Brkewn 2006 PDF
Brkewn 2006 PDF
Security
Its about time
Stephen Orr
Distinguished Systems Engineer
@StephenMOrr
BRKEWN-2006
Cisco Webex Teams
Questions?
Use Cisco Webex Teams to chat
with the speaker after the session
How
1 Find this session in the Cisco Events Mobile App
2 Click “Join the Discussion”
3 Install Webex Teams or go directly to the team space
4 Enter messages/questions in the team space
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 3
Session Presenter
Stephen Orr
Distinguished System
Engineer
US Public Sector
CCIE #12126 (R&S,
Wireless)
@StephenMOrr
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
What we hope to achieve in this session
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
Session Assumptions and Disclaimers
Configurations
ISE
What we are not covering: SDA
BYOD
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
Agenda
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 7
History of Wireless
Security Part 1
Why do we need Security ?
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
Interest in Security Technologies
we’re secure!”
attack is published
“Why do we need to do
this security work?”
You “Why did it take so long
are to do that security work?”
here
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
Security needs to improve over time
• Significant usage of weak protocols still
exist
End users think of security as a baseline
product capability, but vendors think of
security as features
• Products are compared on functionality,
performance, features, but generally
not security
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
Security Challenges for Wi-Fi
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
Security is like…
• …medicine or a vaccine
• Tastes bad
• Shots hurt
• About the only thing that’s good about them is not being sick
• The Challenge – drive awareness and adoption of “better” security
• Consumers do not ask for anything that is not branded!
• More post-WPA2 feature enhancements than in WPA1 to WPA2 transition
• Manufacturers/Vendors are hesitant to adopt things that customers aren’t demanding.
• Chicken and Egg – we know security enhancements are needed, consumers look to the
brand for assurance
• Keep consumers and networks vaccinated against future attacks to stop outbreaks
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
The permutations
and combinations of WPA Personal
WPA2
Wireless Security Enterprise HS2.0
WPS DPP
How do consumers TKIP
EAP
know they are secure
AES
and using the best WPA3
security possible? PMF
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 15
Security needs to be like:
Not every Network Operator or home user is a crypto expert
• Building a Castle
• IF I make PMF mandatory I can mitigate
deauth attacks
• IF I use high entropy PSK – it should
increase the time it takes for offline
dictionary attacks but not prevent it
• IF I use AES it WILL mitigate the TKIP
attacks
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 16
The Road to Wi-Fi Protected Access
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
Wi-Fi Alliance Security History
Security Enhancements have typically taken a reactive approach (something was broken and then we fixed it):
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
History of Wireless
Security Part 2
AKA WPA2 – the good the
bad and the ugly
History of Post-WPA efforts to improve security
• When security is optional and there is no tangible
benefit, it will be postponed
• WPA preshared keys are well known to be a problem
• Increased computing power every year makes them
easier to attack
• Should be deprecated because “Password” is not a
secure password
• TKIP still in widespread use
• 2013 paper showed that 71% of encrypted networks
used it instead of good cryptography
http://people.cs.kuleuven.be/~mathy.vanhoef/papers
/wpatkip.pdf
• Can anyone believe WEP is still in use
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
• The GOOD
• WPA2 was created with the
sole purpose of fixing the
issues in WPA
• TKIP was broken
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
WPA(2)-PSK: The BAD
• With WPA(2) – the password or PSK us used for both “authentication” and encryption
• Susceptible to attacks and tools to crack a password are easily downloadable from the
Internet
• Given the messages from the 4-way Handshake, the attacker loops through all passwords
in the database computing values using a candidate password until it is able to verify
message 3 or message 4
• No forward secrecy– guess the password and get the session keys for all past, present,
and future exchanges
• When used for network access through an AP it allows anyone in “earshot” to crack the
password and connect
• Brute force attacks/Dictionary Attacks: Amazon Cloud attack: performs 2,400,000
password checks per minute at $0.23/min– the size of the dictionary really doesn’t
matter now!
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
What is wrong with good ol’ WPA2 PSK?
