Recommendations for IEEE 802.11 Access PointsUpdated: April 2, 2002
This article provides information about how to make available IEEE 802.11 wireless technology in diverse environments around the world. It provides guidelines for making wireless technology manageable by creating wireless access points that support specific functionality and are configured in several ways. The Microsoft Windows XP operating system includes built-in support for 802.11 network adapter drivers and an 802.1X client. On This Page
IntroductionIEEE 802.11, 802.11a, and 802.11b (also known as Wi-Fi) are wireless local area networking (LAN) standards that supply 1 megabit per second or higher bandwidth. Because these networks differ from wired LANs, several issues unique to wireless LAN deployment must be addressed. The major deployment issues for IEEE 802.11 wireless LANs include managing access to the network and privacy of the wireless traffic. In a wireless deployment, there are a number of technologies that work together to make the wireless experience seamless from the end users point of view. Windows XP ships with support for 802.11 network adapter drivers and an 802.1X client. To implement 802.1X for an 802.11 network, components must be available in the network to implement three key roles: supplicant, authenticator, and authentication server.
To encourage the deployment of wireless technology, to make this technology usable in a number of interesting environments, and to make that technology manageable, wireless Access Points need to support a number of functions and be configurable in several ways. This article outlines these requirements. Security Concerns with Wireless LANsAlthough 802.11 wireless LANs have experienced a rapid growth, a number of security concerns have been raised for wireless networks in general. The 802.11 wireless LAN standards define authentication and encryption services based on the Wired Equivalent Privacy (WEP) algorithm. The WEP algorithm defines the use of a 40-bit secret key for authentication and encryption. Many 802.11 implementations also allow 104-bit secret keys. However, the standard does not define a key management protocol, and presumes that the secret, shared keys are delivered to the 802.11 wireless stations (STA) using a secure channel independent of 802.11. The lack of a WEP key management protocol is a principal limitation to providing 802.11 security, especially in a wireless infrastructure network with a large number of stations. Some examples of this type of network include corporate campuses, and public places such as airports and malls. When manually-configured shared keys are used, the keys tend to remain in place for long periods of time, enabling hackers more time to use various attacks to obtain the keys and decrypt the traffic. The lack of rich authentication and encryption services also effect operation in a wireless ad hoc network (peer to peer wireless network) where users may wish to engage in peer-to-peer collaborative communication; for example, in areas such as conference rooms. In addition, lack of inter-access point protocol (IAPP) further accentuates the key management issues when STAs roam from one to AP to another. As a result, the enhanced importance of authentication and encryption in a wireless environment proves the need for access control and security mechanisms that include a key management protocol for 802.11. IEEE 802.1XIEEE 802.1X is a standard for port-based network access control that provides authenticated network access for Ethernet networks. Port-based network access control utilizes the physical characteristics of the switched LAN infrastructure to provide a means of authenticating devices attached to a LAN port, and for preventing access to that port in cases where the authentication process fails. A LAN port, also called a Port Access Entity (PAE), can adopt one of two roles in the access control interaction: authenticator or supplicant. An authenticator is a port that enforces authentication before allowing access to services (usually the rest of the network) available using that port. The supplicant is a port that requests access to these services from the authenticator. A third component of the solution, the authentication server, provides authentication by checking the credentials of the supplicant on behalf of the authenticator. The authentication server then responds to the authenticator indicating whether the supplicant is authorized to access the authenticators services. The authentication server may be separate entity or its functions may be co-located with the authenticator. Figure 1: LAN with Two Logical Access Points
The authenticators port-based access control defines two logical access points to the LAN using a single physical LAN port as shown in Figure 1. The first logical access point, the uncontrolled port, allows uncontrolled exchange between the authenticator and other systems on the LAN regardless of the systems authorization state. The second logical access point, the controlled port, allows access to the LAN only if the system is authorized.
