(2003) (Addison Wesley) Real 802.11 Security Wi-Fi Protected Access And 802.11I.pdf

(23066 KB) Pobierz
76605047 UNPDF
[ Team LiB ]
Table of Contents
Real 802.11 Security: Wi-Fi Protected Access and 802.11i
By Jon Edney , William A. Arbaugh
Publisher: Addison Wesley
Pub Date: July 15, 2003
ISBN: 0-321-13620-9
Pages: 480
"Real 802.11 Security provides clear descriptions of current and emerging security techniques.
The authors handle complex topics nicely, and offer significant clarification of IEEE draft
standards."
-Russ Housley, IETF Security Area Director and founder of Vigil Security, LLC
"This is certainly the definitive text on the internals of 802.11 security!"
-John Viega, founder and chief scientist, Secure Software, Inc.
"This book keeps the exposition as straightforward as possible and enables you to cut through
the maze of acronyms, hacking tools, rumored weaknesses, and vague vendor security claims to
make educated security decisions when purchasing or deploying WLAN."
-Simon Blake-Wilson, Director of Information Security, BCI
Business professionals and advanced home users are captivated by the convenience of working
on wireless networks. But how can privacy and security be maintained effectively? Real 802.11
Security describes an entirely new approach to wireless LAN security based on the latest
developments in Wi-Fi technology. This is the book that will show you how to establish real
security within your Wi-Fi LAN.
Recent developments in Wi-Fi security achieve what no amount of reconfiguration can do: They
solve the problem at the source. Wi-Fi Protected Access (WPA) repairs weaknesses in existing
Wi-Fi systems and is designed to allow software upgrades. The upcoming 802.11i standard will
offer a much higher level of security than previously offered and will provide flexible, extremely
secure solutions for future products.
Real 802.11 Security addresses the theory, implementations, and reality of Wi-Fi security. It
provides an overview of security issues, explains how security works in Wi-Fi networks, and
explores various security and authentication protocols. The book concludes with an in-depth
discussion of real-world security issues and attack tools.
76605047.029.png 76605047.030.png 76605047.031.png 76605047.032.png 76605047.001.png
Written by two experts in wireless security, Jon Edney and William Arbaugh, this book shows you
how to stay informed and aware when making security decisions, and what steps you can take to
implement the most effective, proactive wireless security now and in the future.
[ Team LiB ]
Table of Contents
Real 802.11 Security: Wi-Fi Protected Access and 802.11i
By Jon Edney , William A. Arbaugh
Publisher: Addison Wesley
Pub Date: July 15, 2003
ISBN: 0-321-13620-9
Pages: 480
"Real 802.11 Security provides clear descriptions of current and emerging security techniques.
The authors handle complex topics nicely, and offer significant clarification of IEEE draft
standards."
-Russ Housley, IETF Security Area Director and founder of Vigil Security, LLC
"This is certainly the definitive text on the internals of 802.11 security!"
-John Viega, founder and chief scientist, Secure Software, Inc.
"This book keeps the exposition as straightforward as possible and enables you to cut through
the maze of acronyms, hacking tools, rumored weaknesses, and vague vendor security claims to
make educated security decisions when purchasing or deploying WLAN."
-Simon Blake-Wilson, Director of Information Security, BCI
Business professionals and advanced home users are captivated by the convenience of working
on wireless networks. But how can privacy and security be maintained effectively? Real 802.11
Security describes an entirely new approach to wireless LAN security based on the latest
developments in Wi-Fi technology. This is the book that will show you how to establish real
security within your Wi-Fi LAN.
Recent developments in Wi-Fi security achieve what no amount of reconfiguration can do: They
solve the problem at the source. Wi-Fi Protected Access (WPA) repairs weaknesses in existing
Wi-Fi systems and is designed to allow software upgrades. The upcoming 802.11i standard will
offer a much higher level of security than previously offered and will provide flexible, extremely
secure solutions for future products.
Real 802.11 Security addresses the theory, implementations, and reality of Wi-Fi security. It
provides an overview of security issues, explains how security works in Wi-Fi networks, and
explores various security and authentication protocols. The book concludes with an in-depth
discussion of real-world security issues and attack tools.
[ Team LiB ]
76605047.002.png 76605047.003.png 76605047.004.png 76605047.005.png 76605047.006.png
[ Team LiB ]
Table of Contents
Real 802.11 Security: Wi-Fi Protected Access and 802.11i
By Jon Edney , William A. Arbaugh
Publisher: Addison Wesley
Pub Date: July 15, 2003
ISBN: 0-321-13620-9
Pages: 480
Copyright
"Real 802.11 Security provides clear descriptions of current and emerging security techniques.
The authors handle complex topics nicely, and offer significant clarification of IEEE draft
standards."
