39
#ArubaAirheads Wireless Security WPA3 14 November 2018, Utrecht

Airheads Meetup WPA3-20181114-share...#ArubaAirheads 4 –WPA2 is past retirement (beyond a senior citizen in Internet years) Released over 10 years ago! WPA2-personal was ‘broken

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Airheads Meetup WPA3-20181114-share...#ArubaAirheads 4 –WPA2 is past retirement (beyond a senior citizen in Internet years) Released over 10 years ago! WPA2-personal was ‘broken

#ArubaAirheads

Wireless SecurityWPA3

14 November 2018, Utrecht

Page 2: Airheads Meetup WPA3-20181114-share...#ArubaAirheads 4 –WPA2 is past retirement (beyond a senior citizen in Internet years) Released over 10 years ago! WPA2-personal was ‘broken

2#ArubaAirheads

Disclaimer

HPE Confidential—For Illustrative Purposes Only—Subject to Local Law

This presentation contains forward looking statements regarding future operations, product development, product capabilities, and availability dates. This information is subject to substantial uncertainties and is subject to change at any time without prior notification. Statements contained in this document concerning these matters only reflect HPE’s predictions and/or expectations as of the date of this document, and actual results and future plans of HPE may differ significantly as a result of, among other things, changes in product strategy resulting from technological, internal corporate, market, and other changes. This is not a commitment to deliver any material, code, or functionality and should not be relied upon in making purchasing decisions. This document is for informational purposes only; HPE makes no warranties, express or implied, in this document.

Page 3: Airheads Meetup WPA3-20181114-share...#ArubaAirheads 4 –WPA2 is past retirement (beyond a senior citizen in Internet years) Released over 10 years ago! WPA2-personal was ‘broken

3#ArubaAirheads

AgendaProblems with WPA2 and open networks

Wi-Fi Alliance: OWEWi-Fi Alliance: WPA3

Page 4: Airheads Meetup WPA3-20181114-share...#ArubaAirheads 4 –WPA2 is past retirement (beyond a senior citizen in Internet years) Released over 10 years ago! WPA2-personal was ‘broken

4#ArubaAirheads

–WPA2 is past retirement (beyond a senior citizen in Internet years)⎻ Released over 10 years ago!⎻WPA2-personal was ‘broken on arrival’ and every couple years someone “rediscovers”

off-line dictionary attacks and releases a much hyped paper⎻WPA2-enterprise is still solid security-wise, but can be used in ways that lessen its

overall security and makes it more complicated to provision⎻Many shortcomings only become apparent after a few years

WHY WI-FI SECURITY NEEDS AN UPGRADE

Page 5: Airheads Meetup WPA3-20181114-share...#ArubaAirheads 4 –WPA2 is past retirement (beyond a senior citizen in Internet years) Released over 10 years ago! WPA2-personal was ‘broken

5#ArubaAirheads

–There are use cases for which WPA2 is ill-suited⎯Captive portals for guest or BYOD onboarding use Open SSIDs⎯Coffee shops use WPA2-PSK with a shared and public PSK⎯Enterprises, banks, schools, hospitals use WPA2-PSK for IoT (or people!)⎯Hotspots have no way of offering server-side (infrastructure) only authentication

WI-FI SECURITY NEEDS AN UPGRADE

Page 6: Airheads Meetup WPA3-20181114-share...#ArubaAirheads 4 –WPA2 is past retirement (beyond a senior citizen in Internet years) Released over 10 years ago! WPA2-personal was ‘broken

6

Page 7: Airheads Meetup WPA3-20181114-share...#ArubaAirheads 4 –WPA2 is past retirement (beyond a senior citizen in Internet years) Released over 10 years ago! WPA2-personal was ‘broken

7

Page 8: Airheads Meetup WPA3-20181114-share...#ArubaAirheads 4 –WPA2 is past retirement (beyond a senior citizen in Internet years) Released over 10 years ago! WPA2-personal was ‘broken

8#ArubaAirheads

Page 9: Airheads Meetup WPA3-20181114-share...#ArubaAirheads 4 –WPA2 is past retirement (beyond a senior citizen in Internet years) Released over 10 years ago! WPA2-personal was ‘broken

9#ArubaAirheads

–Two new Wi-Fi Alliance certifications–Open is replaced by OWE – Opportunistic Wireless Encryption⎯ Problem: all wireless traffic is passed in the clear⎯ Solution: all wireless traffic gets encrypted⎯ However, OWE is an optional part for WPA3 certification

–WPA2-PSK mode is replaced by WPA3-SAE – Simultaneous Authentication of Equals⎯ Problem: passive attack results in off-line dictionary attack to discover PSK⎯ Solution: protocol is resistant to active, passive, and dictionary attack

WPA3 & ENHANCED OPEN: WHAT ARE THEY?

Page 10: Airheads Meetup WPA3-20181114-share...#ArubaAirheads 4 –WPA2 is past retirement (beyond a senior citizen in Internet years) Released over 10 years ago! WPA2-personal was ‘broken

10#ArubaAirheads

–WPA3–Enterprise now with Suite B/CNSA grade ciphers⎯Problem: mix-and-match nature of WPA2-Enterprise can result is less-than-

optimal security⎯Solution: create a cipher suite and a set of rules to ensure consistent primitive

security

–Enhancements to certification testing⎯ Too many WPA2-Enterprise certified devices did not properly check cert chains⎯Management frame protection, optional for WPA2, is mandatory for WPA3

WPA3 ENTERPRISE & TESTING

Page 11: Airheads Meetup WPA3-20181114-share...#ArubaAirheads 4 –WPA2 is past retirement (beyond a senior citizen in Internet years) Released over 10 years ago! WPA2-personal was ‘broken

11#ArubaAirheads

–Opportunistic Wireless Encryption (RFC 8110) –OWE performs an unauthenticated Diffie-Hellman at association time⎯Associate Request and Response exchange ephemeral (short living) keys via Diffie-Hellman⎯STA and AP calculate a unique PMK as a result of association⎯PMK is used in 4-way handshake post association to generate traffic encryption keys

ENHANCED OPEN: NO MORE CLEARTEXT

Page 12: Airheads Meetup WPA3-20181114-share...#ArubaAirheads 4 –WPA2 is past retirement (beyond a senior citizen in Internet years) Released over 10 years ago! WPA2-personal was ‘broken

12#ArubaAirheads

Alice (STA) Bob (AP)x ß random private keyX = public key = x * G

y ß random private keyY = public key = y * G

z = F(DH(y,X))PMK = HKDF(z, label)

z = F(DH(x,Y))PMK = HKDF(z, label)

4 Way HandshakePMK+Anonce+Snonce PMK+Anonce+Snonce

Traffic Keys Traffic KeysGCMP/CCMP-protected

data data

OWE PROTOCOL FLOW

Page 13: Airheads Meetup WPA3-20181114-share...#ArubaAirheads 4 –WPA2 is past retirement (beyond a senior citizen in Internet years) Released over 10 years ago! WPA2-personal was ‘broken

13#ArubaAirheads

From RFC 8110

+------------+----------+------------+------------------------+ | Element ID | Length | Element ID | element-specific | | | | Extension | data | +------------+----------+------------+---------+--------------+ | 255 | variable | 32 | group | public key | +------------+----------+------------+---------+--------------+

Once the client and AP have finished 802.11 association, they then complete the Diffie-Hellman key exchange and create a Pairwise Master Key (PMK) and its associated identifier, PMKID [IEEE802.11]. Given a private key x and the peer's (AP's if client, client's if AP) public key Y, the following are generated:

z = F(DH(x, Y))

prk = HKDF-extract(C | A | group, z)

PMK = HKDF-expand(prk, "OWE Key Generation", n)

Page 14: Airheads Meetup WPA3-20181114-share...#ArubaAirheads 4 –WPA2 is past retirement (beyond a senior citizen in Internet years) Released over 10 years ago! WPA2-personal was ‘broken

14#ArubaAirheads

Frame capture with Wireshark*: OWE

* Wireshark 2.9.0 beta for WPA3/OWE attributes

AKM: 18 = OWE

Page 15: Airheads Meetup WPA3-20181114-share...#ArubaAirheads 4 –WPA2 is past retirement (beyond a senior citizen in Internet years) Released over 10 years ago! WPA2-personal was ‘broken

15#ArubaAirheads

–Opportunistic Wireless Encryption (RFC 8110) –Completely transparent to users & admins – looks just like Open, no

provisioning–Unauthenticated, isn’t that insecure?⎯Strictly speaking yes, there are no assurances regarding who is connecting to what⎯But it’s more secure than a shared and public PSK in a coffee shop!

–Use cases:⎯Coffee shops, bars, anywhere that encryption is needed but authentication is not⎯Captive portals which throw away keys from HTTPS and then do Open 802.11

–Backward compatible via “Transition Mode”

ENHANCED OPEN: NO MORE CLEARTEXT

Page 16: Airheads Meetup WPA3-20181114-share...#ArubaAirheads 4 –WPA2 is past retirement (beyond a senior citizen in Internet years) Released over 10 years ago! WPA2-personal was ‘broken

16#ArubaAirheads

– Advertisement and Discovery– Administrator configures a single open SSID and virtual AP– AP automatically creates two BSSes with separate beacons

– BSS1 = Normal “Open” network for non-OWE stations. New IE to indicate BSS2.– BSS2 = Hidden OWE RSN with AKM=18. New IE to indicate BSS1.

– OWE STA does active or passive scanning to discover OWE-capable AP via RSN IE– Authentication and Association

– 802.11 “Open” Authentication– Diffie-Hellman Parameter element added to Association Request/Response– STA and AP derive a PMK (that is truly pairwise, unique, and unknowable by a third party) from ephemeral

private key and other party’s public key– Post-Association

– STA and AP perform 4-way Handshake to derive Traffic Encryption Keys– Mobility

– Supports PMK caching

HOW DOES OWE TRANSITION MODE WORK?

Page 17: Airheads Meetup WPA3-20181114-share...#ArubaAirheads 4 –WPA2 is past retirement (beyond a senior citizen in Internet years) Released over 10 years ago! WPA2-personal was ‘broken

17#ArubaAirheads

Frame capture with Wireshark*: OWE Transition Mode (Open...)

* Wireshark 2.9.0 beta for WPA3/OWE attributes

Page 18: Airheads Meetup WPA3-20181114-share...#ArubaAirheads 4 –WPA2 is past retirement (beyond a senior citizen in Internet years) Released over 10 years ago! WPA2-personal was ‘broken

18#ArubaAirheads

Frame capture with Wireshark*: OWE Transition Mode (+hidden)

* Wireshark 2.9.0 beta for WPA3/OWE attributes

Page 19: Airheads Meetup WPA3-20181114-share...#ArubaAirheads 4 –WPA2 is past retirement (beyond a senior citizen in Internet years) Released over 10 years ago! WPA2-personal was ‘broken

19#ArubaAirheads

OWE Association request contains Diffie-Hellman Parameter

Page 20: Airheads Meetup WPA3-20181114-share...#ArubaAirheads 4 –WPA2 is past retirement (beyond a senior citizen in Internet years) Released over 10 years ago! WPA2-personal was ‘broken

20#ArubaAirheads

OWE Association response contains Diffie-Hellman Parameter

Page 21: Airheads Meetup WPA3-20181114-share...#ArubaAirheads 4 –WPA2 is past retirement (beyond a senior citizen in Internet years) Released over 10 years ago! WPA2-personal was ‘broken

21#ArubaAirheads

OWE Then the 4-way handshake

Page 22: Airheads Meetup WPA3-20181114-share...#ArubaAirheads 4 –WPA2 is past retirement (beyond a senior citizen in Internet years) Released over 10 years ago! WPA2-personal was ‘broken

22#ArubaAirheads

OWE Data Encrypted

Page 23: Airheads Meetup WPA3-20181114-share...#ArubaAirheads 4 –WPA2 is past retirement (beyond a senior citizen in Internet years) Released over 10 years ago! WPA2-personal was ‘broken

23#ArubaAirheads

–Problem with WPA2-PSK: off-line dictionary attack⎯Susceptible to passive attack: adversary records 4-way handshake⎯Runs through all possible passwords –up to 400,000 per second– to find right one

–WPA2-PSK is replaced by SAE (802.11-2016, section 12.4)⎯Originally intended for mesh security (802.11s)⎯Password-based authentication based on Dragonfly key exchange (RFC 7664)⎯Resistant to active, passive, and dictionary attack

WPA3-PERSONAL: STRONG SECURITY FROM WEAK PASSWORDS

Page 24: Airheads Meetup WPA3-20181114-share...#ArubaAirheads 4 –WPA2 is past retirement (beyond a senior citizen in Internet years) Released over 10 years ago! WPA2-personal was ‘broken

24#ArubaAirheads

WPA2-Personal: The dictionary attack problem

Source: Wikipedia IEEE 802.11i-2004CWSP Study Guide, 2nd Edition

PSK = PBKDF2(PassPhrase, ssid, ssidLength, 4096, 256)PMK = PSKPTK = PRF (PMK + ANonce + SNonce + Authenicator MAC + Supplicant MAC)

