mathy vanhoefpapers.mathyvanhoef.com/phdthesis-slides.pdf · public phd defense a security analysis...

51
Mathy Vanhoef Public PhD Defense A Security Analysis of the WPA- TKIP and TLS Security Protocols

Upload: others

Post on 14-Jul-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Mathy Vanhoefpapers.mathyvanhoef.com/phdthesis-slides.pdf · Public PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking

Mathy Vanhoef

Public PhD Defense

A Security Analysis of the WPA-TKIP and TLS Security Protocols

Page 2: Mathy Vanhoefpapers.mathyvanhoef.com/phdthesis-slides.pdf · Public PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking

Data handled by computers:

2

Banking details Emails Messaging

Adult websites Mobile devicesPrivate files

Page 3: Mathy Vanhoefpapers.mathyvanhoef.com/phdthesis-slides.pdf · Public PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking

Goal of dissertation

3

Is the transmission of this data properly protected?

Page 4: Mathy Vanhoefpapers.mathyvanhoef.com/phdthesis-slides.pdf · Public PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking

How is data transmitted?

4

Computer

Study security of network protocols used at:

1. Your wireless network

2. Your internet connection

ServerWireless

router

Page 5: Mathy Vanhoefpapers.mathyvanhoef.com/phdthesis-slides.pdf · Public PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking

How is data transmitted?

5

Computer

Study security of network protocols used at:

1. Your wireless network

2. Your internet connection

ServerWireless

router

Page 6: Mathy Vanhoefpapers.mathyvanhoef.com/phdthesis-slides.pdf · Public PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking

Wireless network security

6

Easy to intercept transmitted data

Computer

Wireless router

Solution: pick password and use encryption!

Page 7: Mathy Vanhoefpapers.mathyvanhoef.com/phdthesis-slides.pdf · Public PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking

Available cipher suites?

7

1999 2003 2004

WEP WPA-TKIP AES-CCMP

Page 8: Mathy Vanhoefpapers.mathyvanhoef.com/phdthesis-slides.pdf · Public PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking

Available cipher suites?

8

1999 2003 2004

WEP

Broken

WPA-TKIP

Acceptable

AES-CCMP

Secure

Page 9: Mathy Vanhoefpapers.mathyvanhoef.com/phdthesis-slides.pdf · Public PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking

Is WPA-TKIP still used?

Usage in 2013:

66% support TKIP

19% support only TKIP

9

Need more arguments to kill TKIP!

Page 10: Mathy Vanhoefpapers.mathyvanhoef.com/phdthesis-slides.pdf · Public PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking

Is WPA-TKIP still used?

Usage in 2016:

59% support TKIP

3% support only TKIP

10

Need more arguments to kill TKIP!

Page 11: Mathy Vanhoefpapers.mathyvanhoef.com/phdthesis-slides.pdf · Public PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking

Discovered new attacks

11

1. Efficient Denial of Service

2. Forge arbitrary packets to client

3. Decrypt traffic towards client

In 2016, 59% of networks

still are vulnerable!

Page 12: Mathy Vanhoefpapers.mathyvanhoef.com/phdthesis-slides.pdf · Public PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking

Impact of attack

12

Computer

Wireless

router

Website

2.2.2.2

Where is detijd.be?

unique address for

every computer

Page 13: Mathy Vanhoefpapers.mathyvanhoef.com/phdthesis-slides.pdf · Public PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking

Impact of attack

13

Computer

Wireless

router

Website

2.2.2.2

detijd.be is at 2.2.2.2

unique address for

every computer

Page 14: Mathy Vanhoefpapers.mathyvanhoef.com/phdthesis-slides.pdf · Public PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking

Impact of attack

14

Computer

Wireless

router

Website

2.2.2.2

Load detijd.be

Page 15: Mathy Vanhoefpapers.mathyvanhoef.com/phdthesis-slides.pdf · Public PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking

Impact of attack

15

Computer

Wireless

router

Attacker

4.4.4.4

Website

2.2.2.2

detijd.be is at 4.4.4.4

Load detijd.be

Page 16: Mathy Vanhoefpapers.mathyvanhoef.com/phdthesis-slides.pdf · Public PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking

Impact of attack

16

Computer

Wireless

router

Attacker

4.4.4.4

Website

2.2.2.2

detijd.be is at 4.4.4.4

Victim now contacts

attacker to load detijd.be

Load detijd.be

Page 17: Mathy Vanhoefpapers.mathyvanhoef.com/phdthesis-slides.pdf · Public PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking

Conclusion

17

Use only AES-CCMP!