• With WPA2 PSK, your password is used to generate the Pairwise Master Key (PMK)
• This is how the exchange works:
1. On both sides, make your weak passphrase (“password”) a bit stronger: PSK = pseudorandom (PBKDF2
algorithm) of Passphrase, SSID, SSIDlength, to produce a 256-bit string
2. The process is done the same way on the AP and client, so they have the same PSK. This PSK is the PMK.
PSK = PBKDF2 (PassPhrase, ssid, ssidLength, 4096, 256) PSK = PBKDF2 (PassPhrase, ssid, ssidLength, 4096, 256)
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 23
WPA2 – The UGLY
Why did we do a transition mode for WPA/WPA2
REMEMBER – at the time not all AP’s could support Multiple BSS’s
• A transition mode was created to preserve interoperability with WPA and help with end user experience.
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
Why is it easy to crack WPA2-Personal?
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
What About WPA2-Enterprise
ACK
Caution: Threat shifts from a weak PSK to weak user passwords for logon
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
Release the KRACKen
Key Reinstallation AttaCK (KRACK)
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
Key Reinstallation AttaCK (KRACK) cont
• KRACK is an attack against the 4-way handshake (specifically nonce reuse)
• What does the 4-way handshake do?
• Mutual authentication between AP and STA
• Negotiates fresh Pairwise Transient Keys
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
What is a Key Reinstallation AttaCK (KRACK)
These vulnerabilities may allow the reinstallation of a pairwise transient key, a group key,
or an integrity key on either a wireless client or a wireless access point. Additional
research also led to the discovery of three additional vulnerabilities
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
802.1X Authentication
AP WLC Radius
Probe Request
Probe Response
Auth Request
Auth Response
Association Request
Association Response
EAP Start
EAP ID Request
EAP ID Response
EAP Method
EAP Success
EAPoL 4 way Exchange
Look Here
DATA
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
4-way handshake messages (over-simplified)
Message 1:
• EAPoL frame containing A-Nonce
(authenticator nonce)
• Supplicant can derive PTK because it now
has A-Nonce, S-Nonce and PMK
Message 2:
• Supplicant sends Authenticator S-Nonce
• Authenticator can now generate PTK, GTK
and IGTK
Message 3:
• GTK, IGTK delivered to Supplicant
encrypted with PTK
• Tells supplicant to install temporal keys
Message 4:
• Supplicant informs authenticator that keys
have been installed
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
Whatever happened to Protected Management
Frames?
• Implementing Protected Management Frame (802.11w) will helps mitigate
Man-in-the-Middle attacks
• The 802.11w protocol applies only to a set of robust management frames
that are protected by the Protected Management Frames ( PMF) service.
• These include: Disassociation, De-authentication, and Robust Action frames
(Like FT).
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
History of Wireless
Security Part 2.5*
Open Networks Get an Upgrade
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
What problem are we trying to solve??
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 35
Wi-Fi CERTIFIED Enhanced Open
Probe request
Association request,
• Requires no provisioning, no user entry– it just works! embedded Diffie-Hellmann key exchange
Association response,
Security in OWE:
embedded Diffie-Hellmann key exchange
• EAPOL-Key (ANonce)
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
Enhanced Open – only mode
Beacon Frame
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 37
Shhhhh!!!
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
Enhanced Open Transition Mode
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 39
Enhanced Open Transition Mode
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 40
History of Wireless
Security Part 3
WPA3
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 42
• “Security combinatorics” refers to the number of
options available for connecting to networks
• Advertising IEs (2): WPA, WPA2
• AKMs (18): PSK, SAE, 802.1x, Suite B, FT,
FILS etc…
• Unicast ciphers (6): WEP, TKIP, CCMP-128,
CCMP-256, GCMP-128, GCMP-256
• Broadcast ciphers (4): WEP, TKIP, CCMP,
GCMP
Problem statement •
•
Integrity ciphers (3): none, CMAC, GMAC
Hash algorithms (4): SHA-1, SHA-256,
for WPA3 •
SHA384, SHA512
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 43
Wi-Fi CERTIFIED WPA3™ builds on
widespread adoption of WPA2 for 10+ years
Unify the WFA Security efforts into something which consumers/vendors can
recognize
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 44
WPA3 supports the market through two distinct modes
WPA3-Personal: WPA3-Enterprise:
Robust, password-based Enterprise-grade security for
authentication sensitive data networks
• Resistant to offline dictionary attacks; • Available 192-bit cryptographic strength for
stronger protections for users against networks transmitting sensitive data
password guessing attempts by third parties
• 192-bit Security suite provides additional
• Protection even when users choose security for networks like government and
passwords that fall short of complexity finance
recommendations
• Greater consistency in application of security
• No change to the way users connect to a protocols
network
• Better network resiliency
• Provides forward secrecy; protects data
traffic even if a password is later
compromised
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 45
WPA3 Main components
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 46
• WPA3-Personal
• WPA3-SAE Mode
• PMF Required
• WPA3-SAE Transition Mode
• Configuration Rules: On an AP, whenever
WPA2-PSK is enabled, the WPA3-SAE
Transition Mode must also be enabled by
WPA3 Modes
default, unless explicitly overridden by the
administrator to operate in WPA2-PSK Only
Mode.
brand
• PMF shall be negotiated for a WPA3 connection
• PMF optional for a WPA2 connecction
• WPA3-Enterprise “192-bit” mode (CNSA)
• More than just for the Federal Government
• Consistent cryptographic cipher suites to avoid
misconfiguration
• Addition of GCM & ECC for crypto and better hash
functions (SHA384)
• PMF Required
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 47
WPA3-Personal
(aka WPA3-SAE)
WPA3-Personal Properties
1. The successful termination of the protocol results in a PMK shared between the two STAs.
2. An attacker is unable to determine either the password or the resulting PMK by passively observing an
exchange or by interposing itself into the exchange by faithfully relaying messages between the two
STAs.
3. An attacker is unable to determine either the password or the resulting shared key by modifying,
forging, or replaying frames to an honest, uncorrupted STA.
4. An attacker is unable to make more than one guess at the password per attack. This implies that the
attacker cannot make one attack and then go offline and make repeated guesses at the password until
successful. In other words, SAE is resistant to dictionary attack.
5. Compromise of a PMK from a previous run of the protocol does not provide any advantage to an
adversary attempting to determine the password or the shared key from any other instance.
6. Compromise of the password does not provide any advantage to an adversary in attempting to
determine the PMK from the previous instance.
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 49
WPA3-Personal
Simultaneous Authentication of Equals (SAE)
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 50
WPA3-Personal Only
Beacon
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 51
SAE Authentication Commit Message
Occurs prior to 802.11 Association
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 52
SAE Authentication Confirm Message
Occurs prior to 802.11 Association
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 53
Association Request from AP
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 54
4-Way Handshake Begins
Message 1 AP->STA
Message 1
Pairwise Key
AP Nonce
Message 2
MIC Set
STA Nonce
MIC
RSN Chosen
SAE with AES-CCMP-128
Message 3
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 57
4-Way Handshake
Message 4 STA->AP
Message 4
MIC Set
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 58
WPA3-Personal Transition Mode
Why did we do a transition mode for WPA2/WPA3
WAIT – AP’s that support WPA3 should support Multiple BSS’s – its 2020
• A transition mode was created to preserve interoperability with WPA2 and help with end user
experience.
• What did we inherit with a transition mode:
• Single BSS -Enabled by default when a WPA2-PSK BSS is enabled on a WPA3-Personal AP
• Same passphrase exists between WPA2-PSK and WPA3-PSK
• WPA2-PSK is still vulnerable to all the classic issues
• The upside
• WPA3-Personal connections are secure – knowing the passphrase gets that hacker access to the
WLAN not the ability to decrypt the sessions
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 59
WPA3-Personal Transition Mode
Multiple AKMs:
AKM 00:0f:ac:2 PSK
AKM 00:0f:ac:6 PSK (SHA256)
AKM 00:0f:ac:8 (SAE)
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 60
Enter DragonBlood
WPA3-Personal (SAE) Vulnerabilities
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 61
WPA3-Enterprise
What’s the difference?
• This means if I have a WPA2 Client and it negotiates PMF it should be considered
WPA3 Enterprise (MFPC)
• However to be considered WPA3 Enterprise Only – Management Frame Protection
would be set to Required (MFPR)
• Identical to WPA3-Personal and Enhanced Open
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 63
WPA3-Enterprise-
192 Mode
Rise of the Quantum Computers….
