802.11 denial-of-service attacks real vulnerabilities …...802.11 denial-of-service attacks real...

24
802.11 Denial-of-Service Attacks Real Vulnerabilities and Practical Solutions John Bellardo and Stefan Savage Department of Computer Science and Engineering University of California, San Diego

Upload: others

Post on 08-Jul-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 802.11 Denial-of-Service Attacks Real Vulnerabilities …...802.11 Denial-of-Service Attacks Real Vulnerabilities and Practical Solutions John Bellardo and Stefan Savage Department

802.11 Denial-of-Service AttacksReal Vulnerabilities and

Practical Solutions

John Bellardo and Stefan Savage

Department of Computer Science and EngineeringUniversity of California, San Diego

Page 2: 802.11 Denial-of-Service Attacks Real Vulnerabilities …...802.11 Denial-of-Service Attacks Real Vulnerabilities and Practical Solutions John Bellardo and Stefan Savage Department

Motivation 802.11-based networks have flourished

Home, business, health care, military, etc.

Security is an obvious concern Threats to confidentiality well understood and

being addressed [WPA, 802.11i] Threats to availability (denial-of-service) not

widely appreciated & not being addressed

Page 3: 802.11 Denial-of-Service Attacks Real Vulnerabilities …...802.11 Denial-of-Service Attacks Real Vulnerabilities and Practical Solutions John Bellardo and Stefan Savage Department

RF Jamming Real threat, 802.11 highly vulnerable; not our focus

Bandwidth consumption (flooding) 802.11 has same vulnerability as wired nets; not our focus

Attacks on 802.11 protocol itself Easy to mount, low overhead, selective, hard to debug Media access vulnerabilities Management vulnerabilities

This work focuses on these DoS attacks, theirpracticality, their effectiveness and how todefend against them

802.11 DoS Attacks

Page 4: 802.11 Denial-of-Service Attacks Real Vulnerabilities …...802.11 Denial-of-Service Attacks Real Vulnerabilities and Practical Solutions John Bellardo and Stefan Savage Department

Media Access Vulnerabilities 802.11 includes collision avoidance mechanisms Typically require universal cooperation between all

nodes in the network Media access vulnerabilities arise from the

assumption of universal cooperation

Virtual carrier sense is an example of a media accessmechanism that is vulnerable to DoS attacks

Page 5: 802.11 Denial-of-Service Attacks Real Vulnerabilities …...802.11 Denial-of-Service Attacks Real Vulnerabilities and Practical Solutions John Bellardo and Stefan Savage Department

Frm Ctl

NAV Vulnerability

Duration Addr1 Addr2 Addr3 Seq Ctl Addr4 Data FCS802.11 General Frame Format

2 6 6 6 66 0-2312 22

Virtual carrier sense allows a node to reservethe radio channel

Each frame contains a duration value Indicates # of microseconds channel is reserved Tracked per-node; Network Allocation Vector (NAV) Used by RTS/CTS

Nodes only allowed to xmit if NAV reaches 0

Page 6: 802.11 Denial-of-Service Attacks Real Vulnerabilities …...802.11 Denial-of-Service Attacks Real Vulnerabilities and Practical Solutions John Bellardo and Stefan Savage Department

Simple NAV Attack:Forge packets with large Duration

AccessPoint

Node 1 Node 2

Attacker

Duration=32000 Duration=32000

Access Point and Node 2 can’t xmit(but Node 1 can)

Page 7: 802.11 Denial-of-Service Attacks Real Vulnerabilities …...802.11 Denial-of-Service Attacks Real Vulnerabilities and Practical Solutions John Bellardo and Stefan Savage Department

Extending NAV Attack w/RTS

AccessPoint

Node 1 Node 2

Attacker

Duration=32000RTS

Duration=31000CTS Duration=31000

CTS

Duration=31000CTS

AP and both nodes barredfrom transmitting

Page 8: 802.11 Denial-of-Service Attacks Real Vulnerabilities …...802.11 Denial-of-Service Attacks Real Vulnerabilities and Practical Solutions John Bellardo and Stefan Savage Department

