Wireless network attacks get a public airing
- By William Jackson
- Aug 06, 2003
Federal grants are funding research by some very bright investigators in the computer science departments of our nation's universities to probe the vulnerabilities of wired and wireless networks.
Some of the results of that research were presented today at the Security Symposium in Washington sponsored by the USENIX Association of Berkeley, Calif.
A team from Stanford University, in one example, used a timing attack to extract a private encryption key from a server across a network. In another, researchers at the University of California at San Diego perfected denial-of-service attacks against 802.11 wireless networks.
Timing attacks are used to uncover secret information by observing the time it takes a system to respond to various queries, said David Brumley, of Stanford.
While such attacks have been used to get private keys from hardware security tokens such as smart cards, it has been believed that the variety of processes running on general purpose servers would make such attacks ineffective in that environment.
'We successfully mounted our timing attack between two machines on our campus network,' Brumley said. 'The attack machine and the server were in different buildings with three routers and multiple switches between them.'
The work was funded by a National Science Foundation grant. Using a series of mathematical functions too complex for a layman to follow, Brumley and a partner, Dan Boneh, were able to extract an OpenSSL private key on an Apache Web server.
The process was not simple. It took about two hours and from 350,000 to 1.4 million queries to obtain the key, but that is a small fraction of the time it would take to obtain a key through a brute force attack, the criteria generally used for determining the security of an encryption scheme.
The attack can be defended against by a process known as blinding, which modifies an encryption exponent with a random number.
It is easy to launch denial of service attacks against wireless networks by jamming or flooding the radio frequencies they use for communication.
But in a program funded by the Defense Advanced Research Projects Agency and the National Institute of Standards and Technology, a pair of researchers at UC San Diego exploited vulnerabilities in the 802.11 protocols itself.
John Bellardo demonstrated the process, shutting down traffic to a targeted notebook computer that was using the wireless network provided for the conference. He then interrupted traffic to most of the other notebooks in the conference room.
He blocked the traffic by spoofing deauthentication packets, which are used to break connections between a user node and a wireless access point. Once a deauthentication request has been received from an authenticated user, the access point will no longer process data from that user.
The attack can be defended against by patching access points to have them 'hold' a deauthentication packet for several seconds before acting on it. If the user that supposedly requested deauthentication immediately sends data, the access point ignores the request.
'The deauthentication packet is probably the most immediate concern,' in a wireless denial-of-service attack, Bellardo said. There are many other threats in wireless networking, he said, but 'you have to start one hole at a time.'
William Jackson is a Maryland-based freelance writer.