802.11 Denial-of-Service Attacks Real Vulnerabilities and Practical - - PowerPoint PPT Presentation

802 11 denial of service attacks real vulnerabilities and
SMART_READER_LITE
LIVE PREVIEW

802.11 Denial-of-Service Attacks Real Vulnerabilities and Practical - - PowerPoint PPT Presentation

802.11 Denial-of-Service Attacks Real Vulnerabilities and Practical Solutions John Bellardo and Stefan Savage Department of Computer Science and Engineering University of California, San Diego Motivation n 802.11-based networks have flourished


slide-1
SLIDE 1

802.11 Denial-of-Service Attacks Real Vulnerabilities and Practical Solutions

John Bellardo and Stefan Savage Department of Computer Science and Engineering University of California, San Diego

slide-2
SLIDE 2

Motivation

n 802.11-based networks have flourished

n Home, business, health care, military, etc.

n Security is an obvious concern

n Threats to confidentiality well understood and

being addressed [WPA, 802.11i]

n Threats to availability (denial-of-service) not

widely appreciated & not being addressed

slide-3
SLIDE 3

Live 802.11 DoS Demonstration

Time (1/10 second intervals) Packets

Everyone Else Attacker Victim

D e m

  • n

s t r a t i

  • n

N

  • t

A v a i l a b l e I n t h i s v e r s i

  • n
  • f

t h e P r e s e n t a t i

  • n
slide-4
SLIDE 4

n RF Jamming

n Real threat, 802.11 highly vulnerable; not our focus

n Bandwidth consumption (flooding)

n 802.11 has same vulnerability as wired nets; not our focus

n Attacks on 802.11 protocol itself

n Easy to mount, low overhead, selective, hard to debug n Media access vulnerabilities n Management vulnerabilities

n This talk focuses on these DoS attacks, their

practicality, their effectiveness and how to defend against them

802.11 DoS Attacks

slide-5
SLIDE 5

Media Access Vulnerabilities

n 802.11 includes collision avoidance mechanisms n Typically require universal cooperation between all

nodes in the network

n Media access vulnerabilities arise from the

assumption of universal cooperation

n Virtual carrier sense is an example of a media access

mechanism that is vulnerable to DoS attacks

slide-6
SLIDE 6

Frm Ctl

NAV Vulnerability

Duration Addr1 Addr2 Addr3 Seq Ctl Addr4 Data FCS

802.11 General Frame Format

2 6 6 6 6 6 0-2312 2 2

n Virtual carrier sense allows a node to reserve

the radio channel

n Each frame contains a duration value

n Indicates # of microseconds channel is reserved n Tracked per-node; Network Allocation Vector (NAV) n Used by RTS/CTS

n Nodes only allowed to xmit if NAV reaches 0

slide-7
SLIDE 7

Simple NAV Attack: Forge packets with large Duration

Access Point Node 1 Node 2 Attacker

Duration=32000 Duration=32000

Access Point and Node 2 can’t xmit (but Node 1 can)

slide-8
SLIDE 8

Extending NAV Attack w/RTS

Access Point Node 1 Node 2 Attacker

Duration=32000

R T S

Duration=31000

CTS

Duration=31000

CTS

D u r a t i

  • n

= 3 1

CTS AP and both nodes barred from transmitting

slide-9
SLIDE 9

n Both wrong…

Conventional Wisdom

n NAV attack not a practical threat

n Commodity hardware doesn’t allow

Duration field to be set

n But would be highly effective if

implemented

n Shut down all access to 802.11 network

slide-10
SLIDE 10

Commodity 802.11 hardware

n Firmware-driven microcontroller

n Same code/architecture shared by most popular

vendors (Choice Microsystems)

n Transmit path

n Host provides frame to NIC and requests xmit n NIC firmware validates frame and overwrites key

fields (e.g. duration) in real-time

n Frame then sent to baseband radio interface

n Not possible to send arbitrary frames via

firmware interface

slide-11
SLIDE 11

How to Generate Arbitrary 802.11 Frames?

Key idea: AUX/Debug Port allows Raw access to NIC SRAM

  • 1. Download frame to

NIC

  • 2. Find frame in SRAM
  • 3. Request transmission
  • 4. Wait until firmware

modifies frame

  • 5. Rewrite frame via AUX

port Host Interface to NIC

BAP AUX Port SRAM Xmit Q Xmit process

Virtualized firmware interface

Physical resources

Radio Modem Interface

slide-12
SLIDE 12

Why the NAV attack doesn’t work

n Surprise: many vendors do not implement the

802.11 spec correctly

n Duration field not respected by other nodes

Excerpt from a NAV Attack Trace

TCP Data 0.258 :93:ea:e7:0f :93:ea:ab:df 1.297869 802.11 Ack :93:ea:e7:0f 1.296540 TCP Data 0.258 :93:ea:ab:df :93:ea:e7:0f 1.295192 802.11 CTS 32.767 :e7:00:15:01 1.294020 Type Duration (ms) Destination Source Time (s)

1.2952 - 1.2940 = 1.2 ms

slide-13
SLIDE 13

Simulating the NAV attack

n This bug will likely get fixed

n Valuable for 802.11-based telephony, video, etc.

n So how bad would the attack be? n Simulated NAV attack using NS2

n 18 Users n 1 Access Point n 1 Attacker

n 30 attack frames per second n 32.767 ms duration per attack frame

slide-14
SLIDE 14

NAV Attack Simulation

50 100 150 200 250 300 350 10 16 22 28 34 40 46 52 58 64 70 76 82 88 94 Simulated Seconds Packets Attacker

  • Users
slide-15
SLIDE 15

Practical NAV Defense

n Legitimate duration values are relatively

small

n Determine maximum reasonable NAV

values for all frames

n Each node enforces this limit n < .5 ms for all frames except ACK and CTS n ~3 ms for ACK and CTS

n Reran the simulation after adding

defense to the simulator

slide-16
SLIDE 16

Simulated NAV Defense

50 100 150 200 250 300 350 10 16 22 28 34 40 46 52 58 64 70 76 82 88 94 Simulated Seconds Packets Attacker

  • Users
slide-17
SLIDE 17

Management Vulnerabilities

n 802.11 Management functions

n Authentication (validate identity) n Association (picking access point)

n Most management operations unprotected

n Easy to spoof with false identity n Source of vulnerabilities

n This problem is not being fixed

n Most management frames unencrypted n 802.1x ports allocated after management

functions take place

n 802.11i has deferred addressing this problem

slide-18
SLIDE 18

Deauth Attack

Authenticated Associated

n 802.11 management requires nodes

associate before sending data

Attacker Victim Authentication Request Association Request Association Response Authentication Response Access Point

slide-19
SLIDE 19

Deauth Attack

Authenticated Associated

n Before node can transmit data, attacker

send a spoofed deauthentication frame

Attacker Victim Access Point Deauthentication

slide-20
SLIDE 20

Deauth Attack

Authenticated Associated

n Node attempts to transmit data, but it

can not

Attacker Victim Data Deauthentication Access Point

slide-21
SLIDE 21

Deauth Attack Results

100 200 300 400 500 600 700 800 1 11 21 31 41 51 61 71 81 91 101 112 122 132 141 151 Time (s) Packets Attacker Win XP Linux Thinkpad Linux iPaq MacOS

slide-22
SLIDE 22

Practical Deauth Defense

n Based on the observed behavior that

legitimate nodes do not deauthenticate themselves and then send data

n Delay honoring deauthentication request

n Small interval (5-10 seconds) n If no other frames received from source then

honor request

n If source sends other frames then discard request

n Requires no protocol changes and is

backwards compatible with existing hardware

slide-23
SLIDE 23

Deauth Defense Results

100 200 300 400 500 600 700 1 5 9 13 17 21 25 29 33 37 41 45 Time (s) Packets Attacker Win XP Linux Thinkpad Linux iPaq MacOS

slide-24
SLIDE 24

Conclusion

n 802.11 DoS attacks require more attention

n Easy to mount and not addressed by existing

standards

n Should not depend on restricted firmware

interfaces (can send arbitrary 802.11 pkts)

n Deauthentication attack is most immediate

concern

n Simple, practical defense shown to be effective

slide-25
SLIDE 25

Hands-on Demonstration

n Attack implemented

  • n an iPaq

n See me for a hands-

  • n demonstration

during the break