Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2 Mathy - - PowerPoint PPT Presentation

key reinstallation attacks
SMART_READER_LITE
LIVE PREVIEW

Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2 Mathy - - PowerPoint PPT Presentation

Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2 Mathy Vanhoef @vanhoefm CCS 2017, 1 October 2017 Overview Key reinstalls in 4-way handshake Misconceptions Practical impact Lessons learned 2 Overview Key reinstalls in 4-way


slide-1
SLIDE 1

Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2

Mathy Vanhoef — @vanhoefm CCS 2017, 1 October 2017

slide-2
SLIDE 2

Overview

2

Key reinstalls in 4-way handshake Misconceptions Lessons learned Practical impact

slide-3
SLIDE 3

Overview

3

Key reinstalls in 4-way handshake Misconceptions Lessons learned Practical impact

slide-4
SLIDE 4

The 4-way handshake

Used to connect to any protected Wi-Fi network Two main purposes: › Mutual authentication › Negotiate fresh PTK: pairwise temporal key Appeared to be secure: › No attacks in over a decade (apart from password guessing) › Proven that negotiated key (PTK) is secret1 › And encryption protocol proven secure7

4

slide-5
SLIDE 5

4-way handshake (simplified)

5

slide-6
SLIDE 6

4-way handshake (simplified)

6

PTK = Combine(shared secret, ANonce, SNonce)

slide-7
SLIDE 7

4-way handshake (simplified)

7

PTK = Combine(shared secret, ANonce, SNonce)

Attack isn’t about ANonce or SNonce reuse

slide-8
SLIDE 8

4-way handshake (simplified)

8

slide-9
SLIDE 9

4-way handshake (simplified)

9

slide-10
SLIDE 10

4-way handshake (simplified)

10

PTK is installed

slide-11
SLIDE 11

4-way handshake (simplified)

11

slide-12
SLIDE 12

Frame encryption (simplified)

12

Plaintext data

 Nonce reuse implies keystream reuse (in all WPA2 ciphers)

Nonce Mix PTK

(session key)

Nonce

(packet number) Packet key

slide-13
SLIDE 13

4-way handshake (simplified)

13

Installing PTK initializes nonce to zero

slide-14
SLIDE 14

14

Reinstallation Attack

Channel 1 Channel 6

slide-15
SLIDE 15

15

Reinstallation Attack

slide-16
SLIDE 16

Reinstallation Attack

16

slide-17
SLIDE 17

17

Reinstallation Attack

Block Msg4

slide-18
SLIDE 18

18

Reinstallation Attack

slide-19
SLIDE 19

19

Reinstallation Attack In practice Msg4 is sent encrypted

slide-20
SLIDE 20

20

Reinstallation Attack Key reinstallation! nonce is reset

slide-21
SLIDE 21

21

Reinstallation Attack Same nonce is used!

slide-22
SLIDE 22

22

Reinstallation Attack

keystream Decrypted!

slide-23
SLIDE 23

Overview

23

Key reinstalls in 4-way handshake Misconceptions Lessons learned Practical impact

slide-24
SLIDE 24

General impact

24

Receive replay counter reset Replay frames towards victim Transmit nonce reset Decrypt frames sent by victim

slide-25
SLIDE 25

Cipher suite specific

AES-CCMP: No practical frame forging attacks WPA-TKIP: › Recover Message Integrity Check key from plaintext4,5 › Forge/inject frames sent by the device under attack GCMP (WiGig): › Recover GHASH authentication key from nonce reuse6 › Forge/inject frames in both directions

25

slide-26
SLIDE 26

Handshake specific

Group key handshake: › Client is attacked, but only AP sends real broadcast frames › Can only replay broadcast frames to client 4-way handshake: › Client is attacked  replay/decrypt/forge FT handshake (fast roaming = 802.11r): › Access Point is attacked  replay/decrypt/forge › No MitM required, can keep causing nonce resets

26

slide-27
SLIDE 27

Implementation specific

Windows and iOS: 4-way handshake not affected › Cannot decrypt unicast traffic (nor replay/decrypt) › But group key handshake is affected (replay broadcast) wpa_supplicant 2.4+ › Client used on Linux and Android 6.0+ › On retransmitted msg3 will install all-zero key

27

slide-28
SLIDE 28

Overview

28

Key reinstalls in 4-way handshake Misconceptions Lessons learned Practical impact

slide-29
SLIDE 29

Misconceptions I

Updating only the client or AP is sufficient › Both vulnerable clients & vulnerable APs must apply patches Need to be close to network and victim › Can use special antenna from afar No useful data is transmitted after handshake › Trigger new handshakes during TCP connection

29

slide-30
SLIDE 30

Misconceptions II

Obtaining channel-based MitM is hard › Nope, can use channel switch announcements Attack complexity is hard › Script only needs to be written once … › … and some are already doing this!

30

slide-31
SLIDE 31

Overview

31

Key reinstalls in 4-way handshake Misconceptions Lessons learned Practical impact

slide-32
SLIDE 32

Limitations of formal proofs

› 4-way handshake proven secure › Encryption protocol proven secure

32

The combination was not proven secure!

slide-33
SLIDE 33

Model vs. implementation

Abstract model ≠ real code › Must assure code matches specification The wpa_supplicant 2.6 case › Complex state machine & turned out to still be vulnerable › Need formal verification of implementations

33

slide-34
SLIDE 34

On a related note…

Workshop on:

Security Protocol Implementations: Development and Analysis (SPIDA)

Co-located with EuroS&P 2018 “focuses on improving development & analysis

  • f security protocols implementations”

34

slide-35
SLIDE 35

Questions?

krackattacks.com

Thank you!

slide-36
SLIDE 36

References

  • 1. C. He, M. Sundararajan, A. Datta, A. Derek, and J. Mitchell. A Modular

Correctness Proof of IEEE 802.11i and TLS. In CCS, 2005.

  • 2. S. Antakis, M. van Cuijk, and J. Stemmer. Wardriving - Building A Yagi

Pringles Antenna. 2008.

  • 3. M. Parkinson. Designer Cantenna. 2012. Retrieved 23 October 2017 from

https://www.mattparkinson.eu/designer-cantenna/

  • 4. E. and M. Beck. Practical attacks against WEP and WPA. In WiSec, 2009.
  • 5. M. Vanhoef and F. Piessens. Practical verification of WPA-TKIP
  • vulnerabilities. In ASIA CCS, 2013.
  • 6. A. Joux. Authentication failures in NIST version of GCM. 2016.
  • 7. J. Jonsson. On the security of CTR+ CBC-MAC. In SAC, 2002.

36

slide-37
SLIDE 37

Countermeasures

Problem: many clients won’t get updates Solution: AP can prevent (most) attacks on clients! › Don’t retransmit message 3/4 › Don’t retransmit group message 1/2 However: › Impact on reliability unclear › Clients still vulnerable when connected to unmodified APs

37

slide-38
SLIDE 38

Handshake specific

Group key handshake: › Client is attacked  replay broadcast frames to client › Because client never sends real broadcast frames!

38

Unicast