{"id":1074,"date":"2009-08-28T22:00:41","date_gmt":"2009-08-29T02:00:41","guid":{"rendered":"http:\/\/rbach.net\/blog\/?p=1074"},"modified":"2022-12-30T12:16:24","modified_gmt":"2022-12-30T17:16:24","slug":"wpa-gone-in-60-seconds","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/wpa-gone-in-60-seconds\/","title":{"rendered":"WPA Gone in 60 Seconds"},"content":{"rendered":"<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-103880 size-thumbnail\" title=\"WPA Gone in 60 Seconds\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/security_breach-e1568151001436-45x75.jpg?resize=45%2C75&#038;ssl=1\" alt=\"WPA Gone in 60 Seconds\" width=\"45\" height=\"75\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/security_breach-e1568151001436.jpg?resize=45%2C75&amp;ssl=1 45w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/security_breach-e1568151001436.jpg?resize=90%2C150&amp;ssl=1 90w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/security_breach-e1568151001436.jpg?w=200&amp;ssl=1 200w\" sizes=\"auto, (max-width: 45px) 100vw, 45px\" \/>Japanese researchers have identified a WPA hack that could give hackers a way to read encrypted Wi-Fi traffic\u00a0 in less than 1 minute. Toshihiro Ohigashi (<a href=\"http:\/\/www.hiroshima-u.ac.jp\/index.html\" target=\"_blank\" rel=\"noopener noreferrer\">Hiroshima University<\/a>) and Masakatu Morii (<a href=\"http:\/\/www.kobe-u.ac.jp\/en\/\" target=\"_blank\" rel=\"noopener noreferrer\">Kobe University<\/a>) presented a way to break the WPA (<a href=\"http:\/\/en.wikipedia.org\/wiki\/Wi-Fi_Protected_Access\" target=\"_blank\" rel=\"noopener noreferrer\">Wi-Fi Protected Access<\/a>) encryption system at the Joint Workshop on Information Security. The researchers outlined their work in a paper called &#8220;A Practical Message Falsication Attack on WPA&#8221; on August 7, 2009.<\/p>\n<p><a href=\"http:\/\/www.wi-fi.org\/\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"size-thumbnail wp-image-103885 alignright\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/wifi_icon.jpg?resize=75%2C47&#038;ssl=1\" alt=\"\" width=\"75\" height=\"47\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/wifi_icon.jpg?resize=75%2C47&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/wifi_icon.jpg?w=124&amp;ssl=1 124w\" sizes=\"auto, (max-width: 75px) 100vw, 75px\" \/><\/a>The new attack builds on 2008 research from <span id=\"intelliTxt\"><a title=\"Technische Universit\u00e4t Darmstadt\" href=\"http:\/\/maps.google.com\/maps?ll=49.874995,8.656517&amp;spn=0.01,0.01&amp;q=49.874995,8.656517 (Technische%20Universit%C3%A4t%20Darmstadt)&amp;t=h\" target=\"_blank\" rel=\"geolocation nofollow noopener noreferrer\">Darmstadt University of Technology<\/a> graduate <\/span>students Martin Beck and Erik Tews who proved that WPA Temporal Key Integrity Protocol (<a href=\"http:\/\/en.wikipedia.org\/wiki\/Temporal_Key_Integrity_Protocol#Background\" target=\"_blank\" rel=\"noopener noreferrer\">TKIP<\/a>) could be attacked. The <a href=\"http:\/\/en.wikipedia.org\/wiki\/Temporal_Key_Integrity_Protocol#Beck-Tews_attack\" target=\"_blank\" rel=\"noopener noreferrer\">Beck-Tews attack<\/a> only worked on short packets in a WPA implementation that supported 802.11 quality of service (QOS) features and took between 12 and 15 minutes to work.<\/p>\n<p>The new threat uses &#8220;man in the middle&#8221; (<a href=\"http:\/\/searchnetworking.techtarget.com\/generic\/0,295582,sid7_gci1050371,00.html#security80211-CHP-2-FIG-4\" target=\"_blank\" rel=\"noopener noreferrer\">MITM<\/a>) attacks on WPA TKIP systems. The MITM attack uses the <a href=\"http:\/\/www.informit.com\/guides\/content.aspx?g=security&amp;seqNum=196\" target=\"_blank\" rel=\"noopener noreferrer\">&#8220;chopchop&#8221; attack<\/a> on a short packet (like ARP broadcasts), decipher its 64-bit Message Integrity Code (MIC), and can then craft whatever packet it wants. The new packet is coded with the proper checksums and passed along to the access point, which should accept it as genuine. Dragos Ruiu, organizer of the PacSec security conference where the first WPA hack was demonstrated told <em>IDGNews<\/em>, &#8220;They took this stuff which was fairly theoretical and they&#8217;ve made it much more practical.