 
NASA Spinoffs Help Fight Coronavirus, Clean Pollution, Grow Food, More
NASA Spinoffs Help Fight Coronavirus, Clean Pollution, Grow Food, MoreNASA Spinoffs Help Fight Coronavirus, Clean Pollution, Grow Food, More
NASA Spinoffs Help Fight Coronavirus, Clean Pollution, Grow Food, More
DESMOND YUEN
 
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
DESMOND YUEN
 
PUTTING PEOPLE FIRST: ITS IS SMART COMMUNITIES AND CITIES
PUTTING PEOPLE FIRST:  ITS IS SMART COMMUNITIES AND  CITIESPUTTING PEOPLE FIRST:  ITS IS SMART COMMUNITIES AND  CITIES
PUTTING PEOPLE FIRST: ITS IS SMART COMMUNITIES AND CITIES
DESMOND YUEN
 
BUILDING AN OPEN RAN ECOSYSTEM FOR EUROPE
BUILDING AN OPEN RAN ECOSYSTEM FOR EUROPEBUILDING AN OPEN RAN ECOSYSTEM FOR EUROPE
BUILDING AN OPEN RAN ECOSYSTEM FOR EUROPE
DESMOND YUEN
 
An Introduction to Semiconductors and Intel
An Introduction to Semiconductors and IntelAn Introduction to Semiconductors and Intel
An Introduction to Semiconductors and Intel
DESMOND YUEN
 
Changing demographics and economic growth bloom
Changing demographics and economic growth bloomChanging demographics and economic growth bloom
Changing demographics and economic growth bloom
DESMOND YUEN
 
Intel’s Impacts on the US Economy
Intel’s Impacts on the US EconomyIntel’s Impacts on the US Economy
Intel’s Impacts on the US Economy
DESMOND YUEN
 
2021 private networks infographics
2021 private networks infographics2021 private networks infographics
2021 private networks infographics
DESMOND YUEN
 
Transforming the Modern City with the Intel-based 5G Smart City Road Side Uni...
Transforming the Modern City with the Intel-based 5G Smart City Road Side Uni...Transforming the Modern City with the Intel-based 5G Smart City Road Side Uni...
Transforming the Modern City with the Intel-based 5G Smart City Road Side Uni...
DESMOND YUEN
 
Accelerate Your AI Today
Accelerate Your AI TodayAccelerate Your AI Today
Accelerate Your AI Today
DESMOND YUEN
 
Increasing Throughput per Node for Content Delivery Networks
Increasing Throughput per Node for Content Delivery NetworksIncreasing Throughput per Node for Content Delivery Networks
Increasing Throughput per Node for Content Delivery Networks
DESMOND YUEN
 
3rd Generation Intel® Xeon® Scalable Processor - Achieving 1 Tbps IPsec with ...
3rd Generation Intel® Xeon® Scalable Processor - Achieving 1 Tbps IPsec with ...3rd Generation Intel® Xeon® Scalable Processor - Achieving 1 Tbps IPsec with ...
3rd Generation Intel® Xeon® Scalable Processor - Achieving 1 Tbps IPsec with ...
DESMOND YUEN
 
"Life and Learning After One-Hundred Years: Trust Is The Coin Of The Realm."
"Life and Learning After One-Hundred Years: Trust Is The Coin Of The Realm.""Life and Learning After One-Hundred Years: Trust Is The Coin Of The Realm."
"Life and Learning After One-Hundred Years: Trust Is The Coin Of The Realm."
DESMOND YUEN
 
Telefónica views on the design, architecture, and technology of 4G/5G Open RA...
Telefónica views on the design, architecture, and technology of 4G/5G Open RA...Telefónica views on the design, architecture, and technology of 4G/5G Open RA...
Telefónica views on the design, architecture, and technology of 4G/5G Open RA...
DESMOND YUEN
 

More from DESMOND YUEN (20)

2022-AI-Index-Report_Master.pdf
2022-AI-Index-Report_Master.pdf2022-AI-Index-Report_Master.pdf
2022-AI-Index-Report_Master.pdf
 
Small Is the New Big
Small Is the New BigSmall Is the New Big
Small Is the New Big
 
Intel® Blockscale™ ASIC Product Brief
Intel® Blockscale™ ASIC Product BriefIntel® Blockscale™ ASIC Product Brief
Intel® Blockscale™ ASIC Product Brief
 
Cryptography Processing with 3rd Gen Intel Xeon Scalable Processors
Cryptography Processing with 3rd Gen Intel Xeon Scalable ProcessorsCryptography Processing with 3rd Gen Intel Xeon Scalable Processors
Cryptography Processing with 3rd Gen Intel Xeon Scalable Processors
 
Intel 2021 Product Security Report
Intel 2021 Product Security ReportIntel 2021 Product Security Report
Intel 2021 Product Security Report
 
How can regulation keep up as transformation races ahead? 2022 Global regulat...
How can regulation keep up as transformation races ahead? 2022 Global regulat...How can regulation keep up as transformation races ahead? 2022 Global regulat...
How can regulation keep up as transformation races ahead? 2022 Global regulat...
 