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 65
Why we should care
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 66
A 1000 words about consistency in selecting
cryptographic primitives
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 67
A few more words about consistency in selecting
cryptographic primitives
• An attacker will target the weakest component in a system
• To achieve a consistent level of system security it’s necessary to ensure that the
work factor for each cryptographic primitive meets or exceeds a selected level:
• For a security level 192:
• AES-GCM-256 for authenticated encryption
• HMAC-SHA384 for key derivation and key confirmation
• ECDH and ECDSA using a 384-bit elliptic curve for key establishment and
authentication
• Consistency affords misuse resistance since Suite B cannot be configured in a way
to not provide the indicated level of security
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 68
WPA3 Consistent more Efficient Security
Enter Elliptic Curve Cryptography
Elliptic Curves
• EC Cryptography uses the formula y3=x3+ax+b
• Replaces “power” with lines
• Pick P1, P2, there is only 1 point P3
• Jump to its reflection (R)
• Then redo (Find the intersection between
P1 and R, jump to the reflection etc.
• You can also use “modulo” by letting points bounce
when the vector reaches the green line
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 69
WPA3 Stronger Security – Finding a better way
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 70
Cisco Next Generation Encryption vs Suite B
AES-256-GCM ECDH-P521
ECDSA-
SHA-512 Encryption
P521
Data Authentication
Key Establishment
AES-192-GCM ECDH-P384 ECDSA-P384 SHA-384 Suite B mLoS 192
Signatures
Hashing
AES-128-
ECDH-P256 ECDSA-P256 SHA-256 Suite B mLoS 128
GCM
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 71
Suite B Cryptography Recommendations
– QC resistant
Algorithm
Operation Quantum Computer
Acceptable Preferred Resistant
Encryption AES-CBC-256 mode — ✅ (256-bit)
Authenticated encryption — AES-GCM-256 mode ✅ (256-bit)
*ECC algorithms have significant performance advantages over RSA. Such efficiency makes them very suitable for low-power devices (i.e. sensors) with limited resources and computational power.
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 72
How Suite B is supported in 802.11
• Through AKM and cipher suite negotiation
• 192-bit security level restricted to:
• AKM 00-0F-AC:12 – authentication with a Suite B EAP-TLS method supporting ECDH and ECDSA with p384, and key
derivation and key management using SHA384
• Cipher suite 00-0F-AC:9– AES-GCM-256 and 00-0F-AC:12– BIP-GMAC-256
• When doing Suite B, one and only one AKM (plus permissible cipher suites) is allowed
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 73
WPA3-Enterprise-192
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 74
WPA3-Enterprise-192 Stronger Authentication
Permitted EAP cipher suites for use with WPA3-Enterprise 192-bit Mode are:
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 75
WPA3-Enterprise-192
GCMP More Robust Encryption method
You also need for good measure a better MIC (128 bits instead of 64)
WPA-3 needed to use faster more efficient encryption
• Here Galois Counter Mode Protocol presents the solution
A great strength of GCMP mechanism is that you can calculate (still using AES)
the different elements needed for the MIC determination in parallel, saving an
enormous amount of time
GCMP was allowed in 802.11ac, it is mandatory with WPA3-Enterprise-192
• It is much faster than CCMP, which allows for longer keys if needed
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 76
Quick WPA3
Roadmap
WPA3 support on Cisco hardware and software
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 78
Cisco IOS XE C9800
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 79
Configuration for WPA2 and WPA3
on the same WLAN
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 80
AireOS – Opportunistic Wireless Encryption
For Enhanced Open Networks
OWE is a mandatory feature for WPA-3 certification along with OWE Transition mode
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 81
AireOS – WPA-3 Personal aka SAE
WPA3 + WPA2 Enabled. All AKM’s can be WPA3 Enabled, WPA2 Disabled. PMF is required.
configured based on the FT and PMF selection. FT can be selected as Enable/Disable/Adaptive.
SAE is enabled by default. SAE is enabled by Default.
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 82
AireOS – WPA-3 Enterprise Mode
WPA3 + WPA2 Enabled.
CCMP256 and GCMP128/256 Ciphers with AKM Suites are available. PMF is Optional
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 83
Qualcomm mobile device Intel with Microsoft Windows
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 84
WPA3 and Wi-Fi 6 (11ax) alignment
• Current Plan of Record for WPA3 to become mandatory for all Wi-Fi CERTIFIED devices 2 years
after program launch
• Program launched April 2018 – target mandatory June 2020
• Current plan for Wi-Fi 6
• WPA3-Personal is mandatory
• WPA3-Enterprise is Optional
• Enhanced Open is optional
• Current plan of record is that all PHY/MAC moving forward past June 2020 will follow WPA3
requirements
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 85
WPA3 current and future certifications
When will I see Wi-Fi Certified WPA3 and Wi-Fi Certified Enhanced Open
products?