Both wrong…

Conventional Wisdom NAV attack not a practical threat

Commodity hardware doesn’t allowDuration field to be set

But would be highly effective ifimplemented Shut down all access to 802.11 network

Page 9: 802.11 Denial-of-Service Attacks Real Vulnerabilities …...802.11 Denial-of-Service Attacks Real Vulnerabilities and Practical Solutions John Bellardo and Stefan Savage Department

Commodity 802.11 hardware Firmware-driven microcontroller

Same code/architecture shared by most popularvendors (Choice Microsystems)

Transmit path Host provides frame to NIC and requests xmit NIC firmware validates frame and overwrites key

fields (e.g. duration) in real-time Frame then sent to baseband radio interface

Not possible to send arbitrary frames viafirmware interface

Page 10: 802.11 Denial-of-Service Attacks Real Vulnerabilities …...802.11 Denial-of-Service Attacks Real Vulnerabilities and Practical Solutions John Bellardo and Stefan Savage Department

How to Generate Arbitrary802.11 Frames?

Key idea:AUX/Debug Port allowsRaw access to NIC SRAM

Download frame to NIC Find frame in SRAM Request transmission Wait until firmware

modifies frame Rewrite frame via AUX

port

Host Interface to NIC

BAP

AUX Port

SRAM

Xmit Q

Xmitprocess

Virtualized firmwareinterface

Physicalresources

Radio Modem Interface

Page 11: 802.11 Denial-of-Service Attacks Real Vulnerabilities …...802.11 Denial-of-Service Attacks Real Vulnerabilities and Practical Solutions John Bellardo and Stefan Savage Department

Why the NAV attack doesn’t work Surprise: many vendors do not implement the

802.11 spec correctly Duration field not respected by other nodes

Excerpt from a NAV Attack Trace

TCP Data0.258:93:ea:e7:0f:93:ea:ab:df1.297869

802.11 Ack0:93:ea:e7:0f1.296540

TCP Data0.258:93:ea:ab:df:93:ea:e7:0f1.295192

802.11 CTS32.767:e7:00:15:011.294020

TypeDuration (ms)DestinationSourceTime (s)

1.2952 - 1.2940= 1.2 ms

Page 12: 802.11 Denial-of-Service Attacks Real Vulnerabilities …...802.11 Denial-of-Service Attacks Real Vulnerabilities and Practical Solutions John Bellardo and Stefan Savage Department

Simulating the NAV attack This bug will likely get fixed

Valuable for 802.11-based telephony, video, etc. So how bad would the attack be?

Simulated NAV attack using NS2 18 Users 1 Access Point 1 Attacker

30 attack frames per second 32.767 ms duration per attack frame

Page 13: 802.11 Denial-of-Service Attacks Real Vulnerabilities …...802.11 Denial-of-Service Attacks Real Vulnerabilities and Practical Solutions John Bellardo and Stefan Savage Department

NAV Attack Simulation

0

50

100

150

200

250

300

350

10 16 22 28 34 40 46 52 58 64 70 76 82 88 94

Simulated Seconds

Pa

ck

ets

Attacker - Users

Page 14: 802.11 Denial-of-Service Attacks Real Vulnerabilities …...802.11 Denial-of-Service Attacks Real Vulnerabilities and Practical Solutions John Bellardo and Stefan Savage Department

Practical NAV Defense Legitimate duration values are relatively small Determine maximum reasonable NAV values

for all frames Each node enforces this limit < .5 ms for all frames except ACK and CTS ~3 ms for ACK and CTS

Reran the simulation after adding defense tothe simulator

Page 15: 802.11 Denial-of-Service Attacks Real Vulnerabilities …...802.11 Denial-of-Service Attacks Real Vulnerabilities and Practical Solutions John Bellardo and Stefan Savage Department

Simulated NAV Defense

0

50

100

150

200

250

300

350

10 16 22 28 34 40 46 52 58 64 70 76 82 88 94

Simulated Seconds

Pa

ck

ets

Attacker - Users

Page 16: 802.11 Denial-of-Service Attacks Real Vulnerabilities …...802.11 Denial-of-Service Attacks Real Vulnerabilities and Practical Solutions John Bellardo and Stefan Savage Department