NASA Spinoffs Help Fight Coronavirus, Clean Pollution, Grow Food, More
NASA Spinoffs Help Fight Coronavirus, Clean Pollution, Grow Food, MoreNASA Spinoffs Help Fight Coronavirus, Clean Pollution, Grow Food, More
NASA Spinoffs Help Fight Coronavirus, Clean Pollution, Grow Food, More
 
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
 
PUTTING PEOPLE FIRST: ITS IS SMART COMMUNITIES AND CITIES
PUTTING PEOPLE FIRST:  ITS IS SMART COMMUNITIES AND  CITIESPUTTING PEOPLE FIRST:  ITS IS SMART COMMUNITIES AND  CITIES
PUTTING PEOPLE FIRST: ITS IS SMART COMMUNITIES AND CITIES
 
BUILDING AN OPEN RAN ECOSYSTEM FOR EUROPE
BUILDING AN OPEN RAN ECOSYSTEM FOR EUROPEBUILDING AN OPEN RAN ECOSYSTEM FOR EUROPE
BUILDING AN OPEN RAN ECOSYSTEM FOR EUROPE
 
An Introduction to Semiconductors and Intel
An Introduction to Semiconductors and IntelAn Introduction to Semiconductors and Intel
An Introduction to Semiconductors and Intel
 
Changing demographics and economic growth bloom
Changing demographics and economic growth bloomChanging demographics and economic growth bloom
Changing demographics and economic growth bloom
 
Intel’s Impacts on the US Economy
Intel’s Impacts on the US EconomyIntel’s Impacts on the US Economy
Intel’s Impacts on the US Economy
 
2021 private networks infographics
2021 private networks infographics2021 private networks infographics
2021 private networks infographics
 
Transforming the Modern City with the Intel-based 5G Smart City Road Side Uni...
Transforming the Modern City with the Intel-based 5G Smart City Road Side Uni...Transforming the Modern City with the Intel-based 5G Smart City Road Side Uni...
Transforming the Modern City with the Intel-based 5G Smart City Road Side Uni...
 
Accelerate Your AI Today
Accelerate Your AI TodayAccelerate Your AI Today
Accelerate Your AI Today
 
Increasing Throughput per Node for Content Delivery Networks
Increasing Throughput per Node for Content Delivery NetworksIncreasing Throughput per Node for Content Delivery Networks
Increasing Throughput per Node for Content Delivery Networks
 
3rd Generation Intel® Xeon® Scalable Processor - Achieving 1 Tbps IPsec with ...
3rd Generation Intel® Xeon® Scalable Processor - Achieving 1 Tbps IPsec with ...3rd Generation Intel® Xeon® Scalable Processor - Achieving 1 Tbps IPsec with ...
3rd Generation Intel® Xeon® Scalable Processor - Achieving 1 Tbps IPsec with ...
 
"Life and Learning After One-Hundred Years: Trust Is The Coin Of The Realm."
"Life and Learning After One-Hundred Years: Trust Is The Coin Of The Realm.""Life and Learning After One-Hundred Years: Trust Is The Coin Of The Realm."
"Life and Learning After One-Hundred Years: Trust Is The Coin Of The Realm."
 
Telefónica views on the design, architecture, and technology of 4G/5G Open RA...
Telefónica views on the design, architecture, and technology of 4G/5G Open RA...Telefónica views on the design, architecture, and technology of 4G/5G Open RA...
Telefónica views on the design, architecture, and technology of 4G/5G Open RA...
 

