Doc.: IEEE 802.11-00/253 Submission May 2001 Bernard Aboba, MicrosoftSlide 1 WEP2 Security Analysis Bernard Aboba Microsoft.

Slides:



Advertisements
Similar presentations
Doc.: IEEE /1186r0 Submission October 2004 Aboba and HarkinsSlide 1 PEKM (Post-EAP Key Management Protocol) Bernard Aboba, Microsoft Dan Harkins,
Advertisements

Doc.: IEEE /553r0 Submission September 2001 Tim Moore, Bernard Aboba/Microsoft Authenticated Fast Handoff IEEE Tgi Tim Moore Bernard Aboba.
Doc.: IEEE /178 Submission July 2000 A. Prasad, A. Raji Lucent TechnologiesSlide 1 A Proposal for IEEE e Security IEEE Task Group.
Doc.: IEEE /087 Submission May, 2000 Steven Gray, NOKIA Jyri Rinnemaa, Jouni Mikkonen Nokia Slide 1.
IEEE i: A Retrospective Bernard Aboba Microsoft March 2004.
Doc.: IEEE /252 Submission May 2001 Bernard Aboba, MicrosoftSlide 1 Issues with the 802.1X State Machine IEEE 802.1X Revision PAR Bernard Aboba.
IEEE P802 Handoff ECSG Submission July 2003 Bernard Aboba, Microsoft Detection of Network Attachment (DNA) and Handoff ECSG Bernard Aboba Microsoft July.
Block Cipher Modes of Operation and Stream Ciphers
Doc.: IEEE /039 Submission January 2001 Haverinen/Edney, NokiaSlide 1 Use of GSM SIM Authentication in IEEE System Submitted to IEEE
PEAP & EAP-TTLS 1.EAP-TLS Drawbacks 2.PEAP 3.EAP-TTLS 4.EAP-TTLS – Full Example 5.Security Issues 6.PEAP vs. EAP-TTLS 7.Other EAP methods 8.Summary.
Wireless Security By Robert Peterson M.S. C.E. Cryptographic Protocols University of Florida College of Information Sciences & Engineering.
WEP 1 WEP WEP 2 WEP  WEP == Wired Equivalent Privacy  The stated goal of WEP is to make wireless LAN as secure as a wired LAN  According to Tanenbaum:
Doc.: IEEE /037 Submission March 2000 Duncan Kitchin, Jesse Walker, Intel NIDSlide 1 Proposal for Enhanced Encryption Duncan Kitchin Jesse Walker.
Wireless Security Ryan Hayles Jonathan Hawes. Introduction  WEP –Protocol Basics –Vulnerability –Attacks –Video  WPA –Overview –Key Hierarchy –Encryption/Decryption.
1 MD5 Cracking One way hash. Used in online passwords and file verification.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
WEP Weaknesses Or “What on Earth does this Protect” Roy Werber.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
Intercepting Mobiles Communications: The Insecurity of Danny Bickson ACNS Course, IDC Spring 2007.
How To Not Make a Secure Protocol WEP Dan Petro.
Wired Equivalent Privacy (WEP)
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture.
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
IEEE Wireless Local Area Networks (WLAN’s).
Wireless Security Presentation by Paul Petty and Sooner Brooks-Heath.
The Final Nail in WEP’s Coffin Andrea Bittau, Mark Handley – University College London Joshua Lackey - Microsoft CPS372 Gordon College.
1 Wireless LAN Security Kim W. Tracy NEIU, University Computing
Wireless LAN Security Yen-Cheng Chen Department of Information Management National Chi Nan University
WLAN What is WLAN? Physical vs. Wireless LAN
Submission August 2001 Nancy Cam-Winget, Atheros Slide 1 Rapid Re-keying WEP a recommended practice to improve WLAN Security Nancy Cam-Winget, Atheros.
Mobile and Wireless Communication Security By Jason Gratto.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
Doc.: IEEE /TBD Submission November 2001 Warren Barkley, Tim Moore, Bernard Aboba/Microsoft IEEE 802.1X and RADIUS Security Bernard Aboba Ashwin.
Wireless Security Beyond WEP. Wireless Security Privacy Authorization (access control) Data Integrity (checksum, anti-tampering)
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
Intercepting Mobile Communications: The Insecurity of Nikita Borisov Ian Goldberg David Wagner UC Berkeley Zero-Knowledge Sys UC Berkeley Presented.
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
WEP Protocol Weaknesses and Vulnerabilities
WEP AND WPA by Kunmun Garabadu. Wireless LAN Hot Spot : Hotspot is a readily available wireless connection.  Access Point : It serves as the communication.
Doc.: IEEE /034r1 Submission March 2000 Dan Simon, Bernard Aboba, Tim Moore, Microsoft IEEE Security and 802.1X Dan Simon
WEP, WPA, and EAP Drew Kalina. Overview  Wired Equivalent Privacy (WEP)  Wi-Fi Protected Access (WPA)  Extensible Authentication Protocol (EAP)
Doc.: IEEE /495r1 Submission July 2001 Jon Edney, NokiaSlide 1 Ad-Hoc Group Requirements Report Group met twice - total 5 hours Group size ranged.
Doc.: IEEE /524r0 Submission November 2001 Bernard Aboba, MicrosoftSlide 1 Secure Remote Password (SRP) Bernard Aboba Dan Simon Tim Moore Microsoft.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Doc.: IEEE /610r0 Submission November 2001 Tim Moore, Microsoft 802.1X and key interactions Tim Moore.
Wireless security Wi–Fi (802.11) Security
How To Not Make a Secure Protocol WEP Dan Petro.
Doc.: IEEE /303 Submission May 2001 Simon Blake-Wilson, CerticomSlide 1 EAP-TLS Alternative for Security Simon Blake-Wilson Certicom.
802.11b Security CSEP 590 TU Osama Mazahir. Introduction Packets are sent out into the air for anyone to receive Eavesdropping is a much larger concern.
Doc.: IEEE /0485r0 Submission May 2004 Jesse Walker and Emily Qi, Intel CorporationSlide 1 Management Protection Jesse Walker and Emily Qi Intel.
Wired Equivalent Privacy (WEP) Chris Overcash. Contents What is WEP? What is WEP? How is it implemented? How is it implemented? Why is it insecure? Why.
Doc.: IEEE /230 Submission May 2001 William Arbaugh, University of MarylandSlide 1 An Inductive Chosen Plaintext Attack against WEP/WEP2 William.
WLAN Security1 Security of WLAN Máté Szalay
Doc.: IEEE /610r0 Submission November 2001 Tim Moore, Microsoft 802.1X and key interactions Tim Moore.
Doc.: IEEE k Submission July 2004 Bernard Aboba, MicrosoftSlide 1 IEEE k Security: A Conceptual Model Bernard Aboba Microsoft.
Wireless LAN Security Daniel Reichle Seminar Security Protocols and Applications SS2003.
1. Introduction In this presentation, we will review ,802.1x and give their drawbacks, and then we will propose the use of a central manager to replace.
Module 48 (Wireless Hacking)
Re-evaluating the WPA2 Security Protocol
Wireless Protocols WEP, WPA & WPA2.
Lecture 29 Security in IEEE Dr. Ghalib A. Shah
WEP & WPA Mandy Kershishnik.
An Inductive Chosen Plaintext Attack against WEP/WEP2
July 2002 Threat Model Tim Moore Tim Moore, Microsoft.
A Joint Proposal for Security
Presentation transcript:

doc.: IEEE /253 Submission May 2001 Bernard Aboba, MicrosoftSlide 1 WEP2 Security Analysis Bernard Aboba Microsoft

doc.: IEEE /253 Submission May 2001 Bernard Aboba, MicrosoftSlide 2 Goals To (briefly) summarize security weaknesses discovered in WEP v1.0 To analyze security vulnerabilities of WEP2 To recommend potential improvements

doc.: IEEE /253 Submission May 2001 Bernard Aboba, MicrosoftSlide 3 Classes of Attacks Against WEP v1.0 IV (key) reuse [Walker, Berkeley team, Arbaugh] –Made possible by small IV space in WEPv1.0, lack of IV replay protection –Enables statistical attack against ciphertexts w/replayed IVs Known plaintext attack [Walker, Berkeley team, Arbaugh] –Lots of known plaintext in IP traffic: ICMP, ARP, TCP ACK, etc. –Can send pings from Internet through AP to snooping attacker –Enables recovery of key stream of length N for a given IV –Can forge packets of size N by reusing IV in absence of a keyed MIC Partial known plaintext [Berkeley team, Arbaugh] –May only know a portion of the plaintext (e.g. IP header) –Possible to recover M octets of the keystream, M < N –Via repeated probing, can extend keystream from M to N [Arbaugh] –Possible to flip bits in realtime, adjust CRC32, divert traffic to attacker Enabled by linearity of CRC32, absence of keyed MIC

doc.: IEEE /253 Submission May 2001 Bernard Aboba, MicrosoftSlide 4 Classes of Attacks (cont’d) Authentication forging [Berkeley team] –WEP v1.0 encrypts challenge using IV chosen by client –Recovery of key stream for a given IV enables re-use of that IV for forging WEP v1.0 authentication –Does not provide key, so can’t join LAN Denial of service –Disassociate, reassociate messages not authenticated Dictionary attack –Possible where WEP keys derived from passwords Realtime decryption [Berkeley team, Arbaugh] –Repeated IV reuse, probing enables building of a dictionary of IVs, key streams –Enables decryption of traffic in realtime –Possible to store dictionary due to small IV space Need 1500 octets of key stream for each IV 2^24 * 1500 octets = 24 GB