Management Vulnerabilities 802.11 Management functions

Authentication (validate identity) Association (picking access point)

Most management operations unprotected Easy to spoof with false identity Source of vulnerabilities

This problem is not being fixed Most management frames unencrypted 802.1x ports allocated after management

functions take place 802.11i has deferred addressing this problem

Page 17: 802.11 Denial-of-Service Attacks Real Vulnerabilities …...802.11 Denial-of-Service Attacks Real Vulnerabilities and Practical Solutions John Bellardo and Stefan Savage Department

Deauth Attack

AuthenticatedAssociated

802.11 management requires nodesassociate before sending data

Attacker Victim

AuthenticationRequest

AssociationRequest

AssociationResponse

AuthenticationResponse

AccessPoint

Page 18: 802.11 Denial-of-Service Attacks Real Vulnerabilities …...802.11 Denial-of-Service Attacks Real Vulnerabilities and Practical Solutions John Bellardo and Stefan Savage Department

Deauth Attack

AuthenticatedAssociated

Before node can transmit data, attackersend a spoofed deauthentication frame

Attacker Victim

AccessPoint

Deauthentication

Page 19: 802.11 Denial-of-Service Attacks Real Vulnerabilities …...802.11 Denial-of-Service Attacks Real Vulnerabilities and Practical Solutions John Bellardo and Stefan Savage Department

Deauth Attack

AuthenticatedAssociated

Node attempts to transmit data, but itcan not

Attacker Victim

DataDeauthentication

AccessPoint

Page 20: 802.11 Denial-of-Service Attacks Real Vulnerabilities …...802.11 Denial-of-Service Attacks Real Vulnerabilities and Practical Solutions John Bellardo and Stefan Savage Department

Deauth Attack Results

0

100

200

300

400

500

600

700

800

1 11 21 31 41 51 61 71 81 91 101 112 122 132 141 151

Time (s)

Pa

cket

s

Attacker Win XP Linux Thinkpad Linux iPaq MacOS

Page 21: 802.11 Denial-of-Service Attacks Real Vulnerabilities …...802.11 Denial-of-Service Attacks Real Vulnerabilities and Practical Solutions John Bellardo and Stefan Savage Department

Practical Deauth Defense Based on the observed behavior that

legitimate nodes do not deauthenticatethemselves and then send data

Delay honoring deauthentication request Small interval (5-10 seconds) If no other frames received from source then

honor request If source sends other frames then discard request

Requires no protocol changes and isbackwards compatible with existing hardware

Page 22: 802.11 Denial-of-Service Attacks Real Vulnerabilities …...802.11 Denial-of-Service Attacks Real Vulnerabilities and Practical Solutions John Bellardo and Stefan Savage Department

Deauth Defense Results

0

100

200

300

400

500

600

700

1 5 9 13 17 21 25 29 33 37 41 45

Time (s)

Pa

cket

s

Attacker Win XP Linux Thinkpad Linux iPaq MacOS

Page 23: 802.11 Denial-of-Service Attacks Real Vulnerabilities …...802.11 Denial-of-Service Attacks Real Vulnerabilities and Practical Solutions John Bellardo and Stefan Savage Department

Summary 802.11 DoS attacks require more attention

Easy to mount and not addressed by existing standards Should not depend on restricted firmware interfaces (can

send arbitrary 802.11 pkts)

Deauthentication attack is most immediate concern Simple, practical defense shown to be effective

But what can realistically be done? Impossible to prevent jamming Could prevent surreptitiously jamming individual users?

Page 24: 802.11 Denial-of-Service Attacks Real Vulnerabilities …...802.11 Denial-of-Service Attacks Real Vulnerabilities and Practical Solutions John Bellardo and Stefan Savage Department

I was a victim! Attack implemented

on an iPaq

Tried out on“unsuspecting”users, I.e., me: