Re: Sniffing on WPA

From: Eduardo Espina (eduardomx@gmail.com)
Date: Mon Nov 07 2005 - 12:56:01 EST


> > The point is, it would be ALMOST the same thing to have a universal
> > key for all the wireless clients (like in WEP) than the per-user
> > key used in WPA when it comes to confidentiality. Obviously, as long
> > as you can do ARP cache poisoning.
>
> I totally disagree. 802.11 is a physical/link layer protocol and WPA is
> there to secure it. You can use plenty of other protocols than IP over
> it, including ones that do not require ARP.
> My point is ARP cache poisoning being a specific upper layer protocol,
> it's out of layer 2 mecanisms to take care of it.

As I noted before, as long as you can do ARP cache poisoning, I'm not
talking about other protocols.

You just have to see what you get after a break-in. If you break WEP
you get sniffing capabilities, if you break WPA you get sniffing
capabilities (ARP cache poisoning required).

Yes, it's out of WPA's scope, I don't blame WPA for that, but the
problem it's still there. Then, all wireless users should be aware
that WPA with ARP-included protocols does not differ much from a
hotspot (talking about confidentiality) and that users shouldn't feel
so secure because they are on WPA.

> And by the way, this is not quite a news. A lot of people that gave
> talks about layer 2 attacks and ARP cache poisoning in particular
> mentionned the fact. Some of my talks that come in mind:
>
> http://sid.rstack.org/pres/0207_LSM02_ARP.pdf
> http://sid.rstack.org/pres/0305_ESIEA_LANAttacks.pdf

As I wrote, I don't remember a discussion on this topic here.
Yes, it's not "fresh news", but today it's a problem more than ever.
It would be interesting to see how new generation switch-based
networks handle this. (aruba, cisco-airespace, etc.)
In SOHO networks the impact is limited to users associated to the same
AP. Would centralized switched networks (aruba, cisco, etc) attack be
limited to the same AP?

Greets,
Eduardo.

--
Eduardo Espina Garcia <eespina@seguridad.unam.mx>
Departamento de Seguridad en Computo - UNAM-CERT DGSCA, UNAM
http://www.seguridad.unam.mx  Tel.: 5622-8169  Fax: 5622-8043
GPG Key Fingerprint: "8E86 932F C364 03BE 39B8  3F9D D27E 438A 3C6A 750F"
"No matter how hard you try to keep your secret, it's a universal
law that sooner or later it will be discovered."
------------------------------------------------------------------------------
Audit your website security with Acunetix Web Vulnerability Scanner: 
Hackers are concentrating their efforts on attacking applications on your 
website. Up to 75% of cyber attacks are launched on shopping carts, forms, 
login pages, dynamic content etc. Firewalls, SSL and locked-down servers are 
futile against web application hacking. Check your website for vulnerabilities 
to SQL injection, Cross site scripting and other web attacks before hackers do! 
Download Trial at:
http://www.securityfocus.com/sponsor/pen-test_050831
-------------------------------------------------------------------------------


This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:55:08 EDT