Vendors have already started certifying!!!!
• In July of 2020 – all new certifications will require WPA3-Personal
• WPA2-Personal is a pre-requisite for WPA3-Personal
• WPA3-Enterprise – like WPA2-Enterprise will still be optional
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 86
In new greenfield MAC/PHY/Bands
• WPA3 is the starting point
• WPA3-Personal required
• WPA3-Enterprise and WPA3-
Enterprise-192 optional
High Level – what’s • Legacy WPA2/WPA shall not be
on the horizon •
supported (Personal or Enterprise)
Open Networks - eliminated
If open access without authentication
6GHz, 60GHz and
•
is needed, Enhanced Open must be
others •
used
The following transition modes won’t be
supported
• WPA3-Personal Transition Mode
• OWE Transition mode
• WEP and TKIP shall not be supported
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 87
WPA3 and Enhanced Open in a nutshell
• Unify the Wi-Fi Alliance security efforts • Mandatory Features
• To be part of Wi-Fi 6 certification • Security Improvements
• Handle the unexpected
• Provide a solid technology foundation for the • Protected Management Frames
future of Wi-Fi security • Enabled by default
• Continuous Evolution of Security • WPA3-Personal (SAE)
PSK replacement / Offline attack resistance
• Decrease complexity and use of legacy •
• Ensure that bad acting AP/STA are identified early • Wi-Fi Certified Enhanced Open
• Opportunistic Wireless Encryption (OWE)
• Unauthenticated Encryption for SSIDs
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 88
Wi-Fi EasyConnect
or
Device
Provisioning
Protocol
Wi-Fi CERTIFIED Easy Connect™: A simple, secure way to
connect smart home and IoT devices
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 90
Feature rich technical jargon
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 91
What happens when you have no head?
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 93
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 94
Think this can’t happen at work?
IoT is happening in your workplace right now
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 96
How will you on-board all these things?
Wi-Fi CERTIFIED Protected SetupTM
Push-button on-boarding
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 98
Cisco Identity PSK – One SSID, Multiple PSKs
aabbcc
IOT Devices
xxyyzz
Access Point Wireless LAN Controller ISE
Sensors
WLAN PSK
Employees
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 99
Use Wi-Fi Alliance EasyConnect™
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 100
DPP Terminology
• Initiator (I)
• Starts an authentication exchange
• Responder (R)
• Responds to an authentication request
• Enrollee
• Device requesting to join a network (STA)
• Configurator
• Device used to configure enrollees
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 101
Device Provisioning Protocol
3 Simple Steps: Step 1
Bootstrapping
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 102
DPP Keys
Public key BI BR PI PR
BI, BR PI, PR
(Upper case)
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 103
DPP Step 1: Bootstrapping
QR Code
Yay! I now have
the pump’s public
bootstrapping
key. I can
securely
authenticate it.
BR
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 104
Bootstrapping Methods
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 105
Device Provisioning Protocol
3 Simple Steps: Step 2
Bootstrapping
Authentication
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 106
DPP Authentication
Roles
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 107
DPP Step2: Authentication
Responder Initiator
BI PI BR
BR PR
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 108
Device Provisioning Protocol
3 Simple Steps: Step 3
Bootstrapping
Authentication
Configuration
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 109
Device Provisioning Protocol
Role change
Enrollee Configurator
You bet.
Let’s do this!
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 110
What can DPP configure?
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 111
DPP Step 3: Configuration
Enrollee Configurator
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 112
Wi-Fi EasyConnect Recap
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 113
Session Recap
Session Recap
Choose the right tool in the tool bag to meet your Wireless Security Requirements
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 115
Complete your
online session
survey • Please complete your session survey
after each session. Your feedback
is very important.
• Complete a minimum of 4 session
surveys and the Overall Conference
survey (starting on Thursday) to
receive your Cisco Live t-shirt.
• All surveys can be taken in the Cisco Events
Mobile App or by logging in to the Content
Catalog on ciscolive.com/emea.
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 116
Continue your education
Demos in the
Walk-in labs
Cisco campus
BRKEWN-2006 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 117
Thank you