Re: New Protection for 802.11

2002-11-07 Thread Nelson Minar
>Reading the Wifi report, it seems their customers stampeded them and
>demanded that the security hole be fixed, fixed a damned lot sooner
>than they intended to fix it.

Which is sort of a shame, in a way. 802.11b has no pretense of media
layer security. I've been thinking of that as an opportunity for folks
to get smarter about network and application layer security - PPTP,
IPSEC, proper authentication, etc. A lot of sites are putting their
wireless access points outside the firewall and doing VPNs and the
like to build secure links.

If WiFi gets reasonable media layer security soon, that pressure will
go away and we'll go back to media-based security. I think that's a
bad thing in the long run; you end up with systems that may be
somewhat secure at the gateway/firewall but are soft inside. 

 [EMAIL PROTECTED]
.   .  . ..   .  . . http://www.media.mit.edu/~nelson/

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]



RE: New Protection for 802.11

2002-11-07 Thread Trei, Peter
> James A. Donald[SMTP:[EMAIL PROTECTED]] wrote:
> 
> 
> Reading the Wifi report,
> http://www.weca.net/OpenSection/pdf/Wi-
> Fi_Protected_Access_Overview.pdf 
> it seems their customers stampeded them and demanded that the
> security hole be fixed, fixed a damned lot sooner than they
> intended to fix it.
> 
> I am struck the contrast between the seemingly strong demand 
> for wifi security, compared to the almost complete absence of 
> demand for email security.
> 
> Why is it so? 
> 
> --digsig
>  James A. Donald
> 
How many stories have you read in the last year about
non-LEOs stealing email?

How many stories in the last year have you read about
wardriving?

Further, tapping into 802.11b nets 

* gives the attacker access to your internal
  network. You already know what you're
  sending in email, and eavesdropping on 
  data you've already decided to send to someone
  else feels different than someone trolling through
  your file system without your knowledge.

* requires that the tapper be more or less
  nearby physically. This feels a lot
  different than worrying that a distant
  router is compromised.

Peter Trei



-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]



Re: New Protection for 802.11

2002-11-07 Thread thomas lakofski
David Wagner said:
> It's not clear to me if WPA products come with encryption turned on by
> default.  This is probably the #1 biggest source of vulnerabilities in
> practice, far bigger than the weaknesses of WEP.

Maybe this is the case in the USA but from my own informal surveys in
Helsinki and London I've found that 90% of private WLANs operate with WEP
enabled (FWIW).  Those with no WEP often appear to be deliberate,
indicated by 'welcoming' SSIDs.  Commercial WLAN operators also typically
choose to deploy with no WEP, controlling access via transparent proxying
or similar methods.

If WLAN systems were supplied supposedly 'secure' out of the box,
consumers might have even less interest in changing defaults.  Automated
key distribution at set-up time would likely introduce its own problems.

I'm fairly sure that J. Consumer connecting their home PC to DSL or cable
with no firewall typically expose themselves to greater risk than
deploying 802.11b with no WEP.

cheers,

-thomas

-- 
   Men of lofty genius when they are doing the
 least work are most active  -- da Vinci
gpg: pub 1024D/81FD4B43 sub 4096g/BB6D2B11=>p.nu/d
2B72 53DB 8104 2041 BDB4  F053 4AE5 01DF 81FD 4B43



-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]



Re: New Protection for 802.11

2002-11-07 Thread James A. Donald
--
Reading the Wifi report,
http://www.weca.net/OpenSection/pdf/Wi-
Fi_Protected_Access_Overview.pdf 
it seems their customers stampeded them and demanded that the
security hole be fixed, fixed a damned lot sooner than they
intended to fix it.

I am struck the contrast between the seemingly strong demand 
for wifi security, compared to the almost complete absence of 
demand for email security.

Why is it so? 

--digsig
 James A. Donald
 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
 IWe4JFeDeor04Pxb96ZsQ7xX+JAwxSs8HQfoAeG5
 4rQX6tgLhAvAwLjF+SXlRswSmphBhw4cOXLe9Y4r5


-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]



Re: New Protection for 802.11

2002-11-07 Thread Donald Eastlake 3rd
Well, you see some of the people working on improving 802.11 security,
in particular some members of 802.11 Task Group i noted that IEEE
procedures have no interoperability demonstration requirements. So they
formed a little group that took a subset of the then current 802.11i
draft and tried to implement it and interoperate. (Problems were found
and fixes feed back into the standards process.) The subset choosen,
called SSN, included the 802.1X authentication and anti-replay features
of 802.11i and the TKIP branch of 802.11i. SSN does not cover ad-hoc 
(station to station) mode, only station <-> access point.

(The current 802.11i draft has three branch,
TKIP (Temporal Key Ingegrity Protocol) for legacy hardware via
firmware/sofware upgrade that uses RC4, but with a different key for
every packet, plus a specially designed (for weak legacy hardware) keyed
message integrity code with about 22 bits of strength (optional)
WRAP (Wirelss Robust Authenticated Protocol) for new hardware
that uses AES in OCB mode for encryption and integrity (optional)
CCMP (CCM Protocol) for new hardware that uses AES in CCM mode,
that is, AES-CTR for encryption and AES-CBC-MAC for integrity.  
(mandatory)

There being a lot of pressure for improved security soon, the WiFi
Alliance essentiallly adopted SSN with some profiling as a security
certification standard and called this WiFi Protected Access (WPA) v1.
The plan is for full 802.11i to be called WiFi Protected Access v2.

