Wireless Security Why This Works Integrity Attacks Availability - - PowerPoint PPT Presentation

wireless security
SMART_READER_LITE
LIVE PREVIEW

Wireless Security Why This Works Integrity Attacks Availability - - PowerPoint PPT Presentation

Wireless Security Wireless Security Confidentiality Integrity Wireless Architecture Access Points Which AP? The Evil Twin Attack Wireless Security Why This Works Integrity Attacks Availability Black Holes Battery Exhaustion Battery


slide-1
SLIDE 1

Wireless Security

Wireless Security Wireless Security Confidentiality Integrity Wireless Architecture Access Points Which AP? The Evil Twin Attack Why This Works Integrity Attacks Availability Black Holes Battery Exhaustion Battery Exhaustion WEP War-Driving Network Access Control

1 / 41

slide-2
SLIDE 2

Wireless Security

Wireless Security Wireless Security Confidentiality Integrity Wireless Architecture Access Points Which AP? The Evil Twin Attack Why This Works Integrity Attacks Availability Black Holes Battery Exhaustion Battery Exhaustion WEP War-Driving Network Access Control

2 / 41

What is Wireless Security?

The usual: confidentiality, integrity, availability?

Or Butler Lampson’s “Gold” (Au) standard: authentication, authorization, audit?

Both!

slide-3
SLIDE 3

Confidentiality

Wireless Security Wireless Security Confidentiality Integrity Wireless Architecture Access Points Which AP? The Evil Twin Attack Why This Works Integrity Attacks Availability Black Holes Battery Exhaustion Battery Exhaustion WEP War-Driving Network Access Control

3 / 41

Obvious danger — it’s easy to intercept traffic

Obvious countermeasure — cryptography

But it’s harder to use here than it looks

slide-4
SLIDE 4

Integrity

Wireless Security Wireless Security Confidentiality Integrity Wireless Architecture Access Points Which AP? The Evil Twin Attack Why This Works Integrity Attacks Availability Black Holes Battery Exhaustion Battery Exhaustion WEP War-Driving Network Access Control

4 / 41

At first glance, integrity seems ok

This is radio — how can an attacker change messages in mid-packet?

Solution: the “Evil Twin” (or “Sybil”) attack

slide-5
SLIDE 5

Wireless Architecture

Wireless Security Wireless Security Confidentiality Integrity Wireless Architecture Access Points Which AP? The Evil Twin Attack Why This Works Integrity Attacks Availability Black Holes Battery Exhaustion Battery Exhaustion WEP War-Driving Network Access Control

5 / 41

The obvious architecture is pure peer-to-peer — each machine has a radio, and talks directly to any other machine

In fact, 802.11 (WiFi) can work that way, but rarely does

More common scenario: base stations (also known as access points)

slide-6
SLIDE 6

Access Points

Wireless Security Wireless Security Confidentiality Integrity Wireless Architecture Access Points Which AP? The Evil Twin Attack Why This Works Integrity Attacks Availability Black Holes Battery Exhaustion Battery Exhaustion WEP War-Driving Network Access Control

6 / 41

An ordinary wireless node associates with an access point (AP)

More precisely, it associates with the AP having a matching network name (if specified) and the strongest signal

If another AP starts sending a stronger signal (probably because the wireless node has moved), it will reassociate with the new access point

All transmissions from the laptop go to the access point

All transmissions to the laptop come from the access point

slide-7
SLIDE 7

Which AP?

Wireless Security Wireless Security Confidentiality Integrity Wireless Architecture Access Points Which AP? The Evil Twin Attack Why This Works Integrity Attacks Availability Black Holes Battery Exhaustion Battery Exhaustion WEP War-Driving Network Access Control

7 / 41

Which AP is your laptop associated with?

Which network (SSID)?

Many people know neither

“My ISP is NETGEAR”

Those who specify anything specify the SSID

slide-8
SLIDE 8

The Evil Twin Attack

Wireless Security Wireless Security Confidentiality Integrity Wireless Architecture Access Points Which AP? The Evil Twin Attack Why This Works Integrity Attacks Availability Black Holes Battery Exhaustion Battery Exhaustion WEP War-Driving Network Access Control

8 / 41

Simplest way: carry an access point with you

Simpler solution: many laptops can emulate access points

On Linux, use iwconfig eth0 mode Master

Force others to associate with your laptop, and send you all their traffic. . .

slide-9
SLIDE 9

Why This Works

Wireless Security Wireless Security Confidentiality Integrity Wireless Architecture Access Points Which AP? The Evil Twin Attack Why This Works Integrity Attacks Availability Black Holes Battery Exhaustion Battery Exhaustion WEP War-Driving Network Access Control

9 / 41

Conventionally, we worry about authenticating the client to the server

Here, we need to authenticate the server to the client

The infrastructure wasn’t designed for that; more important, users don’t expect to check for it (and have no way to do so in any event)

How do you know what the access point’s key should be?

slide-10
SLIDE 10

Integrity Attacks

Wireless Security Wireless Security Confidentiality Integrity Wireless Architecture Access Points Which AP? The Evil Twin Attack Why This Works Integrity Attacks Availability Black Holes Battery Exhaustion Battery Exhaustion WEP War-Driving Network Access Control

10 / 41

We now see how to do integrity attacks

We don’t tinker with the packet in the air, we attract it to our attack node

You don’t go through strong security, you go around it

slide-11
SLIDE 11

Availability

Wireless Security Wireless Security Confidentiality Integrity Wireless Architecture Access Points Which AP? The Evil Twin Attack Why This Works Integrity Attacks Availability Black Holes Battery Exhaustion Battery Exhaustion WEP War-Driving Network Access Control

11 / 41

Simple version: black-hole evil twin

Sophisticated version: battery exhaustion

slide-12
SLIDE 12

Black Holes

Wireless Security Wireless Security Confidentiality Integrity Wireless Architecture Access Points Which AP? The Evil Twin Attack Why This Works Integrity Attacks Availability Black Holes Battery Exhaustion Battery Exhaustion WEP War-Driving Network Access Control

12 / 41

Emulate an access point

Hand out IP addresses

Do nothing with received packets

More subtly, drop 10-15% of them — connections will work, but very slowly

slide-13
SLIDE 13

Battery Exhaustion

Wireless Security Wireless Security Confidentiality Integrity Wireless Architecture Access Points Which AP? The Evil Twin Attack Why This Works Integrity Attacks Availability Black Holes Battery Exhaustion Battery Exhaustion WEP War-Driving Network Access Control

13 / 41

“ Wi-Fi is also a power-hungry technology that can cause phone batteries to die quickly in some cases, within an hour or two of talk time. When you turn on the Wi-Fi it does bring the battery life down, said Mike Hendrick, director of product development for T-Mobile.” New York Times, 27 November 2006

slide-14
SLIDE 14

Battery Exhaustion

Wireless Security Wireless Security Confidentiality Integrity Wireless Architecture Access Points Which AP? The Evil Twin Attack Why This Works Integrity Attacks Availability Black Holes Battery Exhaustion Battery Exhaustion WEP War-Driving Network Access Control

14 / 41

Send your enemy large “ping” packets

The reply packets will be just as big — and transmitting such packets uses a lot of power

The more you transmit, the more power —

  • ften battery power — you use up
slide-15
SLIDE 15

WEP

Wireless Security WEP WEP — Using a Flawed Cipher in a Bad Way for the Wrong Application Datagrams and Stream Ciphers Key Setup Key Setup for WEP Cryptanalysis of RC4 IV Replay Packet Redirection Checksums The Biggest Flaw in WEP What WEP Should Have Been War-Driving Network Access Control

15 / 41

slide-16
SLIDE 16

WEP — Using a Flawed Cipher in a Bad Way for the Wrong Application

Wireless Security WEP WEP — Using a Flawed Cipher in a Bad Way for the Wrong Application Datagrams and Stream Ciphers Key Setup Key Setup for WEP Cryptanalysis of RC4 IV Replay Packet Redirection Checksums The Biggest Flaw in WEP What WEP Should Have Been War-Driving Network Access Control

16 / 41

It was obvious from the start that some crypto was needed

Choice: WEP — Wireline Equivalent Privacy for 802.11 netorks

Many different mistakes

Case study in bad crypto design

slide-17
SLIDE 17

Datagrams and Stream Ciphers

Wireless Security WEP WEP — Using a Flawed Cipher in a Bad Way for the Wrong Application Datagrams and Stream Ciphers Key Setup Key Setup for WEP Cryptanalysis of RC4 IV Replay Packet Redirection Checksums The Biggest Flaw in WEP What WEP Should Have Been War-Driving Network Access Control

17 / 41

WEP uses RC4 because RC4 is very efficient

But 802.11 is datagram-oriented; there’s no inter-packet byte stream to use ⇒ Must rekey for every packet

But you can’t reuse a stream cipher key on different packets. . .

slide-18
SLIDE 18

Key Setup

Wireless Security WEP WEP — Using a Flawed Cipher in a Bad Way for the Wrong Application Datagrams and Stream Ciphers Key Setup Key Setup for WEP Cryptanalysis of RC4 IV Replay Packet Redirection Checksums The Biggest Flaw in WEP What WEP Should Have Been War-Driving Network Access Control

18 / 41 Actual Key

RC4

Key stream Packet

IV Encrypted Packet Counter

104 bits 24 bits

Provisioned Key Per−Packet Key

slide-19
SLIDE 19

Key Setup for WEP

Wireless Security WEP WEP — Using a Flawed Cipher in a Bad Way for the Wrong Application Datagrams and Stream Ciphers Key Setup Key Setup for WEP Cryptanalysis of RC4 IV Replay Packet Redirection Checksums The Biggest Flaw in WEP What WEP Should Have Been War-Driving Network Access Control

19 / 41

Each WEP node keeps a 24-bit packet counter (the IV)

Actual cipher key is configured key concatenated with counter

Two different flaws. . .

224 packets isn’t that many — you still get key reuse when the packet counter overflows

RC4 has a cryptanalytic flaw

But it’s worse than that

slide-20
SLIDE 20

Cryptanalysis of RC4

Wireless Security WEP WEP — Using a Flawed Cipher in a Bad Way for the Wrong Application Datagrams and Stream Ciphers Key Setup Key Setup for WEP Cryptanalysis of RC4 IV Replay Packet Redirection Checksums The Biggest Flaw in WEP What WEP Should Have Been War-Driving Network Access Control

20 / 41

In 2001, Fluhrer, Mantin and Shamir showed that RC4 could be cryptanalyzed if the keys were “close” to each other — a related key attack

Because of the IV algorithm, they are close in WEP

Key recovery attacks are feasible and have been implemented

slide-21
SLIDE 21

IV Replay

Wireless Security WEP WEP — Using a Flawed Cipher in a Bad Way for the Wrong Application Datagrams and Stream Ciphers Key Setup Key Setup for WEP Cryptanalysis of RC4 IV Replay Packet Redirection Checksums The Biggest Flaw in WEP What WEP Should Have Been War-Driving Network Access Control

21 / 41

Suppose you recover the complete plaintext of a single packet

You can generate new packets that use the same counter

Receiving nodes don’t — and can’t — check for rapid counter reuse

Indefinite forgery!

slide-22
SLIDE 22

Packet Redirection

Wireless Security WEP WEP — Using a Flawed Cipher in a Bad Way for the Wrong Application Datagrams and Stream Ciphers Key Setup Key Setup for WEP Cryptanalysis of RC4 IV Replay Packet Redirection Checksums The Biggest Flaw in WEP What WEP Should Have Been War-Driving Network Access Control

22 / 41

Suppose you know (or can guess) the destination IP address of a packet

Because RC4 is a stream cipher, you can make controlled changes to the plaintext by flipping ciphertext bits

Flip the proper bits to send the packet to you instead, and reinject it

slide-23
SLIDE 23

Checksums

Wireless Security WEP WEP — Using a Flawed Cipher in a Bad Way for the Wrong Application Datagrams and Stream Ciphers Key Setup Key Setup for WEP Cryptanalysis of RC4 IV Replay Packet Redirection Checksums The Biggest Flaw in WEP What WEP Should Have Been War-Driving Network Access Control

23 / 41

WEP does use a checksum

However, it’s a CRC rather than a cryptographic hash

It’s also unkeyed

Result: it’s feasible to compensate for plaintext changes without disturbing the checksum

slide-24
SLIDE 24

The Biggest Flaw in WEP

Wireless Security WEP WEP — Using a Flawed Cipher in a Bad Way for the Wrong Application Datagrams and Stream Ciphers Key Setup Key Setup for WEP Cryptanalysis of RC4 IV Replay Packet Redirection Checksums The Biggest Flaw in WEP What WEP Should Have Been War-Driving Network Access Control

24 / 41

There’s no key management; all users at a site always share the same WEP key.