Page 18: Mathy Vanhoefpapers.mathyvanhoef.com/phdthesis-slides.pdf · Public PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking

How is data transmitted?

18

Computer

Study security of network protocols used at:

1. Your wireless network

2. Your internet connection

ServerWireless

router

Page 19: Mathy Vanhoefpapers.mathyvanhoef.com/phdthesis-slides.pdf · Public PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking

Securing internet traffic

19

Websites can be secured using HTTPS

HTTPS is based on TLS

Internally TLS can use AES, RC4,…

Which one is widely used? Is it secure?

Page 20: Mathy Vanhoefpapers.mathyvanhoef.com/phdthesis-slides.pdf · Public PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking

Is RC4 still used?

20

50%

30%

13%

0%

10%

20%

30%

40%

50%

60%

March 2013 Februari 2015 July 2015

In 2013 half of all TLS connections used RC4

Page 21: Mathy Vanhoefpapers.mathyvanhoef.com/phdthesis-slides.pdf · Public PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking

RC4 encryption

21

Plaintext

Ciphertext

Keystream

RC4

Key Password123!

RC4

56, 0, 234, 102, 41, …

Page 22: Mathy Vanhoefpapers.mathyvanhoef.com/phdthesis-slides.pdf · Public PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking

RC4 encryption

22

Password123! RC4 56, 0, 234, 102, …

The numbers (keystream) should be random

Not the case for RC4 due to biases!

Page 23: Mathy Vanhoefpapers.mathyvanhoef.com/phdthesis-slides.pdf · Public PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking

RC4 encryption

23

Password123! RC4 56, 0, 234, 102, …

The numbers (keystream) should be random

Not the case for RC4 due to biases!

Page 24: Mathy Vanhoefpapers.mathyvanhoef.com/phdthesis-slides.pdf · Public PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking

Why is this bad?

24

Imagine only second keystream byte is used

When is zero is ‘rolled’, no encryption occurs

Most frequent ciphertextbyte is the real value

Page 25: Mathy Vanhoefpapers.mathyvanhoef.com/phdthesis-slides.pdf · Public PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking

25

Page 26: Mathy Vanhoefpapers.mathyvanhoef.com/phdthesis-slides.pdf · Public PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking

26

After encryption, image

is unrecognizable

Page 27: Mathy Vanhoefpapers.mathyvanhoef.com/phdthesis-slides.pdf · Public PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking

27

?

RC4 biases Most frequent

pixel value is the real value

Page 28: Mathy Vanhoefpapers.mathyvanhoef.com/phdthesis-slides.pdf · Public PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking

28

?

Replace all pixels in block

with most frequent value!

Page 29: Mathy Vanhoefpapers.mathyvanhoef.com/phdthesis-slides.pdf · Public PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking

29

Try to recover rough outline

using bigger blocks?

Page 30: Mathy Vanhoefpapers.mathyvanhoef.com/phdthesis-slides.pdf · Public PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking

30

Try to recover rough outline

using bigger blocks?

Page 31: Mathy Vanhoefpapers.mathyvanhoef.com/phdthesis-slides.pdf · Public PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking

31

Page 32: Mathy Vanhoefpapers.mathyvanhoef.com/phdthesis-slides.pdf · Public PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking

32

Page 33: Mathy Vanhoefpapers.mathyvanhoef.com/phdthesis-slides.pdf · Public PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking

33

Page 34: Mathy Vanhoefpapers.mathyvanhoef.com/phdthesis-slides.pdf · Public PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking

Capture multiple encryptions!