-Russ Housley, IETF Security Area Director and founder of Vigil Security, LLC
Praise for Real 802.11 Security: Wi-Fi Protected Access and 802.11i
Preface
Why This Book Now?
Audience
"This is certainly the definitive text on the internals of 802.11 security!"
-John Viega, founder and chief scientist, Secure Software, Inc.
Disclaimer
Acknowledgments
"This book keeps the exposition as straightforward as possible and enables you to cut through
the maze of acronyms, hacking tools, rumored weaknesses, and vague vendor security claims to
make educated security decisions when purchasing or deploying WLAN."
-Simon Blake-Wilson, Director of Information Security, BCI
Part I. What Everyone Should Know
Chapter 1. Introduction
Setting the Scene
Roadmap to the Book
Business professionals and advanced home users are captivated by the convenience of working
on wireless networks. But how can privacy and security be maintained effectively? Real 802.11
Security describes an entirely new approach to wireless LAN security based on the latest
developments in Wi-Fi technology. This is the book that will show you how to establish real
security within your Wi-Fi LAN.
Chapter 2. Security Principles
What Is Security?
Good Security Thinking
Security Terms
Recent developments in Wi-Fi security achieve what no amount of reconfiguration can do: They
solve the problem at the source. Wi-Fi Protected Access (WPA) repairs weaknesses in existing
Wi-Fi systems and is designed to allow software upgrades. The upcoming 802.11i standard will
offer a much higher level of security than previously offered and will provide flexible, extremely
secure solutions for future products.
Chapter 3. Why Is Wi-Fi Vulnerable to Attack?
Changing the Security Model
What Are the Enemies Like?
Traditional Security Architecture
Real 802.11 Security addresses the theory, implementations, and reality of Wi-Fi security. It
provides an overview of security issues, explains how security works in Wi-Fi networks, and
explores various security and authentication protocols. The book concludes with an in-depth
discussion of real-world security issues and attack tools.
Summary
Chapter 4. Different Types of Attack
Classification of Attacks
Attacks Without Keys
[ Team LiB ]
Table of Contents
Real 802.11 Security: Wi-Fi Protected Access and 802.11i
By Jon Edney , William A. Arbaugh
Publisher: Addison Wesley
Pub Date: July 15, 2003
ISBN: 0-321-13620-9
Pages: 480
Organization
Notes on the Book
Summary
Danger of Passive Monitoring
76605047.007.png 76605047.008.png 76605047.009.png 76605047.010.png 76605047.011.png 76605047.012.png 76605047.013.png 76605047.014.png 76605047.015.png 76605047.016.png
Attacks on the Keys
Summary
Part II. The Design of Wi-Fi Security
Chapter 5. IEEE 802.11 Protocol Primer
Layers
Wireless LAN Organization
Basics of Operation in Infrastructure Mode
Protocol Details
Radio Bits
Summary
Chapter 6. How IEEE 802.11 WEP Works and Why It Doesn't
Introduction
Table of Contents
Real 802.11 Security: Wi-Fi Protected Access and 802.11i
By Jon Edney , William A. Arbaugh
Privacy
Mechanics of WEP
Why WEP Is Not Secure
Summary
Publisher: Addison Wesley
Pub Date: July 15, 2003
ISBN: 0-321-13620-9
Pages: 480
Relationship Between Wi-Fi and IEEE 802.11
What Is IEEE 802.11i?
What Is WPA?
Differences Between RSN and WPA
Security Context
Keys
"Real 802.11 Security provides clear descriptions of current and emerging security techniques.
The authors handle complex topics nicely, and offer significant clarification of IEEE draft
standards."
-Russ Housley, IETF Security Area Director and founder of Vigil Security, LLC
Relationship of the Standards
Summary
Chapter 8. Access Control: IEEE 802.1X, EAP, and RADIUS
"This is certainly the definitive text on the internals of 802.11 security!"
-John Viega, founder and chief scientist, Secure Software, Inc.
Authentication for Dial-in Users
IEEE 802.1X
"This book keeps the exposition as straightforward as possible and enables you to cut through
the maze of acronyms, hacking tools, rumored weaknesses, and vague vendor security claims to
make educated security decisions when purchasing or deploying WLAN."
-Simon Blake-Wilson, Director of Information Security, BCI
EAPOL
Messages Used in IEEE 802.1X
Implementation Considerations
Business professionals and advanced home users are captivated by the convenience of working
on wireless networks. But how can privacy and security be maintained effectively? Real 802.11
Security describes an entirely new approach to wireless LAN security based on the latest
developments in Wi-Fi technology. This is the book that will show you how to establish real
security within your Wi-Fi LAN.
Summary
Chapter 9. Upper-Layer Authentication
Introduction
Who Decides Which Authentication Method to Use?
