Revision as of 10:02, 6 July 2014 editDsimic (talk | contribs)Extended confirmed users, Pending changes reviewers, Rollbackers39,664 edits →Security Flaws: No need to be capitalized; No need for a subsection← Previous edit | Revision as of 10:04, 6 July 2014 edit undoDsimic (talk | contribs)Extended confirmed users, Pending changes reviewers, Rollbackers39,664 edits →top: Directed the merger discussion to Talk:Wi-Fi Protected Access#Merger proposal, please describe it thereNext edit → | ||
Line 1: | Line 1: | ||
{{merge to|Wi-Fi Protected Access|date=July 2014}} | {{merge to|Wi-Fi Protected Access|discuss=Talk:Wi-Fi Protected Access#Merger proposal|date=July 2014}} | ||
'''IEEE 802.11i-2004''' or '''802.11i''', implemented as ], is an amendment to the original ]. The draft standard was ratified on 24 June 2004. This standard specifies security mechanisms for ]s. It replaced the short ''Authentication and privacy'' clause of the original standard with a detailed ''Security'' clause. In the process it ] the broken ]. The amendment was later incorporated into the published ] standard. | '''IEEE 802.11i-2004''' or '''802.11i''', implemented as ], is an amendment to the original ]. The draft standard was ratified on 24 June 2004. This standard specifies security mechanisms for ]s. It replaced the short ''Authentication and privacy'' clause of the original standard with a detailed ''Security'' clause. In the process it ] the broken ]. The amendment was later incorporated into the published ] standard. | ||
Revision as of 10:04, 6 July 2014
It has been suggested that this article be merged into Wi-Fi Protected Access. (Discuss) Proposed since July 2014. |
IEEE 802.11i-2004 or 802.11i, implemented as WPA2, is an amendment to the original IEEE 802.11. The draft standard was ratified on 24 June 2004. This standard specifies security mechanisms for wireless networks. It replaced the short Authentication and privacy clause of the original standard with a detailed Security clause. In the process it deprecated the broken WEP. The amendment was later incorporated into the published IEEE 802.11-2007 standard.
Replacement of WEP
802.11i supersedes the previous security specification, Wired Equivalent Privacy (WEP), which was shown to have security vulnerabilities. Wi-Fi Protected Access (WPA) had previously been introduced by the Wi-Fi Alliance as an intermediate solution to WEP insecurities. WPA implemented a subset of a draft of 802.11i. The Wi-Fi Alliance refers to their approved, interoperable implementation of the full 802.11i as WPA2, also called RSN (Robust Security Network). 802.11i makes use of the Advanced Encryption Standard (AES) block cipher, whereas WEP and WPA use the RC4 stream cipher.
Protocol operation
IEEE 802.11i enhances IEEE 802.11-1999 by providing a Robust Security Network (RSN) with two new protocols, the 4-Way Handshake and the Group Key Handshake. These utilize the authentication services and port access control described in IEEE 802.1X to establish and change the appropriate cryptographic keys. The RSN is a security network that only allows the creation of robust security network associations (RSNAs), which are a type of association used by a pair of stations (STAs) if the procedure to establish authentication or association between them includes the 4-Way Handshake. It also provides two RSNA data confidentiality and integrity protocols, TKIP and CCMP, with implementation of CCMP being mandatory.
The Four-Way Handshake
The authentication process leaves two considerations: the access point (AP) still needs to authenticate itself to the client station (STA), and keys to encrypt the traffic need to be derived. The earlier EAP exchange or WPA2-PSK has provided the shared secret key PMK (Pairwise Master Key). This key is, however, designed to last the entire session and should be exposed as little as possible. Therefore the four-way handshake is used to establish another key called the PTK (Pairwise Transient Key). The PTK is generated by concatenating the following attributes: PMK, AP nonce (ANonce), STA nonce (SNonce), AP MAC address, and STA MAC address. The product is then put through PBKDF2-SHA1 as the cryptographic hash function.
The handshake also yields the GTK (Group Temporal Key), used to decrypt multicast and broadcast traffic. The actual messages exchanged during the handshake are depicted in the figure and explained below:
- The AP sends a nonce-value to the STA (ANonce). The client now has all the attributes to construct the PTK.
- The STA sends its own nonce-value (SNonce) to the AP together with a MIC, including authentication, which is really a Message Authentication and Integrity Code: (MAIC).
