Скачать презентацию 802 1 X in Windows Tom Rixom Alfa Скачать презентацию 802 1 X in Windows Tom Rixom Alfa

69636c36b025eb48086537e5f322769e.ppt

  • Количество слайдов: 32

802. 1 X in Windows Tom Rixom Alfa & Ariss 802. 1 X in Windows Tom Rixom Alfa & Ariss

Overview • • 802. 1 X/EAP 802. 1 X in Windows Tunneled Authentication Certificates Overview • • 802. 1 X/EAP 802. 1 X in Windows Tunneled Authentication Certificates in Windows WIFI Client in Windows (WZC) Configuration examples Questions?

802. 1 X/EAP • • • Port Based Network Access Control Authenticated/Unauthenticated Port Supplicant/Authenticator/Authentication 802. 1 X/EAP • • • Port Based Network Access Control Authenticated/Unauthenticated Port Supplicant/Authenticator/Authentication Server Uses EAP (Extensible Authentication Protocol) Allows authentication based on user credentials

EAP over LAN(EAPOL) EAP over LAN(EAPOL)

802. 1 X Client • 802. 1 X Protocol Driver (EAPOL Driver) – Handles 802. 1 X Client • 802. 1 X Protocol Driver (EAPOL Driver) – Handles all EAPOL communication – Extracts EAP messages from EAPOL which can be read by applications – Inserts EAP messages into EAPOL that applications wish to send • 802. 1 X Client Application – Uses Driver to send and receive EAP messages – Handles EAP messages accordingly

802. 1 X Client in Windows • • Implements 802. 1 X Driver (NDIS) 802. 1 X Client in Windows • • Implements 802. 1 X Driver (NDIS) and Application Uses Microsoft EAP API to handle the EAP communication Controls user interaction (Balloon) User/Computer context

EAP in Windows • Microsoft EAP API • • • An EAP Module is EAP in Windows • Microsoft EAP API • • • An EAP Module is “Microsoft DLL” that implements Microsoft EAP API 802. 1 X Client calls modules using EAP API to handle authentication Other example is the Microsoft VPN Client

EAP Modules • EAP-MD 5 (Built-in) – Username/password • EAP-TLS (Built-in) – Client/server certificates EAP Modules • EAP-MD 5 (Built-in) – Username/password • EAP-TLS (Built-in) – Client/server certificates (PKI) • EAP-MSCHAPV 2 (Built-in) – Username/password (Windows credentials) • Protected EAP (PEAP) (Built-in) – Server certificate – Tunneled EAP Authentication – EAP-MD 5, EAP-MSCHAPV 2, EAP-… • EAP-TTLS – Server certificate – Tunneled Diameter Authentication – Diameter (PAP/CHAP/…), EAP

Tunneled Authentication (TTLS/PEAP) • Uses TLS tunnel to protect data – The TLS tunnel Tunneled Authentication (TTLS/PEAP) • Uses TLS tunnel to protect data – The TLS tunnel is established using the Server certificate automatically authenticating the server and preventing man-in-the-middle attacks • Allows use of dynamic session keys for line encryption

PEAP? • PEAP – Version 1, 2 – Supported by Cisco, Apple OS X PEAP? • PEAP – Version 1, 2 – Supported by Cisco, Apple OS X Panther – http: //www. ietf. org/internet-drafts/draft-josefsson-pppext-eap-tls-eap -07. txt • Microsoft PEAP (Windows XP SP 1) – Version 0 • No headers – Implemented by Microsoft PEAP module – http: //www. ietf. org/internet-drafts/draft-kamath-pppext-peapv 000. txt

Certificates in Windows • PEAP (Built-in) and Secure. W 2 use the windows certificate Certificates in Windows • PEAP (Built-in) and Secure. W 2 use the windows certificate trust • Certificate (Chain) of Authentication server must be installed on local computer • Certificate stores: – User • Each user has own user store in which the user can install certificates and build certificate trusts • Certificates visible only to the store owner (User) – System • Only Administrators and system applications can install certificates in system store • Certificates can be used by all applications and users

WIFI Client in Windows Wireless Zero Config (WZC) • Generic interface for configuring wireless WIFI Client in Windows Wireless Zero Config (WZC) • Generic interface for configuring wireless connections • Compatibility – Wireless Ethernet Driver must be compatible with WZC to enable 802. 1 X • Windows XP – WPA • Windows Mobile Pocket PC 2003 • Windows 2000 requires 3 rd Party WIFI Client