Recently uploaded

E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian CompaniesE-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
Quickdice ERP
 
Enums On Steroids - let's look at sealed classes !
Enums On Steroids - let's look at sealed classes !Enums On Steroids - let's look at sealed classes !
Enums On Steroids - let's look at sealed classes !
Marcin Chrost
 
E-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet DynamicsE-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet Dynamics
Hornet Dynamics
 
UI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design SystemUI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design System
Peter Muessig
 
Mobile app Development Services | Drona Infotech
Mobile app Development Services  | Drona InfotechMobile app Development Services  | Drona Infotech
Mobile app Development Services | Drona Infotech
Drona Infotech
 
Lecture 2 - software testing SE 412.pptx
Lecture 2 - software testing SE 412.pptxLecture 2 - software testing SE 412.pptx
Lecture 2 - software testing SE 412.pptx
TaghreedAltamimi
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
TheSMSPoint
 
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, FactsALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
Green Software Development
 
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
XfilesPro
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
Rakesh Kumar R
 
How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?
ToXSL Technologies
 
Modelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - AmsterdamModelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - Amsterdam
Alberto Brandolini
 
Odoo ERP Vs. Traditional ERP Systems – A Comparative Analysis
Odoo ERP Vs. Traditional ERP Systems – A Comparative AnalysisOdoo ERP Vs. Traditional ERP Systems – A Comparative Analysis
Odoo ERP Vs. Traditional ERP Systems – A Comparative Analysis
Envertis Software Solutions
 
Top 9 Trends in Cybersecurity for 2024.pptx
Top 9 Trends in Cybersecurity for 2024.pptxTop 9 Trends in Cybersecurity for 2024.pptx
Top 9 Trends in Cybersecurity for 2024.pptx
devvsandy
 
socradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdfsocradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdf
SOCRadar
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
brainerhub1
 
What next after learning python programming basics
What next after learning python programming basicsWhat next after learning python programming basics
What next after learning python programming basics
Rakesh Kumar R
 
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemUI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
Peter Muessig
 
Hand Rolled Applicative User Validation Code Kata
Hand Rolled Applicative User ValidationCode KataHand Rolled Applicative User ValidationCode Kata
Hand Rolled Applicative User Validation Code Kata
Philip Schwarz
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
Green Software Development
 

Recently uploaded (20)

E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian CompaniesE-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
 
Enums On Steroids - let's look at sealed classes !
Enums On Steroids - let's look at sealed classes !Enums On Steroids - let's look at sealed classes !
Enums On Steroids - let's look at sealed classes !
 
E-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet DynamicsE-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet Dynamics
 
UI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design SystemUI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design System
 
Mobile app Development Services | Drona Infotech
Mobile app Development Services  | Drona InfotechMobile app Development Services  | Drona Infotech
Mobile app Development Services | Drona Infotech
 
Lecture 2 - software testing SE 412.pptx
Lecture 2 - software testing SE 412.pptxLecture 2 - software testing SE 412.pptx
Lecture 2 - software testing SE 412.pptx
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
 
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, FactsALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
 
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
 
How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?
 
Modelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - AmsterdamModelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - Amsterdam
 
Odoo ERP Vs. Traditional ERP Systems – A Comparative Analysis
Odoo ERP Vs. Traditional ERP Systems – A Comparative AnalysisOdoo ERP Vs. Traditional ERP Systems – A Comparative Analysis
Odoo ERP Vs. Traditional ERP Systems – A Comparative Analysis
 
Top 9 Trends in Cybersecurity for 2024.pptx
Top 9 Trends in Cybersecurity for 2024.pptxTop 9 Trends in Cybersecurity for 2024.pptx
Top 9 Trends in Cybersecurity for 2024.pptx
 
socradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdfsocradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdf
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
 
What next after learning python programming basics
What next after learning python programming basicsWhat next after learning python programming basics
What next after learning python programming basics
 
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemUI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
 
Hand Rolled Applicative User Validation Code Kata
Hand Rolled Applicative User ValidationCode KataHand Rolled Applicative User ValidationCode Kata
Hand Rolled Applicative User Validation Code Kata
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
 