Donald

On 6 Nov 2002, Perry E. Metzger wrote:

> Date: 06 Nov 2002 15:32:30 -0500
> From: Perry E. Metzger <[EMAIL PROTECTED]>
> To: [EMAIL PROTECTED]
> Subject: New Protection for 802.11
> 
> >From Dave Farber's Interesting People list.
> 
> Does anyone know details of the new proposed protocols?
==
 Donald E. Eastlake 3rd   [EMAIL PROTECTED]
 155 Beaver Street  +1-508-634-2066(h) +1-508-851-8280(w)
 Milford, MA 01757 USA   [EMAIL PROTECTED]




-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]



Re: New Protection for 802.11

2002-11-06 Thread Arnold G. Reinhold
See the following two Intel links with detailed discussions of TKIP 
and Michael which i found via Google:

Increasing Wireless Security with TKIP

Forwarded from: "eric wolbrom, CISSP", sa ISN-a...

http://www.secadministrator.com/Articles/Index.cfm?ArticleID=27064

Mark Joseph Edwards
October 23, 2002


For a more in-depth look at wireless encryption technology, especially
WEP and TKIP, be sure to read two articles from Intel. The first
article discusses encryption key management in both WEP and TKIP
protocols, and the second article discusses TKIP in considerable
detail.

--
http://cedar.intel.com/media/pdf/wireless/80211_1.pdf
http://cedar.intel.com/media/pdf/security/80211_part2.pdf


Gojko Vujovic
http://www.elitesecurity.org/




-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]



Re: New Protection for 802.11

2002-11-06 Thread David Wagner
Perry E. Metzger wrote:
>Does anyone know details of the new proposed protocols?

WPA seems to be TKIP (a short-term improvement to WEP) + 802.1x (user
authentication, typically hooked into RADIUS?).  The background is that
the IEEE 802.11i working group is developing two fixes to WEP: TKIP,
the short-term patch, and AES-CCMP, the long-term fix.  TKIP isn't
perfect but it seems to be quite reasonable.

As far as I know, WPA should fix the cryptographic attacks on WEP.
However, as far as I can tell, we may still be left with key management
and "turning on the crypto" as the two most important issues in practice.
(It's probably too soon to know for sure.)

Of course, if you don't upgrade your equipment, you don't get the benefits
of WPA.  However, it seems that the Wi-Fi consortium is claiming that in
some cases a software upgrade might be sufficient to get WPA support --
I'm not too clear on the details.

It's not clear to me if WPA products come with encryption turned on
by default.  This is probably the #1 biggest source of vulnerabilities
in practice, far bigger than the weaknesses of WEP.

For a little more, see
http://www.weca.net/OpenSection/ReleaseDisplay.asp?TID=4&ItemID=118&StrYear=2002&strmonth=10
http://www.weca.net/OpenSection/pdf/Wi-Fi_Protected_Access_Overview.pdf

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]



Re: New Protection for 802.11

2002-11-06 Thread William Arbaugh
It uses:

	-IEEE 802.1x for access control and authentication

	-RC4 but with a new key mixing/generation method called TKIP that 
provides for per 	packet keys and eliminates the Fluhrer et. al. 
attack. Russ Housely, Doug Whitting, and Nils Ferguson designed TKIP.

	-Michael is the MAC/MIC that provides 20 bits (yes 20 bits) of 
security. The reason they chose that is because older AP hardware can't 
do much more.  Nils Ferguson designed Michael. Michael MUST be used 
with detection methods to prevent integrity attacks. Hopefully, the 
vendors will do it correctly.

I'll try and dig up the documents that define each of this and post 
them somewhere.

Bill

On Wednesday, Nov 6, 2002, at 17:19 US/Eastern, David Honig wrote:

At 03:32 PM 11/6/02 -0500, Perry E. Metzger wrote:

Does anyone know details of the new proposed protocols?



Small article at:
http://www.eetimes.com/story/OEG20021031S0007

Somewhere I read a larger article; things that
stuck in memory are: No AES, a cipher called "Michael"
being used; also, the change is intended to be
a software-upgrade to existing devices, which
is why so many features were omitted.

There were also comments about legacy issues --you
have to upgrade everyone, so its likely that back-compatibility
will not completely obsolete wardriving.  Much like Microsoft's
OS-interop-legacy-security problems.

-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]



Re: New Protection for 802.11

2002-11-06 Thread David Honig
At 03:32 PM 11/6/02 -0500, Perry E. Metzger wrote:
>Does anyone know details of the new proposed protocols?



Small article at: 
http://www.eetimes.com/story/OEG20021031S0007

Somewhere I read a larger article; things that
stuck in memory are: No AES, a cipher called "Michael"
being used; also, the change is intended to be
a software-upgrade to existing devices, which
is why so many features were omitted.

There were also comments about legacy issues --you
have to upgrade everyone, so its likely that back-compatibility
will not completely obsolete wardriving.  Much like Microsoft's
OS-interop-legacy-security problems.






-
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]