Using IEEE 802.1x for Wireless Authentication
In this model, without a valid authentication key, an AP (authenticator) inhibits all traffic flow through it. When a wireless STA (supplicant) comes in range of a wireless AP, the wireless AP issues a challenge to the wireless STA. When the STA receives the challenge from the AP, the STA sends its identity to the AP, which forwards it to the RADIUS server (authentication server) to initiate authentication services. The RADIUS server then sends a request to the STA for its credentials to confirm identity and specify the type of credentials required. Requests passing between the STA and the RADIUS server pass through the uncontrolled port on the AP because the STA cannot directly reach the RADIUS server. The AP does not allow communication through the controlled port at this time because the STA does not posses an authentication key. The STA sends credentials to the RADIUS server. When the RADIUS server validates the credentials, it transmits an authentication key to the AP. The authentication key is encrypted so that only the AP can access the authentication key. AP uses the authentication key received from the RADIUS server to securely transmit per-STA unicast session and multicast/global authentication keys to the STA. Because the global authentication key must be encrypted, the Extensible Authentication Protocol (EAP) authentication method used for wireless must be capable of generating an encryption key as part of the authentication process. The Transport Level Security (TLS) EAP type provides for mutual authentication, integrity-protected cipher suite negotiation and key exchange between the two endpoints. Therefore, EAP-TLS should be used to provide these capabilities. Following the initial authentication, the IEEE 802.1X protocol should be configured to periodically request the STA to re-authenticate. The detailed authentication process is given below:
802.1X and WEP EncryptionIt is important to note that WEP Encryption should be turned on with 802.1X. Although it is possible to enable 802.1X without WEP, this type of configuration should not be allowed because of the security threat that it represents. Using 802.1X without WEP encryption means that while enforcing user authentication to an AP port, all traffic will be sent in the clear. Because this method is not secure, 802.1X should be used with WEP. RADIUS Support in Wireless APsFor an 802.1X client to gain full network access, an Access Point must implement a RADIUS client. A RADIUS client sends user credentials and connection parameter information in the form of a RADIUS message to a RADIUS server. The RADIUS server authenticates and authorizes the RADIUS client request, and sends back a RADIUS message response. RADIUS messages are never sent between the access client (or STA) and the AP. RetransmissionThe RADIUS client in the AP should implement retransmission of lost packets. EAP-TLS goes through many rounds of data exchange. In a high loss or high interference environment, the RADIUS client should implement retransmissions based on a timeout that can be adjusted based on network characteristics. This also requires that the RADIUS server keep state and is able to account for retransmissions. Failover ProtectionThe RADIUS client in the AP should also implement fail-over protection to increase the robustness of RADIUS client access to the RADIUS server. This can be done by enabling the RADIUS client to direct its transactions to alternate RADIUS servers if the primary one should fail, which would eliminate a single point of failure. IEEE 802.1X Key MessageIEEE 802.1X enables a more scalable and manageable access control mechanism. By adding a new IEEE 802.1X message (the EAPOL-Key message), the EAP over LAN (EAPOL) key can be sent from the AP to the STA once IEEE 802.1X authentication has succeeded. APs are allowed to send an EAPOL-Key message at any time after authentication to update the WEP keys at the STAs. The message contains a WEP key that can be used to generate the encryption key used by IEEE 802.11. The use of this message requires an EAP authentication method such as EAP-TLS. The RADIUS server will generate a per-session encryption key between station and RADIUS server. The RADIUS server passes this per-session encryption key to the AP in the RADIUS Access-Accept message. This per-session encryption key is used to encrypt the WEP key which has been generated by the AP. The encrypted WEP key will then be transmitted from the AP to the STA. If WEP key distribution is enabled, then AP should perform a further check; the AP should drop all unencrypted non-IEEE 802.1X traffic. It is recommended that APs perform