doc.: IEEE /253 Submission May 2001 Bernard Aboba, MicrosoftSlide 5 WEP2 Increases size of IV space to 128 bits Key may be changed periodically via IEEE 802.1X re- authentication to avoid staleness No keyed MIC No authentication for reassociate, disassociate No IV replay protection Use of Kerberos for authentication within IEEE 802.1X

doc.: IEEE /253 Submission May 2001 Bernard Aboba, MicrosoftSlide 6 WEP2 Security Analysis IV (key) reuse –Larger IV, re-key support makes unintentional reuse much less likely –Without IV replay protection, intentional reuse still possible Known/Partial plaintext attacks –Not affected by larger IV –Probing, key stream extension still possible in absence of keyed MIC –Still possible to recover key streams via ping from Internet –Can still forge packets by reusing IV, key stream –Can still divert traffic in absence of non-linear, keyed MIC Authentication forging attack –Not affected by larger IV, since intentional IV replay still possible Dictionary attack –New vulnerabilities introduced by mandatory KerberosV authentication Realtime decryption –Much more difficult due to larger IV 2^128 * 1500 octets = 5.1E32 GB

doc.: IEEE /253 Submission May 2001 Bernard Aboba, MicrosoftSlide 7 KerberosV Dictionary Attack Vulnerabilities References –Bellovin & Meritt “Limitations of the Kerberos authentication system”, USENIX 1991 –Wu, T. “A Real-World Analysis of Kerberos Password Security”, Scenario –Attacker snoops AS_REQ/AS_REP exchange, recovers passwords offline –In popular networks (“hot spots”), may be possible to collect many such exchanges in a single attempt Vulnerabilities –PADATA or TGT encrypted with client Key derived from password via STRING-TO-KEY(P) Results [Wu, 1998] –Password checkers not successful in significantly increasing password entropy –Structure of TGT (service name = krbtgt) enables verification of key guess by decrypting only 14 octets; similar issues with PADATA –Use of DES to encrypt TGT enables use of parallel DES cracking techniques –Of 25,000 sample TGTs, 2045 could be decrypted in two weeks using a cluster of 3 UltraSPARC-2 (200 Mhz) and 5 UltraSPARC-1 (167 Mhz) machines –Today, 15 off-the-shelf PCs could accomplish the same thing in 1 day at a cost of < $15K

doc.: IEEE /253 Submission May 2001 Bernard Aboba, MicrosoftSlide 8 Solutions Machine versus user authentication –Machine keys typically have full entropy Use of alterative ciphers in Kerberos –Draft-raeburn-krb-gssapi-krb5-3des-01.txt –Draft-raeburn-krb-rijndael-krb-00.txt Revision to Kerberos [Wu] –SRP used for Kerberos pre-authentication –Derived key used to encrypt TGT

doc.: IEEE /253 Submission May 2001 Bernard Aboba, MicrosoftSlide 9 Reassociate, Disassociate & Beacon Security Currently, reassociate, disassociate messages are not secure –Enables denial of service attacks Proposal –Add an authenticator to reassociate and disassociate messages –Replay counter, HMAC-SHA1 (replay counter || SourceMAC || destMAC || transmit key) –On disassociate: ignore if HMAC is not valid –On reassociate: validate authenticator via move-request to old AP; if invalid, old AP ignores move-request Beacon security –Currently, beacon messages are not authenticated –Enables station to roam to a rogue AP –Proposal: validate beacon before reassociating Replay Counter, HMAC-SHA1 (replay counter || sourceMAC || multicast key) Any station can forge this, but better than nothing

doc.: IEEE /253 Submission May 2001 Bernard Aboba, MicrosoftSlide 10 Summary – Vulnerabilities Thwarted

doc.: IEEE /253 Submission May 2001 Bernard Aboba, MicrosoftSlide 11 Conclusions WEP2 not significantly more secure than WEPv1.0 –Small IV only part of the problem; absence of a keyed MIC remains a major deficiency –Denial of service attacks not addressed –WEP2 should not be treated as a significant security enhancement (should state this explicitly in security considerations section) Kerberos V vulnerable to dictionary attack –Most important in “Hot spot” scenarios where many exchanges could be recovered Expect at least 10 percent of passwords to be crackable in 24 hours Downside greater than WEP v1.0 vulnerabilities: not only can traffic be decrypted, but attacker can assume user identity and access other services! –Protocol modifications required to address the vulnerability Support for 3DES, AES ciphers Support for SRP pre-authentication Backward compatibility issues –AP with built-in KDC AP would need software upgrade to support new ciphers, pre-auth types –AP in “pass-through” mode (IAKERB or RADIUS) AP does not need to understand AS_REQ/AS_REP, so no issue

doc.: IEEE /253 Submission May 2001 Bernard Aboba, MicrosoftSlide 12 Recommendations Examine feasibility of adding keyed MIC to WEP2 Without keyed MIC, downplay security value of WEP2 –Make this clear up front Choose a mandatory-to-implement authentication method resistant to dictionary attack –Example: SRP: RFC 2945 –EAP-SRP: draft-ietf-pppext-eap-srp-01.txt