Seminar class presentation Student: Chuming Chen & Xinliang Zheng 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions John Bellardo and Stefan Savage Dept of CSE @ UC San Diego Seminar class presentation Supervisor: Dr. Huang Student: Chuming Chen & Xinliang Zheng
Outline Background information about IEEE802.11 Theoretical vulnerability analysis Practical 802.11 attack infrastructure Deauthentication attack and defense Virtual carrier-sense attack and defense Conclusions References 11/27/2018 CSE@USC
Background information about IEEE802.11 What is IEEE802.11 802.11 MAC frame Authentication and Association Transitions Hidden Terminal Problem Solution to Hidden Terminal Problem 11/27/2018 CSE@USC
What is IEEE802.11 IEEE802.11 is a series of specifications for wireless local area network MAC and Physical layer. 11/27/2018 CSE@USC
802.11 MAC frame By specifying different fields we can get different types of frames: RTS, CTS, PS-Poll, ACK, Data, and so on. 11/27/2018 CSE@USC
Type and Subtype Identifier Management frames (type=00) Association request (0000) Association response (0001) Disassociation (1010) Deauthentication (1100) Control frames (type=01) Power Save (PS)-Poll (1010) RTS (1011) CTS (1100) Data frame (type=10) Data (0000) Data+CF-Ack (0001) 11/27/2018 CSE@USC
Authentication and Association Transitions Deauthentication and disassociation packets can be sent out by both Access Point (AP) and Wireless Station (WS). 11/27/2018 CSE@USC
Hidden Terminal Problem In wireless LAN stations may not be able to “see” each other (CSMA/CD is not fit for here.). 11/27/2018 CSE@USC
Solution to Hidden Terminal Problem (Physical and Virtual Carrier Sensing are used together.) 1. RTS/CTS sequence is used to clear the wireless medium when transmission just started. 11/27/2018 CSE@USC
Solution to Hidden Terminal Problem (Physical and Virtual Carrier Sensing are used together.) 2. Different Inter-Frame Spaces (SIFS, DIFS) and Network Allocation Vector (NAV) are used to reserve the medium. 11/27/2018 CSE@USC
Theoretical vulnerability analysis Identity Vulnerabilities Picturing of Deauthentication Attack Media Access Vulnerabilities Picturing of Virtual Carrier-Sense Attack 11/27/2018 CSE@USC
Identity Vulnerabilities Fundamental reason Deauthentication and Disassociation packets (others also) are sent without authentication. Deauthentication attack Adversary (A) can pretend WS/AP sent Deauthentication packet to AP/WS. Disassociation attack Adversary (A) can pretend WS/AP sent Disassociation packet to AP/WS. Power Saving Sequence attack A pretends WS sending PS-Poll to AP causing buffered frames discarded. A pretends AP sending spoofed Traffic Indication Map (TIM) to WS making it keep sleeping or desynchronized. 11/27/2018 CSE@USC
Picturing of Deauthentication Attack 11/27/2018 CSE@USC
Media Access Vulnerabilities Fundamental reason Still because packet sending to the media is not authenticated in 802.11. One possible attack Sending packet within each SIFS to compete the media; may require sending 50,000 packets/second. Virtual Carrier-Sense attack Sending out packets with large NAV. (30 p/s) 11/27/2018 CSE@USC
Picturing of Virtual Carrier-Sense Attack 11/27/2018 CSE@USC
Practical 802.11 attack infrastructure What A need to implement the attack? General structure of current Network Interface Cards (NIC) Practical Problem Solution to the Practical Problem 11/27/2018 CSE@USC
What A need to implement the attack? It’s possible that A can design and make new NIC which can send out different packets as A wants, but it’s more likely improbable. Hopefully A can use current available NIC to implement attacks. 11/27/2018 CSE@USC
General structure of current NIC Generally the Firmware can be updated but the Hardware can not be changed. 11/27/2018 CSE@USC
Practical Problem A wide variety of 802.11 NIC tested by the authors do not typically allow the generation of any control frames, permit other key fields (such as NAV) to specified by the host, or allow reserved or illegal field values to be transmitted. 11/27/2018 CSE@USC
Solution to the Practical Problem Most of current NIC designs originated by Choice Microsystems, in which we can use AUX Port (original purpose is for debugging) to change frame fields. The authors modify the firmware to access AUX port then change frame fields to devise attacks. 11/27/2018 CSE@USC
Deauthentication attack and defense Experimental settings Deauthentication Attack Defense to Deauthentication Attacks 11/27/2018 CSE@USC
Experimental Settings Small 802.11 network with 7 machines: 1 attacker, 1 access point, 1 monitoring station and 4 legitimate clients. In-kernel software-based access point with Linux HostAP driver. Clients attempted to ftp a large file through the access point machine – a transfer exceeding the testing period 11/27/2018 CSE@USC
Deauthentication Attack Using iPAQ H3600 with Dlink DWL-650 card running software with the firmware updated. 11/27/2018 CSE@USC
Defense to Deauthentication Attacks Method: delay deauthentication (5-10 s) after received the deauthentication request packet. WS roaming is not really affected. 11/27/2018 CSE@USC
Virtual carrier-sense attack and defense Virtual Carrier-Sense Attack Using A Real NIC Virtual Carrier-Sense Attack Using ns simulator Defense to Virtual Carrier-Sense Attack 11/27/2018 CSE@USC
Virtual Carrier-Sense Attack Using A Real NIC It does not work Conclusion: most of the devices available do not properly implement 802.11, i.e. NAV reserve period is not fully executed. 11/27/2018 CSE@USC
Virtual Carrier-Sense Attack Using ns simulator ns simulator implements 802.11 faithfully. Attack is devised by sending packet with large NAV. 11/27/2018 CSE@USC
Defense to Virtual Carrier-Sense Attack One way is to specify a maximal valid NAV = transmission time (max. packet) + medium access backoffs. However, increasing the frequency of sending Virtual Carrier-Sense Attack packet will still show effects. 11/27/2018 CSE@USC
Defense to Virtual Carrier-Sense Attack Another way specified by the authors needs to modify 802.11: No fragmentation, since the default fragmentation thresholds in wireless media is significantly exceed the Ethernet MTU. For four key frame types contains NAV: ACK and Data frame: ignore NAV since there is no fragmentation. RTS frame NAV: respected until such time as a data frame should be sent. CTS frame NAV: specify some threshold (30%) if such time is used by CTS frame then ignore NAV. This way is not tested by the authors of the paper. 11/27/2018 CSE@USC
Conclusions Vulnerabilities in the 802.11 management and media access services are identified. Theoretical attacks are analyzed. Implementing of deauthenticaiton and virtual carrier-sense attacks are provided with testing results. Low-overhead, non-cryptographic countermeasures are specified, some test results with the suggested improvement are also provided. 11/27/2018 CSE@USC
References 1. 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions, John Bellardo and Stefan Savage, Dept of CSE @ UC San Diego. 2. 802.11 Wireless Networks – The Definitive Guide, Matthew S. Gast, O’Reilly 2002. 3. Real 802.11 Security – WI-Fi Protected Access and 802.11i, Jon Edney and William A. Arbaugh, Addison-Wesley 2003. 11/27/2018 CSE@USC