(Again, fixed in WPA) ⇒ You can’t rekey when the counter overflows ⇒ Everyone shares the same key; if it’s cryptanalyzed or stolen or betrayed, everyone is at risk ⇒ It’s all but impossible to rekey a site of any size, since everyone has to change their keys simultaneously and you don’t have a secure way to provide the new keys

slide-25
SLIDE 25

What WEP Should Have Been

Wireless Security WEP WEP — Using a Flawed Cipher in a Bad Way for the Wrong Application Datagrams and Stream Ciphers Key Setup Key Setup for WEP Cryptanalysis of RC4 IV Replay Packet Redirection Checksums The Biggest Flaw in WEP What WEP Should Have Been War-Driving Network Access Control

25 / 41

Use a block cipher in CBC mode

Use a separate key per user, plus a key identifier like the SPI

Provide dynamic key management

WPA — WiFi Protected Access — is better than WEP; WPA2 uses AES.

(WPA is particularly vulnerable to password-guessing attacks.)

slide-26
SLIDE 26

War-Driving

Wireless Security WEP War-Driving War-Driving Unprotected Networks! The Consequences Network Access Control

26 / 41

slide-27
SLIDE 27

War-Driving

Wireless Security WEP War-Driving War-Driving Unprotected Networks! The Consequences Network Access Control

27 / 41

Put a laptop in network (SSID) scanning mode

Drive around a neighborhood looking for access points

Perhaps include a GPS receiver to log locations

Detect presence or absence of WEP

Name from movie “War Games”

(Commercialized by Skyhook; used by iPhones!)

slide-28
SLIDE 28

Unprotected Networks!

Wireless Security WEP War-Driving War-Driving Unprotected Networks! The Consequences Network Access Control

28 / 41

Statistics show that only O(1/3) use even WEP

The rest tend to be wide open

Many people don’t change or hide the SSID

slide-29
SLIDE 29

The Consequences

Wireless Security WEP War-Driving War-Driving Unprotected Networks! The Consequences Network Access Control

29 / 41

Some incidence of theft of service

(Is it war-driving a crime? Unclear under US law)

Sometimes done to hide criminal activity

slide-30
SLIDE 30

Network Access Control

Wireless Security WEP War-Driving Network Access Control No Perimeter Associations Aside: IPv6 Neighbor Discovery Tracing Attacks MAC Address Filtering Clayton’s Spoofing Attack Windows XP SP2 and Spoofing Network Access Control Evil Twin Redux The Gold Standard Living with Wireless

30 / 41

slide-31
SLIDE 31

No Perimeter

Wireless Security WEP War-Driving Network Access Control No Perimeter Associations Aside: IPv6 Neighbor Discovery Tracing Attacks MAC Address Filtering Clayton’s Spoofing Attack Windows XP SP2 and Spoofing Network Access Control Evil Twin Redux The Gold Standard Living with Wireless

31 / 41

The fundamental difference: there’s no physical boundary

On a wired net, physical access control can compensate for lack of technical security

Most of the attacks are the same, for wired or wireless nets

But physical perimeters let us take shortcuts

slide-32
SLIDE 32

Associations

Wireless Security WEP War-Driving Network Access Control No Perimeter Associations Aside: IPv6 Neighbor Discovery Tracing Attacks MAC Address Filtering Clayton’s Spoofing Attack Windows XP SP2 and Spoofing Network Access Control Evil Twin Redux The Gold Standard Living with Wireless

32 / 41

Wired nets don’t have a base station that nodes associate with at layer 2

However, ARP attacks can compensate

ARP attacks are even harder to detect — there’s no pop-up informing you about local Ethernet addresses

slide-33
SLIDE 33

Aside: IPv6 Neighbor Discovery

Wireless Security WEP War-Driving Network Access Control No Perimeter Associations Aside: IPv6 Neighbor Discovery Tracing Attacks MAC Address Filtering Clayton’s Spoofing Attack Windows XP SP2 and Spoofing Network Access Control Evil Twin Redux The Gold Standard Living with Wireless

33 / 41

Instead of ARP, IPv6 uses a new protocol called Neighbor Discovery (ND)

Hosts and routers can use Cryptographically Generated Addresses (CGAs), where (part of) the IP address is a hash of the node’s public key

ND messages can be signed with the host’s private key, and verified by the recipient

But — what is the proper IP address (and hence public key) of the default router in every Starbucks hotspot?

slide-34
SLIDE 34

Tracing Attacks

Wireless Security WEP War-Driving Network Access Control No Perimeter Associations Aside: IPv6 Neighbor Discovery Tracing Attacks MAC Address Filtering Clayton’s Spoofing Attack Windows XP SP2 and Spoofing Network Access Control Evil Twin Redux The Gold Standard Living with Wireless