4-Way handshakeMIC=Message Integrity Code (Signature)

Page 25: Airheads Meetup WPA3-20181114-share...#ArubaAirheads 4 –WPA2 is past retirement (beyond a senior citizen in Internet years) Released over 10 years ago! WPA2-personal was ‘broken

25#ArubaAirheads

WPA2-Personal: The dictionary attack problem

Source: Wikipedia IEEE 802.11i-2004CWSP Study Guide, 2nd Edition

PSK = PBKDF2(PassPhrase, ssid, ssidLength, 4096, 256)PMK = PSKPTK = PRF (PMK + ANonce + SNonce + Authenicator MAC + Supplicant MAC)

4-Way handshakeMIC=Message Integrity Code (Signature)

Brute force the PassPhrase toget the correct MIC:

Page 26: Airheads Meetup WPA3-20181114-share...#ArubaAirheads 4 –WPA2 is past retirement (beyond a senior citizen in Internet years) Released over 10 years ago! WPA2-personal was ‘broken

26#ArubaAirheads

–SAE uses new 802.11 authentication frames⎯Authentication generates a PMK, association indicates the PMKID⎯Post-association 4-way handshake generates traffic encryption keys

–SAE provisioning is identical to WPA2-PSK⎯User enters password just like always but gets improved security behind the scenes ⎯Allows more natural passwords to be used securely⎯Soon to have password identifiers

WPA3-PERSONAL: STRONG SECURITY FROM WEAK PASSWORDS

Page 27: Airheads Meetup WPA3-20181114-share...#ArubaAirheads 4 –WPA2 is past retirement (beyond a senior citizen in Internet years) Released over 10 years ago! WPA2-personal was ‘broken

27#ArubaAirheads

WPA3-SAE

Source: CWSP Study Guide, 2nd Edition

Elliptic CurveZero Knowledge ProofBased on Dragonfly RFC7664

Page 28: Airheads Meetup WPA3-20181114-share...#ArubaAirheads 4 –WPA2 is past retirement (beyond a senior citizen in Internet years) Released over 10 years ago! WPA2-personal was ‘broken

28#ArubaAirheads

Frame capture with Wireshark*: SAE (Open Auth 802.11)

Page 29: Airheads Meetup WPA3-20181114-share...#ArubaAirheads 4 –WPA2 is past retirement (beyond a senior citizen in Internet years) Released over 10 years ago! WPA2-personal was ‘broken

29#ArubaAirheads

Frame capture with Wireshark*: SAE (Association)

Page 30: Airheads Meetup WPA3-20181114-share...#ArubaAirheads 4 –WPA2 is past retirement (beyond a senior citizen in Internet years) Released over 10 years ago! WPA2-personal was ‘broken

30#ArubaAirheads

Frame capture with Wireshark*: SAE (Commit)

Page 31: Airheads Meetup WPA3-20181114-share...#ArubaAirheads 4 –WPA2 is past retirement (beyond a senior citizen in Internet years) Released over 10 years ago! WPA2-personal was ‘broken

31#ArubaAirheads

Frame capture with Wireshark*: SAE (Confirm)

Page 32: Airheads Meetup WPA3-20181114-share...#ArubaAirheads 4 –WPA2 is past retirement (beyond a senior citizen in Internet years) Released over 10 years ago! WPA2-personal was ‘broken

32#ArubaAirheads

Frame capture with Wireshark*: SAE (4-way handshake)

Page 33: Airheads Meetup WPA3-20181114-share...#ArubaAirheads 4 –WPA2 is past retirement (beyond a senior citizen in Internet years) Released over 10 years ago! WPA2-personal was ‘broken

33#ArubaAirheads

–Too many options for WPA2-Enterprise, especially for EAP authentication⎯ Diffie-Hellman or RSA key exchange? 1024-bit authenticating 2048-bit? TLS1.0? SHA1?⎯ This can result in deployments that are not as secure as expected

–Suite B AKM and GCM-256 and CCM-256 ciphersuites defined for Wi-Fi –Requires Suite B TLS ciphersuites to be used in EAP-TLS ⎯ TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 using p384; or,⎯ TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 using p384 and RSA > 3k; or,⎯ TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 using RSA > 3k

–Policy is enforced by EAP server based on new RADIUS attributes⎯ Authenticator indicates the the Suite B AKM was negotiated