Wi fi-security-the-details-matter

  • 1. SESSION ID: #RSAC Tom Carpenter WI-FI SECURITY: THE DETAILS MATTER TECH-R12 CTO CWNP @carpentertom | @CWNP
  • 2. # R S A C Why Does Wi-Fi Security Matter? 2 541.6 million hotspots by 2021 500 million new mobile workforce professionals Wi-Fi is entering new areas every month Cloud-managed WLAN market to grow to $3.3 billion by 2020
  • 3. # R S A C Wi-Fi Security Landscape 3 Data Link (MAC) Layer Data encryption and authentication should be used Network (IP) Layer Secure infrastructure and protocols should be used Physical Layer Monitoring and alert systems should be used Application Layer Use of secure applications assists in network security
  • 4. # R S A C Focus Points 4 Authentication EncryptionMonitoring
  • 5. # R S A C 802.11 Authentication Methods 5 Open System Pre-Shared Key 802.1X/EAP Shared Key is deprecated as of 802.11i-2004
  • 6. # R S A C Open System Authentication 6 A null authentication method
  • 7. # R S A C Pre-Shared Key (PSK) 7 The association request frame of a PSK-based authentication will show the AKM Suite type as 00-0F-AC:02.
  • 8. # R S A C WPA2-Personal Passphrase Wr$578Hyt#4387jYu Algorithm WPA2-Personal is also known commonly as WPA2-PSK
  • 9. # R S A C How PSK Authenticates 9  Authentication occurs during the 4-way handshake  Frames 2-4 are MIC-protected  The MIC calculation includes the KCK, which is part of the PTK, as an input  Mismatched MIC calculations between the supplicant and authenticator result in termination of the 4-way handshake
  • 10. # R S A C Port-Based 802.1X Access Control 10 An entity at one end of a point-to-point LAN segment that is being authenticated by an Authenticator attached to the other end of that link. An entity at one end of a point- to-point LAN segment that facilitates authentication of the entity attached to the other end of that link. An entity that provides an authentication service to an Authenticator. This service determines, from the credentials provided by the Supplicant, whether the Supplicant is authorized to access the services provided by the Authenticator.
  • 11. # R S A C 802.1X Port Functions 11
  • 12. # R S A C 802.1X/EAP
  • 13. # R S A C 802.1X/EAP Architecture
  • 14. # R S A C Enterprise 802.1X/EAP Deployment 14
  • 15. # R S A C 802.11 Encryption Methods 15 Authentication and Key Management suites Temporal Key Integrity Protocol (TKIP) – Deprecated Counter Mode Cipher Block Chaining Message Authentication Code Protocol (CCMP) Encryption algorithms Rivest Cipher 4 (RC4) - Deprecated Advanced Encryption Standard (AES) Modern Wi-Fi generates encryption keys during the 4-way handshake
  • 16. # R S A C 4-Way Handshake 16
  • 17. # R S A C Message One 17 0,0,1,0,P,0,0 1 when initial key exchange is complete 1 when MIC is in the message 1 when a response is required Install bit – 1 means install the keys Key Type – P is Pairwise and G is Group Used only in PeerKey operations (1 is PeerKey) Key RSC (Receive Sequence Counter) for GTK MIC Elements defining the key
  • 18. # R S A C Message Two 18 The client now sends its NONCE (SNONCE) to the AP/Controller At this point the client and the AP both have all that’s required to generate the Pairwise Transient Key (PTK)
  • 19. # R S A C Message 3 19 The AP/Controller can now send the GTK to the client and the install bit (bit 4) is set to 1 This is the point at which KRACK operates
  • 20. # R S A C Message 4 20 This is really just the “all is good” message so the AP/Controller knows the client has the PTK and GTK installed
  • 21. # R S A C KRACK Operation 21 Attacker Client AP Attacker Client AP Initiate Attack
  • 22. # R S A C Who is to blame for KRACK?  Great question; Complex answer  Some say the IEEE because of closed processes and lack of availability of the standard early after release  Tom’s take: the 802.11i amendment has been easily available for 13 years with no fee most of that time, if someone noted the problem, the IEEE could have easily included a fix in 11n, 11ac, or any other amendment since then – not sure this is the real problem  Some say the vendors because they should have implemented the flexible state machine more securely  Tom’s take: this is a hard one, the standard leaves a lot of flexibility, so each vendor would do it differently and if they make it too complex they could introduce compatibility problems  Tom’s opinion: Time  Tom’s take: time is to blame; nearly every security solution degrades over time as the most brilliant minds may create it, but other brilliant minds want to thwart it – time is usually on the side of the attackers  End result: Security is a process not an event
  • 23. # R S A C 802.11 Key Hierarchy 23
  • 24. # R S A C Pairwise Transient Key (PTK) 24 The PTK is comprised of three keys: KCK, KEK and TK KCK used for key integrity KEK used to encrypt and send keys (GTK) The TK is used to encrypt data payloads
  • 25. # R S A C Wi-Fi Monitoring Methods 25 Infrastructure solutions Overlay solutions Mobile solutions
  • 26. # R S A C Where do I go from here? 26 Immediately Validate the proper security of your existing Wi-Fi gear — Verify patches — Verify configuration In the next 2-3 months Ensure all newly acquired equipment supports WPA2 (amended) or WPA3 — Anything certified after November 2017 is tested for KRACK patching In the next six months Consider a dedicated Wi-Fi security monitoring solution — Monitor configurations, new RF devices, anomalies Many performance tools integrate security metrics, such as 7signal