34 / 41

With wired networks, you can trace an attack to a given switch port

With wirless networks, you can trace an attack to a given AP, but the AP might serve hundreds or thousands of square meters

No good way to trace — all you can do is log and block MAC addresses

slide-35
SLIDE 35

MAC Address Filtering

Wireless Security WEP War-Driving Network Access Control No Perimeter Associations Aside: IPv6 Neighbor Discovery Tracing Attacks MAC Address Filtering Clayton’s Spoofing Attack Windows XP SP2 and Spoofing Network Access Control Evil Twin Redux The Gold Standard Living with Wireless

35 / 41

Can allow or block endpoints based on MAC address

However – MAC address spoofing is pretty easy

Evade blocks and/or impersonate accepted hosts

What’s accepted? Look for machines that receive non-SYN TCP packets

slide-36
SLIDE 36

Clayton’s Spoofing Attack

Wireless Security WEP War-Driving Network Access Control No Perimeter Associations Aside: IPv6 Neighbor Discovery Tracing Attacks MAC Address Filtering Clayton’s Spoofing Attack Windows XP SP2 and Spoofing Network Access Control Evil Twin Redux The Gold Standard Living with Wireless

36 / 41

Impersonate a known-good IP and MAC address

TCP replies will go to the real owner and the fake one

The real one will send out a TCP RST packet

Build a circuit that listens for the bit pattern

  • f the RST and sends a jam signal instead
slide-37
SLIDE 37

Windows XP SP2 and Spoofing

Wireless Security WEP War-Driving Network Access Control No Perimeter Associations Aside: IPv6 Neighbor Discovery Tracing Attacks MAC Address Filtering Clayton’s Spoofing Attack Windows XP SP2 and Spoofing Network Access Control Evil Twin Redux The Gold Standard Living with Wireless

37 / 41

With SP2, the built-in firewall blocks most inbound packets

In particular, it only allows in replies to

  • utbound packets

The TCP reply packets don’t match any

  • utbound connections

TCP never sees the reply, and hence doesn’t generate RST

No need for Clayton’s attack

slide-38
SLIDE 38

Network Access Control

Wireless Security WEP War-Driving Network Access Control No Perimeter Associations Aside: IPv6 Neighbor Discovery Tracing Attacks MAC Address Filtering Clayton’s Spoofing Attack Windows XP SP2 and Spoofing Network Access Control Evil Twin Redux The Gold Standard Living with Wireless

38 / 41

Fundamentally, the problem is network access control

We have none with wireless

Usual solution: let people onto your network, but require some sort of Web-based login

slide-39
SLIDE 39

Evil Twin Redux

Wireless Security WEP War-Driving Network Access Control No Perimeter Associations Aside: IPv6 Neighbor Discovery Tracing Attacks MAC Address Filtering Clayton’s Spoofing Attack Windows XP SP2 and Spoofing Network Access Control Evil Twin Redux The Gold Standard Living with Wireless

39 / 41

Set up your evil twin in a hotspot

Intercept the login session and/or the registration

Registration often involves a credit card. . .

slide-40
SLIDE 40

The Gold Standard

Wireless Security WEP War-Driving Network Access Control No Perimeter Associations Aside: IPv6 Neighbor Discovery Tracing Attacks MAC Address Filtering Clayton’s Spoofing Attack Windows XP SP2 and Spoofing Network Access Control Evil Twin Redux The Gold Standard Living with Wireless

40 / 41

No authentication at the WEP layer; higher-layer authentcation susceptible to evil twin attack

Authorization based on MAC address and WEP key; both are vulnerable

Rarely any logging for audit

  • Oops. . .
slide-41
SLIDE 41

Living with Wireless

Wireless Security WEP War-Driving Network Access Control No Perimeter Associations Aside: IPv6 Neighbor Discovery Tracing Attacks MAC Address Filtering Clayton’s Spoofing Attack Windows XP SP2 and Spoofing Network Access Control Evil Twin Redux The Gold Standard Living with Wireless

41 / 41

For residential use, turn off SSID broadcast

(Hard to do in an enterprise)

Put your wireless net outside the firewall

Use WEP — it’s still (marginally) better than nothing

Better yet, use WPA

Use a VPN

Use end-to-end crypto

Check the certificate on registration or login pages