this additional filtering to enhance the security level beyond MAC address filtering. Radius Key AttributesThe MS-MPPE-Send-Key and the MS-MPPE-Recv-Key attributes contain session keys intended for encrypting packets sent between NAS and STAs. These attributes are only included in Access-Accept packets. For further details on these attributes, please see RFC 2548. Section 2.4.2 details the MS-MPPE-Send-Key attribute. Section 2.4.3 describes the MS-MPPE-Recv-Key Attribute. AccountingAdditionally, the RADIUS client should be capable of sending accounting records, in addition to authentication messages. The EAPOL-Logoff MessageThis message is only for IEEE 802.11 networks and allows the wireless STA to logoff its session with the AP. However this message contains no means of validating that the client sending the Logoff message is the actual client on that connection. Because of this, Microsoft clients do not send EAPOL-Logoff Messages and instead send EAPOL-Start Messages at time of logoff. Therefore APs should ignore all EAPOL-Logoff Messages. Using the EAP-Identity/Request StringEthernet and IEEE 802.11 networks should be able to indicate their current location to the client/STA by adding an attribute to the EAP-Identity message that contains the service supplied by the network. For the IEEE 802.11 networks, if this attribute is not available, then the SSID should be used instead as a default. The following format is proposed for the null-terminated displayable string and the comma-separated portion of the EAP-Identity message string: This is a display string\0networkid=<network name>,nasid=<nas name>,portid=<port id> Where: network name: SSID for IEEE 802.11 but can be any string for Ethernet. nas name: name of the IEEE 802.11 AP or Ethernet switch, or if no name, the MAC address of the AP or Ethernet switch. port id: port ID that this particular IEEE 802.1X session is on. The IEEE 802.1X STA should display the string before the null termination (\0) to enable administrators to display network identification messages. Un-Authenticated AccessFor Un-authenticated access, an IEEE 802.1X client should transmit a null string for identity in the EAP-Response/Identity message for an unauthenticated user. An unauthenticated user is defined as a user that lacks required credentials for accessing the network, for example, in the case of EAP-TLS, user certificates, this would be for the particular network the user is attempting to access. Access Point RequirementsThe access point receiving an EAP-Response/Identity message from an unauthenticated user will not include the User-Name RADIUS attribute (number 1) in the Access-Request RADIUS packet. Guest Access ScenariosThis section includes information about the use of IEEE 802.1X in public places such as airports, malls, convention centers, and private places that require some level of network access, such as corporate conference centers. An AP can provide three levels of network access to the client dependent on the authentication response from the RADIUS server:
In response to authentication responses from the RADIUS server, the AP should implement the network authorization as follows: On receipt of an Access-Accept: Provision according to the default AP Virtual LAN (VLAN) setting, or according to the VLAN ID sent in Access Accept. On receipt of Access-Reject: No access should be provided. VLAN Support for Guest Access ScenariosIn order to implement these scenarios, the Access Point must allow configuration of VLAN Tagging. Listed below is the suggest default configuration for these VLAN settings:
The No-Guest Scenario:
The Enterprise Conference Room:
The Enterprise Partnership:
The Public ISP Scenario:
In public spaces, users intending to subscribe for Internet access would be required to register and enroll for the network access service prior to authentication. Therefore, IEEE 802.1X should be designed to permit access to enrollment and registration servers by directing user communication to the appropriate VLAN. EAP-Notification message can be used to inform the user of the location of the server to enroll and register the user for accounting and billing purposes prior to obtaining network access. Configure the Access Point so that all Successful Authentications are tagged with the VLANID3 returned in the Access Accept packet or with VLANID3 as defined by ISP at the RADIUS Proxy. All non-Authenticated users are given access to a registration site that will allow them to sign-up for public access service (VLANID0).
It is also possible to combine some of these scenarios together. For example, the "Enterprise Conference" and "Enterprise Partnership" can be configured simultaneously.
