[Mac_crypto] 802.11 Wireless Network (Airport) Security

R. A. Hettinga mac_crypto@vmeng.com
Sun, 24 Aug 2003 17:34:35 -0400


<http://world.std.com/~reinhold/airport.html>

Apple Airport Network Security 

This page offers some practical security tips to make Apple's  Airport wireless network more secure. Many of the suggestions also  apply to other Wireless networks using the IEEE 802.11 standard. Note that Apples new Airport 2.0 apparently just adopts the  industry standard extension for "128-bit security," which does not  solve the very grave security problems described below. 

The threats 

Threat 1. The encryption used in airport can be broken fairly  easily 

A draft paper by Scott Fluhrer, Itsik Mantin and Adi Shamir was  released on July 25, 2001 and announces new attacks on the RC4 cipher  that is the basis for Airport and 802.11b Wired Equivalent Privacy  (WEP) security. Prof. Shamir states in an e-mail accompanying the  release: 

"Attached you will find a new paper which describes a  truly practical direct attack on WEP's cryptography. It is an  extremely powerful attack which can be applied even when WEP's RC4  stream cipher uses a 2048 bit secret key (its maximal size) and 128  bit IV modifiers (as proposed in WEP2). The attacker can be a  completely passive eavesdropper (i.e., he does not have to inject  packets, monitor responses, or use accomplices) and thus his  existence is essentially undetectable. It is a pure known-ciphertext  attack (i.e., the attacker need not know or choose their  corresponding plaintexts). After scanning several hundred thousand  packets, the attacker can completely recover the secret key and thus  decrypt all the ciphertexts. The running time of the attack grows  linearly instead of exponentially with the key size, and thus it is  negligible even for 2048 bit keys." 

The paper itself, titled "Weaknesses in the Key Scheduling  Algorithm of RC4," has been posted at http://www.eyetap.org/~rguerra/toronto2001/rc4_ksaproc.pdf (in PDF format) and at http://www.crypto.com/papers/others/rc4_ksaproc.ps (in Postscript). 

Macintouch previously  reported: "A group of researchers at UC Berkeley have published a  report detailing security flaws in the Wired Equivalent Privacy (WEP)  algorithm used in 802.11b wireless protocols - popularized by Apple's  Airport. The report details a number of potential attacks that allow  both decryption of traffic and disruption of services." 

The draft paper by Borisov, Goldberg, and Wagner presents a number of  practical attacks on 802.11 Wired Equivalent Privacy (WEP). The long  term solution to these problems, as the paper points out, is to  rework the 802.11 protocol to use better encryption and message  authentication algorithms. Unfortunately a huge infrastructure has  grown up around 802.11 and large numbers of modems are in use,  including the Apple  Airport line. Since the encryption and authentication is done in  firmware, changes to these algorithms will likely requires new  hardware. 

In addition to the threats detailed in the Shamir and BGW papers,  there is another problem with Airport security: Apple's Airport  software generates the network key from a password. Since most user's  pick passwords in fairly predictable ways, an attacker equipped with  a password guessing program could break into Airport much more  quickly, perhaps in a matter of minutes. 

Threat 2. 802.11b "base stations" can be used to leak information  from inside coprporate security 

All the talk of breaks to Airport/802.11 encryption may obscure a  greater threat. Tranceivers for 802.11 are small, inexpensive and  easy to install. While their range is normally limited to a few  hundred feet, the distance can be extended to several miles using  directional antennas. Given the standard architecture in most  corporate and government buildings, it is fairly easy for a malicious  individual who has access to the building to install a covert 802.11  base station. 

Equipment is available to scan for unauthourzed base stations, but  it must be used frequently. More sophisticated atackers can use  timers to insure that the covert base station is only on at, say 3am.  Microwave transverter technology could be used to shift the 802.11  signals to other parts of the microwave spectrum where standard  sniffers will never see them. 

It may be necessary for institutions concerned about network  security to employ virtual private network technology, such as IPSec,  internally as well as externally, i.e. even behind the corporate fire  wall. 

What you can do now 

Here are some very simple and practical measures that can improve  Airport security: 

Turn it on 

Many Airport users haven't even bothered to enable the security  features built into Airport, feeble though they may be. There is an  old joke about two guys hiking in the woods who spot a mean looking  grizzley bear heading their way. One of the hikers takes off his back  pack, pulls out running shoes, and starts putting them on. The other  says "You idiot, you can't outrun a hungry bear in the woods." The  first replies "I don't have to outrun the bear, I only have to outrun  you." Even minimal seurity may be effective against snoops who have  plnty of unprotected targets to choose from. If you have Airport 2,  use the higher 128-bit security setting, if possible. 

Use strong Passwords 

The Apple Airport system security depends on the strength of the  network password. As we said out above, to take full advantage of the  limited security Airport provides you must use a password with at  least 40-bits of randomness. The Diceware.com page has  instructions for simple ways to select words at random using ordinary  dice. There are also scripts that  will do this . Using dice is more secure, but the scripts are  probably adequate for this purpose. We suggest you use one of the  following formats for selecting your airport network and  administrative passwords: 
Four Diceware words, for example: bater ark acorn     haney 
Three Diceware words plus one random digit, for example: until wrote sappy 3 The random digit can simply be     the result of a single dice roll, i.e. a number from 1 to 6. 
Nine random letters, for example: MZV EWD CHZ 

The Diceware  FAQ has instructions for selecting random letters using dice. You  can also use our Passgen applet. Just select the "CCC CCC CCC" template from the drop down  list. To change your password, launch the Airport Admin Utility. Make  sure that the Enable Encryption (using WEP) box is checked and  then select Change Network Password . Obviously all other users  of the Airport network must be informed of this change in advance,  preferably by some method other than ordinary email. 

Note: Apple's Airport 2.0 and many 3rd party vendors  offer 802.11 modems with "128-bit" keys. You will need even stronger  passwords to use these effectively. The secret part of these keys is  only 104-bits. We recommend at least a 6 word Diceware passphrase if  your software acccepts password input. An 8 word Diceware passphrase  is prefered as it offers the full 104-bit strength. If you must enter  a hexadecimal password, use at least 26 Hex digits. These can be  generated using the Passgen applet by selecting the HHHH HHHH HHHH HHHH template from the drop  down list. 

Caution: Some 802.11 implementations do not hash the password  before using it as a key. In these cases hexadecimal passswords  should be used if the option is available, otherwise use random  characers, 

Change passwords frequently 

The amount of time needed to break an Airport or 802.11 password  can can range from a matter of hours or less to several days. It all depends on  how heavily loaded the network is. Since most networks are not  used heavily, you can gain some protection from the new attacks by  changing your network password frequently -- preferably every day.  You can generate a list of passwords using the Passgen "CCC CCC CCC" template  (use two CCC CCC CCC passwords for 128-bit sustems) and supply them  to users on a weekly or monthly basis. They will then have to use the  Airport Admin Utility to change the network password when they log in  every morning. 

For extra credit you might want to change passwords twice a day,  say at 7 pm and 7 am. Only those who stay late will have to log in  twice and an attacker will have half as much time to crack your  password. 

Review base station placement 

Airport has limited range, so by careful placement of the base  stations you may be able to minimize the areas outside your building  where an attacker can receive a strong signal. For example you may  want to place a base station near the center of an inside wall rather  than by a window. However you should consider that more sophisticated  attackers can use high gain directional antennas to extend Airport's  range. 

Alert security personnel 

Make your security staff aware of the Airport threat and suggest  that they investigate individuals operating laptops in the company  parking lot. Make sure they know what high-gain WEP antennas look  like so they can identify them. 

Place the Airport network outside of your corporate firewall. 

The BGW paper suggests placing wireless networks outside of the  corporate firewall. This can limit a successful intruder's ability to  access corporate databases. It may reduce the protection afforded to  the wireless networked computers themselves, however. Another  possibility is to have a separate fierwall for wireless users. 

Develop and disseminate a policy on wireless networks 

If your organization wishes to maintain security, it is vital that  only approved wireless installations be permitted. You may wish to  scan your building(s) periodically to look for unauthorized base  stations. 

Superencrypt with IPsec 

The most effective solution, by far, is to use separate strong  encryption programs, such as IPsec, to secure all data moving over  the Airport network, and perhaps the entire corporate network. This  is the one solution that affords protection against all known Airport  attacks. A proper IPsec installation takes considerable care and  effort, however. 

Sources of IPsec information and software include: 
NetBSD     IPsec FAQ 
IPsec     Webopedia page 
PGP 
FreeSwan 

A Frequent Key Changing Proposal for 802.11 

[We are revising these proposals in light of the RC4 attacks and  hope to issue a new version shortly. -- agr] 

WF1 

In WF1 the 802.11 WEP keys would be changed many times each hour,  say every 10 minutes. A parameter, P , determines how many time per  hour the key is to be changed, where P must divide 3600 evenly. The  WEP keys are derived from a master key, M, by taking the low order N  bits (N = 40, 104, whatever) of the SHA1 hash of the master key with  the date and time (UTC) of the key change appended. 

WEPkey = Bits[0-N](SHA1(M | yyyymmddhhmmss)) 

M can be any size, up to, say, 256 bytes. This allows direct entry  of a passphrase. 

WF1 would eliminate the dictionary attack described in the paper.  Note that since the master key is not limited to 40 bits, WF1 would  also reduce the value of direct attacks on 40-bit keys. In this  regard, it is worth noting that IV collisions also facilitate a  direct attack on the encryption. If an attacker accumulates n packets  with the same IV, he can attack all the packets at the same time,  reducing the time required by a factor of n, if n isn't too big.  Since the time required to crack 40-bit RC4 on a single workstation  is on the order of a week, even a factor of 3 reduction is  significant. 

WF1 does not completely eliminate the problem of IV collisions.  With a 24-bit IV, some are inevitable. Each IV collision has the  potential of compromising the data in both packets. But WF1 does  allow the rate at which they occur to be reduced and controlled. The  rate of collisions varies linearly with the period between key  changes. If there are R packets per second and the time between key  changes is T where T =3600/P, then the expected number of collisions  in the time interval T is roughly (T*R)^2/2^25, so the rate of  collisions is roughly T*R^2/2^25. 

WF1 also does not eliminate the authentication attacks described  in Part 4 of the paper. However most of the attacks described there  require multiple attempts to succeed and the shortened key window  might make them more difficult to mount. 

Clearly good synchronization of the time-of-day clock on each node  is essential in WF1, but protocols already exist that can do this  over a network. Small synchronization discrepancies can be handled by  the 802 retry mechanism and should look very much like a short RF  outage. 

The BGW paper mentions that some 802.11 modems reset their IV  counter when they are initialized. If a key change counts as an  initialization, then this proposal runs the risk of creating  additional collisions. However it should be possible to test modems  for this property and refuse to enter the key changing security mode  if such a modem is installed. Manufacturers could eliminate this  behavior with a firmware change and there would be no impact on other  uses of the modem. Similarly modems that do not change the IV for  each packet could be barred. 

Unless I have missed something, WF1 could be implemented as an  option in 802.11 driver software. It might also be possible to  implement WF1 with currently available 802.11 software by using a  scripting language. Note that a crude version of WF1 can be  implemented today with no new software at all: just change the WEP  key every night. A weekly WEP key list could be distributed to  authorized users by paper mail or encrypted e-mail. 

WF2 

WF2 would change keys periodically just like WF1, however the  packet sender's address would also incorporated in the hash. 

WEPkey = Bits[0-N](SHA1(M | Sender's address |  yyyymmddhhmmss)) 

WF2 requires that hubs encryption programming be changed. Assuming  most hubs are programmed in firmware, this will generally require new  hubs. However existing client modems can still be used. WF2 will  essentially eliminate IV collisions if the keys are changed at least  every few hours. 

WF2 still does not eliminate the authentication attacks. However  since we have to change the hub programming anyway, it might be  possible to add tests to detect possible attacks. 

Neither WF1 nor WF2 eliminates data leaks from WEP, but they do  reduce them considerably. Stronger security measures, such as SSL and  IPsec, should be used to protect sensitive data traveling over  802.11, but the same can be said of wired Ethernet. 

These suggestions are hypothetical and have not been implemented  or tested. If you try them, please let us know how they worked. 

References 

Designing  Airport Networks , Apple Computer. 

Airport is a trademark of Apple Computer. 

Arnold G. Reinhold 

2001-2-13, Rev. 2001-8-29. 2001-11-24, 2002-3-13 

-- 
-----------------
R. A. Hettinga <mailto: rah@ibuc.com>
The Internet Bearer Underwriting Corporation <http://www.ibuc.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'