Re: LEAP Security Vulnerabilities??

2002-06-15 Thread Steven M. Bellovin


In message [EMAIL PROTECTED], Richard A Steenberge
n writes:

On Thu, Jun 13, 2002 at 02:34:29PM -0500, Stephen Sprunk wrote:
 
 WEP's only real failure was the failure to specify keying; vendors (and
 users) with less security experience interpreted this to mean static
 keys were sufficient.

 The choice of RC4 was unfortunate given the above problem, but the
 coming switch to AES should fix that.

Most existing wireless APs cannot keep up with 802.11b doing RC4 (which is
EXTREMELY light on the cpu) at line rate. 

RC4 if used properly is light-weight.  802.11 is employing it in an 
unnatural environment, and that causes trouble, including performance 
issues.

More specifically -- RC4 is a stream cipher, which means that it must 
be employed over a reliable underlying data stream.  It's perfect above 
TCP, for example.  But 802.11 is a packet environment, with no 
underlying stream.  Accordingly, the base RC4 key -- 40 bits or 112 
bits -- is combined with a 24-bit number (sometimes a counter, 
sometimes random, but in either case sent in the clear in the packet) 
to form an actual RC4 key that's used to encrypt just a single packet.  
The problem is that key setup is roughly as expensive as encrypting 300 
bytes or thereabouts.  So all those 40-byte TCP ACK packets are a lot 
more expensive for crypto processing than they should be.

--Steve Bellovin, http://www.research.att.com/~smb (me)
http://www.wilyhacker.com (Firewalls book)





LEAP Security Vulnerabilities??

2002-06-13 Thread Hyska, Jason [JJCUS]
Title: LEAP Security Vulnerabilities??






I am well aware of the many security vulnerabilities that exist on wireless networks as well as the inadequacies of WEP. I was curious if anyone has had any experiences with Cisco's LEAP authentication protocol? I have scoured the net for reviews or documents examining any potential vulnerabilities, but have not been able to find any. Any and all help or information would be appreciated.


Thanks in advance,
Jason Hyska
Worldwide Information Security
Johnson  Johnson
[EMAIL PROTECTED]






RE: LEAP Security Vulnerabilities??

2002-06-13 Thread Rowland, Alan D
Title: LEAP Security Vulnerabilities??



If 
you're serious enough about security to find 128 WEP inadequate, I would think 
you would be doing some sort of VPN or other SSL solution anyway, making WEP 
redundant. Or am I missing something?

Best,

-Al 
Rowland

  -Original Message-From: Hyska, Jason [JJCUS] 
  [mailto:[EMAIL PROTECTED]]Sent: Thursday, June 13, 2002 10:15 
  AMTo: [EMAIL PROTECTED]Subject: LEAP Security 
  Vulnerabilities??
  I am well aware of the many security vulnerabilities that 
  exist on wireless networks as well as the inadequacies of WEP. I was 
  curious if anyone has had any experiences with Cisco's LEAP authentication 
  protocol? I have scoured the net for reviews or documents examining any 
  potential vulnerabilities, but have not been able to find any. Any and 
  all help or information would be appreciated.
   Thanks in advance, Jason Hyska Worldwide Information 
  Security Johnson  Johnson [EMAIL PROTECTED]  



Re: LEAP Security Vulnerabilities??

2002-06-13 Thread Stephen Sprunk


Thus spake Hyska, Jason [JJCUS] [EMAIL PROTECTED]
 I am well aware of the many security vulnerabilities that exist
 on wireless networks as well as the inadequacies of WEP.

WEP's only real failure was the failure to specify keying; vendors (and users)
with less security experience interpreted this to mean static keys were
sufficient.

The choice of RC4 was unfortunate given the above problem, but the coming switch
to AES should fix that.

 I was curious if anyone has had any experiences with Cisco's
 LEAP authentication protocol?  I have scoured the net for
 reviews or documents examining any potential vulnerabilities,
 but have not been able to find any.  Any and all help or
 information would be appreciated.

LEAP itself is unlikely to present problems, as it's just a means to verify
802.1x credentials and force key rotation.  I'd be much more wary of potential
problems in 802.1x itself, since that's the over-the-air portion.

S




Re: LEAP Security Vulnerabilities??

2002-06-13 Thread Richard A Steenbergen


On Thu, Jun 13, 2002 at 02:34:29PM -0500, Stephen Sprunk wrote:
 
 WEP's only real failure was the failure to specify keying; vendors (and
 users) with less security experience interpreted this to mean static
 keys were sufficient.

 The choice of RC4 was unfortunate given the above problem, but the
 coming switch to AES should fix that.

Most existing wireless APs cannot keep up with 802.11b doing RC4 (which is
EXTREMELY light on the cpu) at line rate. I'm afraid to see what they
consider acceptable for AES, anything done as a firmware upgrade is going
to be quite limiting. At least for 802.11a I believe they're doing better.

-- 
Richard A Steenbergen [EMAIL PROTECTED]   http://www.e-gerbil.net/ras
PGP Key ID: 0x138EA177  (67 29 D7 BC E8 18 3E DA  B2 46 B3 D8 14 36 FE B6)



Re: LEAP Security Vulnerabilities??

2002-06-13 Thread Stephen Sprunk


Thus spake Richard A Steenbergen [EMAIL PROTECTED]
 On Thu, Jun 13, 2002 at 02:34:29PM -0500, Stephen Sprunk wrote:
  The choice of RC4 was unfortunate given the above problem,
  but the coming switch to AES should fix that.

 Most existing wireless APs cannot keep up with 802.11b doing
 RC4 (which is EXTREMELY light on the cpu) at line rate.   I'm
 afraid to see what they consider acceptable for AES, anything
 done as a firmware upgrade is going to be quite limiting. At least
 for 802.11a I believe they're doing better.

Most vendors chose to do their RC4 encryption in software and consequently can't
do more than 1-2mb/s -- caveat emptor.  That's hardly a failing of the 802.11
WG; at least one vendor can do RC4 (and soon AES) at wire rate.

You can have it good, fast, or cheap -- pick two.

S