Recent developments in Wi-Fi security achieve what no amount of reconfiguration can do: They
solve the problem at the source. Wi-Fi Protected Access (WPA) repairs weaknesses in existing
Wi-Fi systems and is designed to allow software upgrades. The upcoming 802.11i standard will
offer a much higher level of security than previously offered and will provide flexible, extremely
secure solutions for future products.
A Detailed Look at Upper-Level Authentication Methods
Transport Layer Security (TLS)
Kerberos
Cisco Light EAP (LEAP)
Protected EAP Protocol (PEAP)
Real 802.11 Security addresses the theory, implementations, and reality of Wi-Fi security. It
provides an overview of security issues, explains how security works in Wi-Fi networks, and
explores various security and authentication protocols. The book concludes with an in-depth
discussion of real-world security issues and attack tools.
Authentication in the Cellular Phone World: EAP-SIM
Summary
Chapter 10. WPA and RSN Key Hierarchy
Pairwise and Group Keys
[ Team LiB ]
Authentication
Chapter 7. WPA, RSN, and IEEE 802.11i
Security Layers
Importance of Access Control
EAP Principles
RADIUS—Remote Access Dial-In User Service
Use of Keys in Upper-Layer Authentication
76605047.017.png 76605047.018.png 76605047.019.png 76605047.020.png 76605047.021.png 76605047.022.png
Pairwise Key Hierarchy
Group Key Hierarchy
Key Hierarchy Using AES–CCMP
Mixed Environments
Summary of Key Hierarchies
Details of Key Derivation for WPA
Nonce Selection
Computing the Temporal Keys
Summary
Chapter 11. TKIP
What Is TKIP and Why Was It Created?
TKIP Overview
Table of Contents
Real 802.11 Security: Wi-Fi Protected Access and 802.11i
By Jon Edney , William A. Arbaugh
TKIP Implementation Details
Message Integrity—Michael
Per-Packet Key Mixing
Summary
Publisher: Addison Wesley
Pub Date: July 15, 2003
ISBN: 0-321-13620-9
Pages: 480
Introduction
Why AES?
AES Overview
How CCMP Is Used in RSN
Summary
Chapter 13. Wi-Fi LAN Coordination: ESS and IBSS
"Real 802.11 Security provides clear descriptions of current and emerging security techniques.
The authors handle complex topics nicely, and offer significant clarification of IEEE draft
standards."
-Russ Housley, IETF Security Area Director and founder of Vigil Security, LLC
WPA/RSN Information Element
Preauthentication Using IEEE 802.1X
IBSS Ad-Hoc Networks
"This is certainly the definitive text on the internals of 802.11 security!"
-John Viega, founder and chief scientist, Secure Software, Inc.
Part III. Wi-Fi Security in the Real World
Chapter 14. Public Wireless Hotspots
"This book keeps the exposition as straightforward as possible and enables you to cut through
the maze of acronyms, hacking tools, rumored weaknesses, and vague vendor security claims to
make educated security decisions when purchasing or deploying WLAN."
-Simon Blake-Wilson, Director of Information Security, BCI
Security Issues in Public Hotspots
How Hotspots Are Organized
Different Types of Hotspots
Business professionals and advanced home users are captivated by the convenience of working
on wireless networks. But how can privacy and security be maintained effectively? Real 802.11
Security describes an entirely new approach to wireless LAN security based on the latest
developments in Wi-Fi technology. This is the book that will show you how to establish real
security within your Wi-Fi LAN.
Summary
Chapter 15. Known Attacks: Technical Review
Review of Basic Security Mechanisms
Review of Previous IEEE 802.11 Security Mechanisms
Recent developments in Wi-Fi security achieve what no amount of reconfiguration can do: They
solve the problem at the source. Wi-Fi Protected Access (WPA) repairs weaknesses in existing
Wi-Fi systems and is designed to allow software upgrades. The upcoming 802.11i standard will
offer a much higher level of security than previously offered and will provide flexible, extremely
secure solutions for future products.
Man-in-the-Middle Attacks
Problems Created by Man-in-the-Middle Attacks
Denial-of-Service Attacks
Summary
Chapter 16. Actual Attack Tools
Real 802.11 Security addresses the theory, implementations, and reality of Wi-Fi security. It
provides an overview of security issues, explains how security works in Wi-Fi networks, and
explores various security and authentication protocols. The book concludes with an in-depth
discussion of real-world security issues and attack tools.
Attacker Goals
Process
Example Scenarios
Other Tools of Interest
[ Team LiB ]
Per-Packet Key Mixing
Chapter 12. AES–CCMP
Network Coordination
Summary
Development of Hotspots
How to Protect Yourself When Using a Hotspot
Attacks Against the Previous IEEE 802.11 Security Mechanisms
76605047.023.png 76605047.024.png 76605047.025.png 76605047.026.png 76605047.027.png 76605047.028.png
Zgłoś jeśli naruszono regulamin