EAPOL Key EAPOL Key

802. 1 X WIFI Scenario • • • The WIFI Client associates with the 802. 1 X WIFI Scenario • • • The WIFI Client associates with the Access Point (SSID) The Access Point requires 802. 1 X and sets the Clients “port” to the “Unauthenticated” state. The Access Point then starts EAPOL communication by sending the EAPOL-Identity message to the Client The 802. 1 X Client picks up the EAPOL communication and calls the appropriate EAP module to handle the EAP authentication After successful authentication the EAP RADIUS Server and Client generate the MPPE keys (based on the TLS tunnel) The RADIUS Server sends the MPPE keys (with the Access Accept) to the Access Point The Access Point sets the Clients “port” to the “Authenticated state” allowing the client to communicate with the Intranet The Access Point then uses the MPPE keys to encode a WEP key in an EAPOL key message The Access Point sends the EAPOL key to the Client The Client decodes the WEP key in the EAPOL key message using the MPPE keys it generated and sets the WEP key WIFI Client takes over to setup rest of the connection (DHCP)

Configuration example #1 EAP-TTLS/Secure. W 2 (Windows XP, Wireless) Step 1 • Connection properties Configuration example #1 EAP-TTLS/Secure. W 2 (Windows XP, Wireless) Step 1 • Connection properties

Configuration example #1 EAP-TTLS/Secure. W 2 (Windows XP, Wireless) Step 1 • Connection properties Configuration example #1 EAP-TTLS/Secure. W 2 (Windows XP, Wireless) Step 1 • Connection properties

Configuration example #1 EAP-TTLS/Secure. W 2 (Windows XP, Wireless) Step 2 • Wireless Networks Configuration example #1 EAP-TTLS/Secure. W 2 (Windows XP, Wireless) Step 2 • Wireless Networks

Configuration example #1 EAP-TTLS/Secure. W 2 (Windows XP, Wireless) Step 2 • Wireless Networks Configuration example #1 EAP-TTLS/Secure. W 2 (Windows XP, Wireless) Step 2 • Wireless Networks

Configuration example #1 EAP-TTLS/Secure. W 2 (Windows XP, Wireless) Step 3 • Wireless Networks Configuration example #1 EAP-TTLS/Secure. W 2 (Windows XP, Wireless) Step 3 • Wireless Networks properties

Configuration example #1 EAP-TTLS/Secure. W 2 (Windows XP, Wireless) Step 3 • Wireless Networks Configuration example #1 EAP-TTLS/Secure. W 2 (Windows XP, Wireless) Step 3 • Wireless Networks properties

Configuration example #1 EAP-TTLS/Secure. W 2 (Windows XP, Wireless) Step 4 • Wireless Networks Configuration example #1 EAP-TTLS/Secure. W 2 (Windows XP, Wireless) Step 4 • Wireless Networks properties (Authentication)

Configuration example #1 EAP-TTLS/Secure. W 2 (Windows XP, Wireless) Step 4 • Wireless Networks Configuration example #1 EAP-TTLS/Secure. W 2 (Windows XP, Wireless) Step 4 • Wireless Networks properties (Authentication)

Configuration example #1 EAP-TTLS/Secure. W 2 (Windows XP, Wireless) Step 5 • Secure. W Configuration example #1 EAP-TTLS/Secure. W 2 (Windows XP, Wireless) Step 5 • Secure. W 2 properties

Configuration example #2 PEAP (Wired, Windows 2 K) Step 1 • Start Wireless Configuration Configuration example #2 PEAP (Wired, Windows 2 K) Step 1 • Start Wireless Configuration service

Configuration example #2 PEAP (Wired, Windows 2 K) Step 1 • Start Wireless Configuration Configuration example #2 PEAP (Wired, Windows 2 K) Step 1 • Start Wireless Configuration service

Configuration example #2 PEAP (Wired, Windows 2 K) Step 2 • Connection properties Configuration example #2 PEAP (Wired, Windows 2 K) Step 2 • Connection properties

Configuration example #2 PEAP (Wired, Windows 2 K) Step 2 • Connection properties Configuration example #2 PEAP (Wired, Windows 2 K) Step 2 • Connection properties

Configuration example #2 PEAP (Wired, Windows 2 K) Step 3 • Authentication properties Configuration example #2 PEAP (Wired, Windows 2 K) Step 3 • Authentication properties

Configuration example #2 PEAP (Wired, Windows 2 K) Step 3 • Authentication properties Configuration example #2 PEAP (Wired, Windows 2 K) Step 3 • Authentication properties

Configuration example #2 PEAP (Wired, Windows 2 K) Step 4 • PEAP properties Configuration example #2 PEAP (Wired, Windows 2 K) Step 4 • PEAP properties

Configuration example #2 PEAP (Wired, Windows 2 K) Step 4 • Configure 3 rd Configuration example #2 PEAP (Wired, Windows 2 K) Step 4 • Configure 3 rd Party WIFI Client – Some client support dynamic WEP keys – Other clients not supporting dynamic WEP keys can be tricked: “Fake WEP Key”

Questions? • … Questions? • …