802 11 denial of service attacks real vulnerabilities and
play

802.11 Denial-of-Service Attacks Real Vulnerabilities and Practical - PowerPoint PPT Presentation

802.11 Denial-of-Service Attacks Real Vulnerabilities and Practical Solutions John Bellardo and Stefan Savage Department of Computer Science and Engineering University of California, San Diego Motivation n 802.11-based networks have flourished


  1. 802.11 Denial-of-Service Attacks Real Vulnerabilities and Practical Solutions John Bellardo and Stefan Savage Department of Computer Science and Engineering University of California, San Diego

  2. Motivation n 802.11-based networks have flourished n Home, business, health care, military, etc. n Security is an obvious concern n Threats to confidentiality well understood and being addressed [WPA, 802.11i] n Threats to availability (denial-of-service) not widely appreciated & not being addressed

  3. Live 802.11 DoS Demonstration Everyone Else Attacker Victim e l b n a o l i i a t v a t A n e t s o e N r P Packets n e o h i t t a f r o t s n n o o i m s r e e D v s i h t n I Time (1/10 second intervals)

  4. 802.11 DoS Attacks n RF Jamming n Real threat, 802.11 highly vulnerable; not our focus n Bandwidth consumption (flooding) n 802.11 has same vulnerability as wired nets; not our focus n Attacks on 802.11 protocol itself n Easy to mount, low overhead, selective, hard to debug n Media access vulnerabilities n Management vulnerabilities n This talk focuses on these DoS attacks, their practicality, their effectiveness and how to defend against them

  5. Media Access Vulnerabilities n 802.11 includes collision avoidance mechanisms n Typically require universal cooperation between all nodes in the network n Media access vulnerabilities arise from the assumption of universal cooperation n Virtual carrier sense is an example of a media access mechanism that is vulnerable to DoS attacks

  6. NAV Vulnerability 2 2 6 6 6 6 6 0-2312 2 Frm Ctl Duration Addr1 Addr2 Addr3 Seq Ctl Addr4 Data FCS 802.11 General Frame Format n Virtual carrier sense allows a node to reserve the radio channel n Each frame contains a duration value n Indicates # of microseconds channel is reserved n Tracked per-node; Network Allocation Vector (NAV) n Used by RTS/CTS n Nodes only allowed to xmit if NAV reaches 0

  7. Simple NAV Attack: Forge packets with large Duration Attacker Access Point and Node 2 can’t xmit (but Node 1 can) Duration=32000 Duration=32000 Access Point Node 1 Node 2

  8. Extending NAV Attack w/RTS AP and both nodes barred Attacker from transmitting S T R Duration=32000 CTS 0 0 0 1 3 = n o i t a r u D CTS Duration=31000 CTS Duration=31000 Access Point Node 2 Node 1

  9. Conventional Wisdom n NAV attack not a practical threat n Commodity hardware doesn’t allow Duration field to be set n But would be highly effective if implemented n Shut down all access to 802.11 network n Both wrong…

  10. Commodity 802.11 hardware n Firmware-driven microcontroller n Same code/architecture shared by most popular vendors (Choice Microsystems) n Transmit path n Host provides frame to NIC and requests xmit n NIC firmware validates frame and overwrites key fields (e.g. duration) in real-time n Frame then sent to baseband radio interface n Not possible to send arbitrary frames via firmware interface

  11. How to Generate Arbitrary 802.11 Frames? Host Interface to NIC Key idea: AUX/Debug Port allows AUX Port Xmit Q Raw access to NIC SRAM SRAM BAP 1. Download frame to NIC Xmit 2. Find frame in SRAM process 3. Request transmission 4. Wait until firmware Physical Virtualized firmware modifies frame resources interface 5. Rewrite frame via AUX port Radio Modem Interface

  12. Why the NAV attack doesn’t work n Surprise: many vendors do not implement the 802.11 spec correctly n Duration field not respected by other nodes Time (s) Source Destination Duration (ms) Type 1.294020 :e7:00:15:01 32.767 802.11 CTS 1.295192 :93:ea:e7:0f :93:ea:ab:df 0.258 TCP Data 1.296540 :93:ea:e7:0f 0 802.11 Ack 1.2952 - 1.2940 = 1.2 ms 1.297869 :93:ea:ab:df :93:ea:e7:0f 0.258 TCP Data Excerpt from a NAV Attack Trace

  13. Simulating the NAV attack n This bug will likely get fixed n Valuable for 802.11-based telephony, video, etc. n So how bad would the attack be? n Simulated NAV attack using NS2 n 18 Users n 1 Access Point n 1 Attacker n 30 attack frames per second n 32.767 ms duration per attack frame

  14. NAV Attack Simulation Attacker - Users 350 300 250 Packets 200 150 100 50 0 10 16 22 28 34 40 46 52 58 64 70 76 82 88 94 Simulated Seconds

  15. Practical NAV Defense n Legitimate duration values are relatively small n Determine maximum reasonable NAV values for all frames n Each node enforces this limit n < .5 ms for all frames except ACK and CTS n ~3 ms for ACK and CTS n Reran the simulation after adding defense to the simulator

  16. Simulated NAV Defense Attacker - Users 350 300 250 Packets 200 150 100 50 0 10 16 22 28 34 40 46 52 58 64 70 76 82 88 94 Simulated Seconds

  17. Management Vulnerabilities n 802.11 Management functions n Authentication (validate identity) n Association (picking access point) n Most management operations unprotected n Easy to spoof with false identity n Source of vulnerabilities n This problem is not being fixed n Most management frames unencrypted n 802.1x ports allocated after management functions take place n 802.11i has deferred addressing this problem

  18. Deauth Attack n 802.11 management requires nodes associate before sending data Authentication Association Authentication Association Response Response Request Request Access Point Authenticated Associated Attacker Victim

  19. Deauth Attack n Before node can transmit data, attacker send a spoofed deauthentication frame Deauthentication Access Point Authenticated Associated Attacker Victim

  20. Deauth Attack n Node attempts to transmit data, but it can not Deauthentication Data Access Point Authenticated Associated Attacker Victim

  21. Deauth Attack Results Attacker Win XP Linux Thinkpad Linux iPaq MacOS 800 700 600 500 Packets 400 300 200 100 0 1 11 21 31 41 51 61 71 81 91 101 112 122 132 141 151 Time (s)

  22. Practical Deauth Defense n Based on the observed behavior that legitimate nodes do not deauthenticate themselves and then send data n Delay honoring deauthentication request n Small interval (5-10 seconds) n If no other frames received from source then honor request n If source sends other frames then discard request n Requires no protocol changes and is backwards compatible with existing hardware

  23. Deauth Defense Results Attacker Win XP Linux Thinkpad Linux iPaq MacOS 700 600 500 Packets 400 300 200 100 0 1 5 9 13 17 21 25 29 33 37 41 45 Time (s)

  24. Conclusion n 802.11 DoS attacks require more attention n Easy to mount and not addressed by existing standards n Should not depend on restricted firmware interfaces (can send arbitrary 802.11 pkts) n Deauthentication attack is most immediate concern n Simple, practical defense shown to be effective

  25. Hands-on Demonstration n Attack implemented on an iPaq n See me for a hands- on demonstration during the break

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend