[Long Rant] Re: Encryption Question

Dominick, David David.Dominick at delta.com
Tue Sep 18 03:40:35 EST 2001


I am sorry, but I am not sure where you get your information. That is wrong.
The encryption is irrelevant to the way we break WEP. The Initialization
Vector is 24 bit period. that does not change based on encryption size. 

The initialization vector in WEP is a 24-bit field, which is sent in the
clear text part of a message. Such a small space of initialization vectors
guarantees the reuse of the same key stream. A busy access point, which
constantly sends 1500 byte packets at 11Mbps, will exhaust the space of IVs
after 1500*8/(11*10^6)*2^24 = ~18000 seconds, or 5 hours. (The amount of
time may be even smaller, since many packets are smaller than 1500 bytes.)
This allows an attacker to collect two ciphertexts that are encrypted with
the same key stream and perform statistical attacks to recover the
plaintext. Worse, when the same key is used by all mobile stations, there
are even more chances of IV collision. For example, a common wireless card
from Lucent resets the IV to 0 each time a card is initialized, and
increments the IV by 1 with each packet. This means that two cards inserted
at roughly the same time will provide an abundance of IV collisions for an
attacker. (Worse still, the 802.11 standard specifies that changing the IV
with each packet is optional!)

The first attack follows directly from the above observation. A passive
eavesdropper can intercept all wireless traffic, until an IV collision
occurs. By XORing two packets that use the same IV, the attacker obtains the
XOR of the two plaintext messages. The resulting XOR can be used to infer
data about the contents of the two messages. IP traffic is often very
predictable and includes a lot of redundancy. This redundancy can be used to
eliminate many possibilities for the contents of messages. Further educated
guesses about the contents of one or both of the messages can be used to
statistically reduce the space of possible messages, and in some cases it is
possible to determine the exact contents.


http://www.isaac.cs.berkeley.edu/isaac/wep-faq.html
 is one of a hundred examples I can send you as to how to break WEP without
cracking the encryption.


-----Original Message-----
From: Alex Satrapa [mailto:grail at goldweb.com.au]
Sent: Monday, September 17, 2001 10:44 AM
To: Steven Hanley
Cc: wireless at lists.samba.org
Subject: [Long Rant] Re: Encryption Question


At 00:58 +1000 2001-09-11, Steven Hanley wrote:
>umm, okay, first off, the hardware encryption with wirelss cards is broken
and
>can not be relied on for any security at all. Anyone who wants to can rock
up
>with a standard laptop running linux and work out the key for the
encryption
>in about 15 minutes and thus have full access to all your data going across
>wireless.

First, sorry for the late reply.

Don't discount WEP so readily.

If you have a 128bit encryption card with encryption enabled, then 
the potential AirSnorter has to use a 128bit encryption card to sniff 
the connection.

WEP as an obfuscation mechanism works at least as well as ROT14* - 
someone who's geared up to AirSnort on a clear or 64bit connection is 
like the script kiddy with the ROT13 decoder. It makes it just that 
little bit harder for:
  - Casual or "accidental" snooping
  - Script Kiddies using "standard" cards (as opposed to "Gold")

Using WEP, especially with 128bit encryption, means that someone has 
to be monitoring your network with the intent of breaking in. Should 
you ever catch them physically (eg: you see the kid sitting out the 
front of the office with the laptop on the bike), it's much easier to 
prove intent. They were *trying* to break into your network. They 
weren't just WarDriving/Sailing/Riding.

I do agree with Steven on the VPN bit - the network connected to the 
wireless access point should be treated as *less* trusted than The 
Internet. Kids *are* going to be lugging their wireless laptops 
around on bikes, they *are* going to find your network. 802.11 
networks are the proverbial pots full of bragging rights at the end 
of the rainbow ("Mate - these people had access direct to the 
Internet over their wireless network, and guests had write access to 
their NT server, so I downloaded 1Gb of pr0n for them").

Have a host on that network that supports IPsec, PPPoE, PPTP or even 
PPP over SSH, and only allow "real" network access through this host. 
Do what you can to limit connections to the access point based on MAC 
address of the 802.11 cards (once again, this is obfuscation**). Do 
not allow routing between wired and wireless networks. Do not have 
any ports listening on the wireless network (except the VPN service). 
These are what I would consider part of setting up a wireless access 
point, even for "community" access.

But at least enable WEP and MAC restrictions, since you then arm 
yourself with proof of intent, should you ever catch someone snooping 
around your wireless network. WEP and MAC restrictions are much like 
putting a 30cm high picket fence between your front lawn and the 
footpath. It provides a barrier which people have to consciously 
cross. If you see someone snooping around in your wireless network 
after you've enabled WEP and MAC restrictions, they didn't get there 
by accident. You can get exercise your righteous indignance.

Alex

*Yes, I mean ROT14. Absolutely transparent to someone who knows what 
they're doing, but totally opaque to the script kiddy with the ROT13 
decoder. Of course the script kiddy with lots of money gets a ROT14 
decoder and you're back to square 1. And with that, I'll cease my 
analogy of 128bit WEP as ROT14.

**Security solely through obscurity is bad. That doesn't mean that 
you shouldn't use obscurity where it's cheap and effortless to 
implement. Obfuscation means that life is harder for script kiddies, 
and adds more ammo to your proof of intent argument.

PS: Don't forget that wireless security works both ways. It's not 
just the sitting-on-desks bit of the network you have to secure, it's 
also the sitting-on-lap bit of the network you have to secure. It's 
no use locking down the access point tighter than a fish's [thing] if 
the laptop is left wide open. The "firewall" on the laptop (or even 
wireless desktop) needs to be as tight (if not tighter) than the 
access point "firewall".

PPS: This opens up an activity which is the inverse of WarDriving. 
Rather than wandering around looking for networks that are open - how 
many people are wandering around with laptops that are happily 
chatting away on 802.11 to anyone who'll listen? I know some people 
who don't even know about turning off their PC Card ethernet when 
they leave the office, and I wouldn't expect them to understand about 
switching off the 802.11 card when they leave the office either.
-- 
Alex Satrapa                      tSA Consulting Group Pty Limited
ICQ: 5691434                 1 Hall Street, Lyneham, Canberra 2603
PGP Key 0x4C178C9C        fx: +61 2 6257 7311  ph: +61 2 6257 7111
PGP Fingerprint E4FA ADE6 97A4 3610 E008  A466 A03E 3D01 4C17 8C9C




More information about the wireless mailing list