- The AP sends the GTK and a sequence number together with another MIC. This sequence number will be used in the next multicast or broadcast frame, so that the receiving STA can perform basic replay detection.
- The STA sends a confirmation to the AP.
All the above messages are sent as EAPOL-Key frames.
As soon as the PTK is obtained it is divided into five separate keys:
PTK (Pairwise Transient Key – 64 bytes)
- 16 bytes of EAPOL-Key Confirmation Key (KCK)– Used to compute MIC on WPA EAPOL Key message
- 16 bytes of EAPOL-Key Encryption Key (KEK) - AP uses this key to encrypt additional data sent (in the 'Key Data' field) to the client (for example, the RSN IE or the GTK)
- 16 bytes of Temporal Key (TK) – Used to encrypt/decrypt Unicast data packets
- 8 bytes of Michael MIC Authenticator Tx Key – Used to compute MIC on unicast data packets transmitted by the AP
- 8 bytes of Michael MIC Authenticator Rx Key – Used to compute MIC on unicast data packets transmitted by the station
The Michael MIC Authenticator Tx/Rx Keys provided in the handshake are only used if the network is using TKIP to encrypt the data.
The Group Key Handshake
The GTK used in the network may need to be updated due to the expiry of a preset timer. When a device leaves the network, the GTK also needs to be updated. This is to prevent the device from receiving any more multicast or broadcast messages from the AP.
To handle the updating, 802.11i defines a Group Key Handshake that consists of a two-way handshake:
- The AP sends the new GTK to each STA in the network. The GTK is encrypted using the KEK assigned to that STA, and protects the data from tampering, by use of a MIC.
- The STA acknowledges the new GTK and replies to the AP.
GTK (Groupwise Transient Key – 32 bytes)
- 16 bytes of Group Temporal Encryption Key – Used to encrypt Multicast data packets
- 8 bytes of Michael MIC Authenticator Tx Key – Used to compute MIC on Multicast packet transmitted by AP
- 8 bytes of Michael MIC Authenticator Rx Key – This is currently not used as stations do not send multicast traffic
The Michael MIC Authenticator Tx/Rx Keys provided in the handshake are only used if the network is using TKIP to encrypt the data.
Security flaws
A major security flaw was revealed in December 2011 that affects wireless routers with the Wi-Fi Protected Setup (WPS) feature, which most recent models have and enable by default. The flaw allows a remote attacker to recover the WPS PIN and, with it, the router's WPA2 password in a few hours. Users have been urged to turn off the WPS feature, although this may not be possible on some router models. It has also been claimed that, on some routers, the button that allegedly turns WPS off, in fact leaves WPS on—and thus the router still vulnerable.
See also
- Wi-Fi Protected Access
- Wi-Fi Protected Setup
- Wireless security
- WLAN Authentication and Privacy Infrastructure (WAPI), China's centralized wireless security method
References
- "IEEE 802.11-2007: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications". IEEE. 2007-03-08.
- "The Evolution of 802.11 Wireless Security" (PDF). ITFFROC. 2010-04-18.
- "IEEE 802.11i-2004: Amendment 6: Medium Access Control (MAC) Security Enhancements" (pdf). IEEE Standards. 2004-07-23. Retrieved 2007-12-21.
- IEEE 802.11i-2004: Amendment 6: Medium Access Control (MAC) Security Enhancements (pdf), IEEE Standards, 2004-07-23, p. 14, retrieved 2010-04-09
- IEEE 802.11i-2004: Amendment 6: Medium Access Control (MAC) Security Enhancements (pdf), IEEE Standards, 2004-07-23, p. 14, retrieved 2010-04-09,
RSNA relies on IEEE 802.1X to provide authentication services and uses the IEEE 802.11 key management scheme
- IEEE 802.11i-2004: Amendment 6: Medium Access Control (MAC) Security Enhancements (pdf), IEEE Standards, 2004-07-23, p. 5, retrieved 2010-04-09
- IEEE 802.11i-2004: Amendment 6: Medium Access Control (MAC) Security Enhancements (pdf), IEEE Standards, 2004-07-23, p. 43, retrieved 2010-04-09
- http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf
- http://www.kb.cert.org/vuls/id/723755 US CERT Vulnerability Note VU#723755
- "Hands-on: hacking WiFi Protected Setup with Reaver", Ars Technica, 4 January 2012.
External links
IEEE standards | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
Current | |||||||||||
802 series |
| ||||||||||
Proposed | |||||||||||
Superseded | |||||||||||