&#8221;<\/p>\n<p>Both attacks work only on WPA systems that use the TKIP algorithm. The new attack does not work on newer WPA2 devices or on WPA systems that use the stronger <a href=\"http:\/\/en.wikipedia.org\/wiki\/Advanced_Encryption_Standard\" target=\"_blank\" rel=\"noopener noreferrer\">Advanced Encryption Standard<\/a> (AES) algorithm. Kelly Davis-Felner, marketing director with the <a href=\"http:\/\/www.wi-fi.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">Wi-Fi Alliance<\/a>, said that people should now use WPA2. She told <em>IDGNews<\/em>, WPA with TKIP &#8220;<em>was developed as kind of an interim encryption method as Wi-Fi security was evolving several years ago<\/em>.&#8221;<\/p>\n<p>Enterprise Wi-Fi networks typically include security software that would detect the type of man-in-the-middle attack described by the Japanese researchers, Robert Graham, CEO of Errata Security told <em><a href=\"http:\/\/arstechnica.com\/tech-policy\/news\/2009\/08\/one-minute-wifi-crack-puts-further-pressure-on-wpa.ars\" target=\"_blank\" rel=\"noopener noreferrer\">ars technica<\/a><\/em>. He continues, the development of the first really practical attack against WPA should give people a reason to dump WPA with TKIP, he said. &#8220;It&#8217;s not as bad as WEP, but it&#8217;s also certainly bad.&#8221;<\/p>\n<p><em><strong>rb-<\/strong><\/em><\/p>\n<p><em>This is only an issue if the WLAN is secured at all.\u00a0 <a href=\"http:\/\/www.motorola.com\/us\" target=\"_blank\" rel=\"noopener noreferrer\">Motorola<\/a> published a <a href=\"http:\/\/www.computerweekly.com\/Articles\/2009\/03\/27\/235445\/companies-neglect-wi-fi-network-security.htm\" target=\"_blank\" rel=\"noopener noreferrer\">report<\/a> in April 2009\u00a0 that says 64% of companies are neglecting WLAN security. The report claims that only 47% of companies are using Wired Equivalent Privacy (WEP) or Wi-Fi Protected Access (WPA) encryption on their wireless networks.<\/em><\/p>\n<p><em>These attacks highlight the weaknesses of TKIP-based WLAN encryption. WPA TKIP was developed to fix the worst of the security holes in the first Wi-Fi encryption protocol, WEP. WI-Fi-certified products have had to support WPA2 since March 2006 . Users should move to AES-CCMP which requires WPA2 Personal for home and small office networks or WPA2 Enterprise for larger networks. <\/em><\/p>\n<p><em>Using AES-CCMP may require that some network equipment installed before 2003 be reviewed as AES supports key lengths up to 256 bits, which may not be compatible with older hardware. Any remaining equipm<\/em><em>ent of this vintage may need to be upgraded to newer Wi-Fi adapters, switched to Ethernet only, or retired. WPA2 has not shown any vulnerabilities to date. There is no real good reason to try to secure your WLAN with WPA-TKIP anymore.<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The threat uses MITM attacks on WPA TKIP systems it uses the chopchop attack on a short packet then crafts a new packet and passes it to the AP<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,3],"tags":[3216,1851,825,67,76,2450,15,4,1724,1842,579,25,1843,3009],"class_list":["post-1074","post","type-post","status-publish","format-standard","hentry","category-security","category-wi-fi","tag-3216","tag-802-11l","tag-aes","tag-hack","tag-ieee","tag-mitm","tag-networking","tag-security","tag-tkip","tag-wep","tag-wi-fi-2","tag-wireless","tag-wpa","tag-wpa-2"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/1074","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=1074"}],"version-history":[{"count":2,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/1074\/revisions"}],"predecessor-version":[{"id":119212,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/1074\/revisions\/119212"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=1074"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=1074"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=1074"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}