Combine with biases to recover all info:

How to recover details?

34

Page 35: Mathy Vanhoefpapers.mathyvanhoef.com/phdthesis-slides.pdf · Public PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking

35

Page 36: Mathy Vanhoefpapers.mathyvanhoef.com/phdthesis-slides.pdf · Public PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking

36

Page 37: Mathy Vanhoefpapers.mathyvanhoef.com/phdthesis-slides.pdf · Public PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking

37

Page 38: Mathy Vanhoefpapers.mathyvanhoef.com/phdthesis-slides.pdf · Public PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking

38

Page 39: Mathy Vanhoefpapers.mathyvanhoef.com/phdthesis-slides.pdf · Public PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking

39

Page 40: Mathy Vanhoefpapers.mathyvanhoef.com/phdthesis-slides.pdf · Public PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking

Capture multiple encryptions:

Combine with biases to recover all info:

How to recover details?

40

Page 41: Mathy Vanhoefpapers.mathyvanhoef.com/phdthesis-slides.pdf · Public PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking

Summary: abusing RC4 biases

41

EncryptionMultiple

EncryptionsUse Biases

Page 42: Mathy Vanhoefpapers.mathyvanhoef.com/phdthesis-slides.pdf · Public PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking

Our contributions

42

We improved these techniques by:

Also using other biases

Generating a list of plaintext candidates

Rapidly generating multiple encryptions

Using this we decrypt a HTTPS cookie.

Page 43: Mathy Vanhoefpapers.mathyvanhoef.com/phdthesis-slides.pdf · Public PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking

Cookies are unique identifiers

43

Cookie Identity

ae637f8c5 Mathy

… …

Get newsfeed

Cookie: ae637f8c5

Browser Facebook

Page 44: Mathy Vanhoefpapers.mathyvanhoef.com/phdthesis-slides.pdf · Public PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking

Cookies are unique identifiers

44

Cookie Identity

ae637f8c5 Mathy

… …

Get newsfeed

Cookie: ae637f8c5

Return newsfeed of

Mathy Vanhoef

Browser Facebook

Page 45: Mathy Vanhoefpapers.mathyvanhoef.com/phdthesis-slides.pdf · Public PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking

Cookies are unique identifiers

45

Cookie Identity

ae637f8c5 Mathy

… …

Get newsfeed

Cookie: ae637f8c5

Return newsfeed of

Mathy Vanhoef

Browser Facebook

Included in

all requests

Page 46: Mathy Vanhoefpapers.mathyvanhoef.com/phdthesis-slides.pdf · Public PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking

Decrypting the cookie

46

Browser Facebook Attacker

Cookie:

ae637f8c5

Generate many requests, use biases to recover the cookie!

……

Cookie: …

Cookie: …

Cookie: …

Page 47: Mathy Vanhoefpapers.mathyvanhoef.com/phdthesis-slides.pdf · Public PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking

Decrypting 16-character cookie

47

Need one billion encryptions of cookie

Ciphertext copies times 227

Page 48: Mathy Vanhoefpapers.mathyvanhoef.com/phdthesis-slides.pdf · Public PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking

Decrypting 16-character cookie

48

Need one billion encryptions of cookie

Takes 75 hours with 4450 requests /

second

Ciphertext copies times 227

Page 49: Mathy Vanhoefpapers.mathyvanhoef.com/phdthesis-slides.pdf · Public PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking

Practical impact

49

In response, browsers disabled RC4:

Chrome: dropped support in v48 (20 Jan. 2016)

Firefox: dropped support in v44 (26 Jan. 2016)

IE11: supports RC4

Edge: supports RC4

“will be disabled in forthcoming update”

Page 50: Mathy Vanhoefpapers.mathyvanhoef.com/phdthesis-slides.pdf · Public PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking

Decrypting Cookies

50

Page 51: Mathy Vanhoefpapers.mathyvanhoef.com/phdthesis-slides.pdf · Public PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking

Questions?