Figure 2: Configuration for Guest Access Scenarios
Radius Tunnel AttributesRFC 2868 defines RADIUS tunnel attributes used for authentication and authorization, and RFC 2867 defines tunnel attributes used for accounting. Where the IEEE 802.1X Authenticator supports tunneling, a compulsory tunnel may be set up for the Supplicant as a result of the authentication. In particular, it may be desirable to allow a port to be placed into a particular VLAN based on the result of the authentication. The RADIUS server typically indicates the desired VLAN by including tunnel attributes within the Access-Accept message. However, the IEEE 802.1X Authenticator may also provide a hint as to the VLAN to be assigned to the Supplicant by including Tunnel attributes within the Access-Request. For use in VLAN assignment, the following tunnel attributes are sent: Tunnel-Type=VLAN (13) Tunnel-Medium-Type=802 Tunnel-Private-Group-ID=VLANID See draft-congdon-radius-8021x-17.txt section 3.30 for a more complete description. Additionally, the format of the attributes can be found in RFC 2868. Multiple Service Provider Shared Wireless InfrastructureWhen two or more service providers install a wireless network infrastructure in the same location, such as an airport, there are potential RF issues. In the U.S. and most of Europe, Wi-Fi (IEEE 802.11b) networks can support only 3 non-overlapping channels. In some countries, such as France and Japan, only one channel is available. Once the available channels are used, no further non-overlapping spectrum is available for other providers. If a new wireless network infrastructure is added in the same area, it will generate interference with one of the existing networks that will result in reduced performance for both the incumbent network and the newcomer. To support this scenario, Access Points need to support the use and configuration of multiple Extended Service Set ID (ESSID)s. Each ESSID needs to be able to support their own specific VLAN tag ID, RADIUS server, SNMP community string, and IP Address. SNMP MIB SupportWith a multitude of 802.11 devices scattered across a network infrastructure, common management and troubleshooting capabilities become necessary.
802.11 MIB
802.1X MIB
Roaming Authentication Handoff between Access PointsWhen moving between APs, the previous AP address is passed to the new AP by the STA. If the APs do not offer inter-AP interaction support, then the STA will be re-authenticated to the new AP by an EAP-Start message from the AP. However, an IAPP can be defined to allow the new AP to obtain the authentication information from the old AP and send a new EAPOL-Key message to the STA with a new set of WEP keys. An IAPP should also transfer to the new AP enough of the RADIUS server account information for the new AP to continue the same account records rather than start a new account record. An IAPP standard is currently being worked on in the IEEE 802.11f Task Group. Dynamic Frequency SelectionThe various 802.11 standards operate two different frequency ranges. 802.11b products operate within the 2.4 GHz range, while 802.11a products operate within the 5 GHz range. Because of concerns that various countries around the world have allocated portions of the 2.4 and 5 GHz range to other applications, it is necessary that wireless LAN devices select the frequency range it uses based on its location. The 802.11 standard is being modified so that an AP can inform a wireless client of the appropriate frequency for local usage. Dynamic Frequency Selection for the 5 GHz range is currently being worked on within the IEEE 802.11h Task Group. Country Information ElementCountries across the globe are allocating portions of their wireless spectrum for various purposes. The Country Information Element in an AP Beacon frame contains the information required to allow a station to identify the regulatory domain in which the station is located, and to configure the frequency range it is allowed to operate on accordingly. Further information on this can be found in the IEEE 802.11d standard. Future DirectionsMicrosoft is actively engaged with the IETF and IEEE standard bodies, and with hardware vendors. Current initiatives focus on acceptance and support of the Advanced Encryption Standard (AES) for wireless encryption, TKIP (Temporal Key Integrity Protocol), rapid re-keying, the charter of the IEEE Task Group I (TGi) working group, EAP-Notification, and so on. Summary of Recommendations and Requirements for Various Scenarios
Additional Reading
Wireless 802.11 Security with Windows XP, available at:
Wireless Network Security with IEEE 802.1X, available at:
Enterprise Deployment of IEEE 802.11 Using Windows XP and Windows 2000 Internet Authentication Service, available at: References
Resources and Call to ActionCall to Action:
Contact:
Resources:
|
|
