Download presentation
Presentation is loading. Please wait.
1
Time Passes, Security Changes… Christian Huitema Monday, August 1, 2005 IETF, Application Area Meeting
2
It takes less than 1 μs to compute an MD5 checksum on this presenter’s laptop
3
Dictionary attacks How many guesses before the observer can crack the challenge? –1,000,000 ? –10,000,000? Do you trust users to generate “good enough” passwords? ClientServer challenge Response = name + hash (challenge, password) Observer Dictionary +
4
A “zombie” PC is rumored to rent for $0.10 per week on the underground market
5
How much does a crack cost? bitsCost simple password24< $0.00 strong password32< $0.01 pass phrase40< $0.20 7 random characters47< $50.00 8 random characters54< $5,000.00 64 bits random64> $3,000,000
6
Are passwords obsolete? Basic rules: –If it is generated by the user, it can certainly be cracked –If it can be remembered by the user, it can probably be cracked Exception: –If the password is exchanged over a protected connection (SSL, TLS, IPSEC) –If the challenge/response mechanism is designed to resist dictionary attacks
7
The average user will happily connect to a “free Internet” hotspot
8
Man in the middle attacks Intercept DNS requests Insert a proxy Listen to the data –Names, –Addresses, –Passwords, –Challenges Hijack connections SPAM, Ads, Buffer overflows Client AP Mock DNS Server Proxy
9
The practice of “hiding the SSID” facilitates the “evil twin” attack against Wi-Fi
10
The “evil twin” attack “Rogue” APClient Beacon: No Name Probe: example.net ? Answer: yes indeed ! Let’s get connected For user convenience, systems try to automatically connect to the “hidden home network”
11
Evil twin reaps interesting rewards Exploit automatic connection –Upon a connectivity indication, many systems will automatically “fetch mail”, “empty the outbox”, “synchronize”… Automatic “man in the middle” attack –Register names, passwords –Store challenge for off-line crack Quick and silent –Disconnect after a few seconds –Hardly any notification to the user
12
Times have changed, old security practices must be revised
13
Recommendations Don’t rely on challenge-response –Hardly better than clear-text password! Identify the server –Prevent man-in-the-middle attacks –Beware of PKI tricks! Encrypt the session –Protect the identity exchange –Prevent session hijacking Use secure framework –IPSEC, SSL, secure RPC, Web Services…
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.