Page 221 - DCAP311_DCAP607_WIRELESS_NETWORKS
P. 221

Unit 13: Wireless Networks Security




                                                                                                Notes


             Notes  A flaw in a feature added to Wi-Fi, called Wi-Fi Protected Setup, allows WPA and
             WPA2 security to be bypassed and effectively broken in many situations. WPA and WPA2
             security implemented without using the Wi-Fi Protected Setup feature are unaffected by
             the security vulnerability.


          A flaw in a feature added to Wi-Fi, called Wi-Fi Protected Setup, allows WPA and WPA2 security
          to be bypassed and effectively broken in many situations. WPA and WPA2 security implemented
          without using the Wi-Fi Protected Setup feature are unaffected by the security vulnerability.
          WPA and WPA 2


          The  Wi-Fi Alliance  intended WPA  as  an intermediate measure  to take the place  of  WEP
          pending the availability of  the full  IEEE  802.11i  standard.  WPA  could  be implemented
          through firmware upgrades on wireless network interface cards designed for WEP that began
          shipping  as  far  back  as  1999.  However,  since  the  changes  required  in  the  wireless  access
          points (APs) were more extensive than those needed on the network cards, most pre-2003 APs
          could not be upgraded to support WPA.
          The WPA protocol implements much of the IEEE 802.11i standard. Specifically, the Temporal
          Key Integrity Protocol (TKIP), was adopted for WPA. WEP used a 40-bit or 104-bit encryption
          key that must be manually entered on wireless access points and devices and does not change.
          TKIP employs a per-packet key, meaning that it dynamically generates a new 128-bit key for each
          packet and thus prevents the types of attacks that compromised WEP.
          WPA also includes a message integrity  check. This is designed to prevent an attacker  from
          capturing, altering and/or  resending data packets. This  replaces  the  cyclic  redundancy
          check (CRC) that was used by the WEP standard. CRC's main flaw was that it did not provide
          a sufficiently strong data integrity guarantee for the packets it handled. Well tested message
          authentication codes existed to solve these problems, but they required too much computation to
          be used on old network cards. WPA uses a message integrity check algorithm called Michael to
          verify the integrity of the packets. Michael is much stronger than a CRC, but not as strong as the
          algorithm used in WPA2. Researchers have since discovered a flaw in WPA that relied on older
          weaknesses in WEP and the limitations of Michael to retrieve the keystream from short packets
          to use for re-injection and spoofing.
          WPA2 has replaced WPA. WPA2, which requires testing and certification by the Wi-Fi Alliance,
          implements  the mandatory  elements  of  IEEE  802.11i. In particular, it introduces  CCMP,  a
          new AES-based encryption mode with strong security. Certification began in September, 2004;
          from March 13, 2006, WPA2 certification is mandatory for all new devices to bear the Wi-Fi
          trademark

          13.7.3 Virtual Private Network (VPN)

          A  virtual  private  network  (VPN)  extends  a  private  networkacross  a  public  network,  such  as
          the Internet. It enables a computer to send and receive data across shared or public networks as if it
          were directly connected to the private network, while benefitting from the functionality, security
          and management policies of the private network. This is done by establishing a virtual point-to-
          point connection through the use of dedicated connections, encryption, or a combination of the
          two.
          A VPN connection across the Internet is similar to a wide area network (WAN) link between the
          sites. From a user perspective, the extended network resources are accessed in the same way as
          resources available from the private network.



                                           LOVELY PROFESSIONAL UNIVERSITY                                   215
   216   217   218   219   220   221   222   223   224   225   226