
114
Chapter 5: Authentication and Encryption
AirMagnet Laptop Wireless LAN Policy Reference Guide
AirMagnet Mobile monitors WPA transactions and alerts the
administrator when it detects non-compliant devices and weak
configurations.
802.11x Rekey Timeout Too Long
It is well publicized that WLAN devices using a static WEP key for
encryption are vulnerable to WEP key cracking attack (Refer to
Weaknesses in the Key Scheduling Algorithm of RC4 - I by Scott
Fluhrer, Itsik Mantin, and Adi Shamir
). A cracked WEP secret key
results in no encryption protection, and thus compromises data
privacy. Dynamic encryption key or key rotation mechanisms such as
TKIP
resolve such vulnerabilities by periodically changing the
encryption key, even within a single session. Managing key rotation
for multicast and broadcast traffic is usually more challenging
because multiple devices have to update to the new key
synchronously. Vendors' implementations of multicast/broadcast
key rotation can vary from null to complete. When the multicast and
broadcast key is not rotated or rotated infrequently, it is as weak as
static WEP, which is subject to key recovery attacks.
By continuously monitoring on WLAN 802.1x authentication and
encryption transactions, AirMagnet
Mobile
can detect an AP
configured without encryption key rotation or configured with a long
key rotation timeout. It is important for WLAN 802.1x configurations
to include a reasonable encryption rekey timeout as explained above,
as a stale encryption key makes your encryption static and as
vulnerable as static WEP key encryption. A rekey mechanism should
be applied to unicast, multicast, and broadcast data streams.
TKIP
(Temporal Key Integrity Protocol) enabled devices implement a WEP
key hashing algorithm and typically rotate keys on their unicast data
streams, but not always on the multicast or broadcast data streams.
This AirMagnet Mobile alarm assists you in enforcing the rekey
mechanism for all data streams. Take appropriate steps (such as
checking the AP configuration for this setting) to resolve this issue.
802.1x Unencrypted Broadcast or Multicast
802.1x has a framework allowing a system to use per-session
encryption keys to defend against the weakness inherited from the
global static WEP key mechanism. Additionally, 802.1x also
facilitates the session key rotation mechanism, thus ensuring that the
Laptop Wireless LAN Policy Reference Guide.book Page 114 Thursday, January 25, 2007 5:36 PM
Содержание PRG-Laptop 7.0
Страница 1: ...AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 8: ...vi Table of Contents AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 30: ...22 Chapter 1 Configuration Vulnerabilities AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 64: ...56 Chapter 2 IDS Denial of Service Attack AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 136: ...128 Chapter 5 Authentication and Encryption AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 138: ...130 Part Two Performance Intrusion AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 144: ...136 Chapter 6 Channel or Device Overload AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 192: ...184 Chapter 9 Problematic Traffic Pattern AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 210: ...196 Chapter 10 RF Management AirMagnet Laptop Wireless LAN Policy Reference Guide...