–4-way Handshake and KDF use SHA384 with Suite B AKM–Brings 256-bit encryption to Enterprise security even without Suite B

WPA3-ENTERPRISE: SuiteB/CNSA

Page 34: Airheads Meetup WPA3-20181114-share...#ArubaAirheads 4 –WPA2 is past retirement (beyond a senior citizen in Internet years) Released over 10 years ago! WPA2-personal was ‘broken

34#ArubaAirheads

–Certificate chain testing⎯ Many WPA2-certified devices did not properly check a certificate chain⎯ Results in insecurities

–Protected Management Frames⎯ 802.11i only addressed data frame protection⎯ 802.11w (adopted the 2009 timeframe) addressed management frame protection⎯ Prevents forged disassociate/deauthenticate frames post association

–PMF is mandatory for all of WPA3 & Enhanced Open–Certificate chain validation is mandatory for WPA3-Enterprise

WPA3: ENHANCED CERTIFICATION TESTING

Page 35: Airheads Meetup WPA3-20181114-share...#ArubaAirheads 4 –WPA2 is past retirement (beyond a senior citizen in Internet years) Released over 10 years ago! WPA2-personal was ‘broken

35#ArubaAirheads

CLIENT DEVICES

–WPA3 support required on clients for the security enhancements to be applied

– Additional requirement for clients using certificate-based EAP methods– Too many EAP servers did not properly check cert chains– WPA3 Enterprise certification will involve rigorous testing for certificate chaining

– Very few WPA3 certified clients today, increasing numbers expected from 2019

– Linux supplicant code today (version 2.6) includes WPA3 support

–Transition time of ~2 years expected for critical mass of WPA3 certified clients within Enterprises

Page 36: Airheads Meetup WPA3-20181114-share...#ArubaAirheads 4 –WPA2 is past retirement (beyond a senior citizen in Internet years) Released over 10 years ago! WPA2-personal was ‘broken

36#ArubaAirheads

CLIENT DEVICES: LINUX, WINDOWS 10–Linux/Android: wpa_supplicant GIT version can be compiled with WPA3/OWE

–https://tweakers.net/nieuws/145427/komende-windows-10-versie-lijkt-wpa3-te-gaan-ondersteunen.html

GIT: http://w1.fi/hostap.gitecho "CONFIG_OWE=y" >> .configecho "CONFIG_SAE=y" >> .configecho "CONFIG_SUITEB=y" >> .configecho "CONFIG_SUITEB192=y" >> .config

07-11-2018 • 11:11

Page 37: Airheads Meetup WPA3-20181114-share...#ArubaAirheads 4 –WPA2 is past retirement (beyond a senior citizen in Internet years) Released over 10 years ago! WPA2-personal was ‘broken

37#ArubaAirheads

ARUBA AND FUTURE SECURITY ENHANCEMENTS• Aruba seeking received WFA certification for ⎼ WPA3-Enterprise with CNSA Suite (requires WPA3-Personal/SAE certification)⎼ Enhanced Open/OWE⎼ Certification: https://www.wi-fi.org/product-finder-results?sort_by=default&sort_order=desc&capabilities=16&keywords=Aruba

• All modes require Management Frame Protection

• CNSA Suite implementation will be supported in AOS and Instant

• Controller managed APs will support all new enhancements in Tunnel and Decrypt-tunnel modes⎼ Controllers will perform all encryption and decryption of 802.11 traffic

Page 38: Airheads Meetup WPA3-20181114-share...#ArubaAirheads 4 –WPA2 is past retirement (beyond a senior citizen in Internet years) Released over 10 years ago! WPA2-personal was ‘broken

38#ArubaAirheads

– 100% Encryption by default⎯ Privacy before identity credentials⎯ Encrypted walled gardens, coffee shops/bars

– New opportunities and longer lifespan for PSK⎯ Combine with strong profiling⎯ Basic IoT, Guest, BYOD, home

– Simplified 802.1X enterprise SSID with stronger encryption⎯ Leverage strong SuiteB ciphers⎯ If modern devices support it, leverage it

– Protected management frames

– Better security with no added complexity!

WHAT DOES WPA3 MEAN TO YOU?

Page 39: Airheads Meetup WPA3-20181114-share...#ArubaAirheads 4 –WPA2 is past retirement (beyond a senior citizen in Internet years) Released over 10 years ago! WPA2-personal was ‘broken