Home :: About InfoWorld :: Advertise :: Subscribe :: Contact Us :: Awards :: Events
InfoWorld HomeNewsTest CenterOpinionsTechIndex
 
 

NEWS

 
 
Paper finds new wireless standard less secure
WPA may be less secure than WEP
 

 
By Paul Roberts, IDG News Service November 07, 2003 

A new paper by a leading security expert says that the new Wi-Fi Protected Access (WPA) security standard may be less secure, in certain scenarios, than WEP, the wireless standard it was designed to replace.

   ADVERTISEMENT
  

ar_sp_box_wireless
SPONSOR

Lucent Technologies.
Leverage Your Mobile High Speed Data Access. Download Free White Paper!

RELATED LINKS
Trading on wireless - Infoworld Staff
Voice app maps the warehouse - Infoworld Staff
Wireless RSS feed 

IDG ENTERPRISE NETWORK
Toshiba unveils higher capacity 1.8-inch hard drives  (ComputerWorld)
Top Considerations for Wi-Fi Application Development  (ComputerWorld)
Public WLANs slowly taking shape, Cometa CEO says  (NetworkWorldFusion)

TOP STORIES
Upgrade glitch downs AT&T Wireless' CRM system
Siebel services head resigns
HP builds out Itanium line
Top News RSS feed 

TOP SITE REFERRALS
 
How Does One Describe Universal Types?
(Dare Obasanjo aka Carnage4Life)
 
En Garde
(Thinking in .NET)
 

SIGN UP FOR THE MAGAZINE
FREE EMAIL NEWSLETTERS
IT SOLUTION SEARCH

In the paper, "Weakness in Passphrase Choice in WPA Interface," Robert Moskowitz, a senior technical director at ICSA Labs, part of TruSecure Corp., describes a number of problems with the new WPA standard, including the ability of attackers to "sniff" critical information from wireless traffic and to discover the value of a wireless network's security key.

WPA is a new security standard based on work by the Institute of Electrical and Electronics Engineers Inc. (IEEE) on the 802.11i wireless security standard. WPA is intended to replace Wired Equivalent Privacy (WEP), the most common standard for securing data on wireless networks.

WPA offers a number of security improvements over WEP, including better data encryption and the ability to authenticate users on large networks using a separate authentication service such as Remote Authentication Dial-In User Service, before allowing them to join the network, according to the Wi-Fi Alliance, a wireless industry group.

The problems with WPA center on the use of Pre-Shared Keys (PSKs), which are an alternative authentication tool for small businesses and home users that do not want to use a separate authentication server and full 802.1x key infrastructure, according to Moskowitz, who helped design the 802.11i wireless security standard and WPA.

As with WEP, wireless users can use passphrases for the PSK, which can range from 8 to 63 bytes. Most wireless equipment makers allow only a single PSK to be used on a wireless network, Moskowitz said.

Moskowitz writes that the method that WPA devices use to conduct "handshakes," or exchanges of information that are used to generate data encryption keys for wireless sessions, allows attackers who do not know a PSK to guess it using what is known as a "dictionary" attack.

In dictionary attacks, attackers capture (or "sniff") wireless network traffic in transit between the access point and the wireless workstation, then use specialized software programs to guess the key.

Other wireless security standards are also vulnerable to such attacks. WEP keys have long been known to be insecure. More recently, a security expert showed that Cisco Systems Inc.'s Lightweight Extensible Authentication Protocol (LEAP) standard is vulnerable to dictionary attacks too.

However, attackers who want to compromise WEP and LEAP need to harvest large quantities of network traffic before they can decipher the passphrase. In contrast, WPA only requires them to capture four specific packets of data, Moskowitz said.

Passphrases with fewer than 20 characters long are unlikely to withstand a dictionary attack, and attackers who miss those four packets in transit can easily trick a wireless access point into doing a new "handshake" and sending the packets to the attacker again, he said.

Attackers who already know the PSK and have joined a wireless network as trusted members could further exploit shortcomings in the WPA handshake to guess another user's unique "session key," which would enable them to listen in on that user's wireless session, capturing information they were sending out on a corporate network or to the Internet, Moskowitz said. That could spell trouble for corporations that allow contractors or other trusted third parties onto their wireless networks, he said. The key is to use strong passwords -- preferably longer than 17 alphanumeric characters, he said.

Organizations using WPA with Pre-Shared Keys should also consider using a random number generator to create passphrases, rather than making them up, he said. However, companies that are deploying WPA with an authentication server have little reason to be concerned, because they do not use Pre-Shared Keys, according to Michael Disabato, senior analyst at The Burton Group Corp. For other users, the Moskowitz paper should not cast a shadow over WPA, he said. "WPA is doing what its supposed to do, providing you do what you're supposed to do and enforce secure passwords, " he said.

Both Disabato and Moskowitz agreed that WPA was far more secure than the earlier WEP standard, even considering the issues raised by Moskowitz's paper. However, Moskowitz did take issue with wireless networking equipment makers' implementation of WPA.

The shortcomings surrounding Pre-Shared Keys discussed in the WPA paper were acknowledged in the 802.11i standard documents. In their rush to offer WPA in their products, wireless equipment makers like Linksys Group Inc. (now owned by Cisco) did little to address the issues with tools to make it easier to generate secure PSKs, Moskowitz said.

Other problems, such as the requirement, with some wireless products, that all wireless users share the same PSK on a network, or the decision to have wireless access points broadcast the fact that they are using PSKs instead of authentication servers just makes the job of compromising such networks easier, he said. Moskowitz's paper is circulating informally on the Internet, but an official copy will soon be available on the TruSecure Web site, he said.



SPONSORED WHITE PAPERS
Aventail - SSL VPN or IPSec VPN: which is best for you? Get a free white paper!
BMC Software - Maximize the Potential of Enterprise Data: Free white paper!
CDW - Personal attention. CDW. The Right Technology. Right Away.
Cisco - FREE WHITE PAPER: BLUEPRINT to design and implement secure VPNs
EMC - FREE PAPER: Get "NETWORKED STORAGE BUYERS GUIDE to PAIN RELIEF" now!
Entrust - Manage identities across applications. Improve productivity.
Google - Bring Google search to your intranet and corporate website.
Lucent Technologies - Leverage Your Mobile High Speed Data Access. Download Free White Paper!
Lucent Technologies - Overcoming Common Firewall Limitations
Network Assoiciates - Free white paper - Strategies for Optimizing Network Costs and Benefits
Nokia - Get the scoop! Mobilizing business white papers & case studies.
Remedy - Manage Change requests and Cut Asset-related Costs
RightNow Technologies - 10 Secrets for Successful Customer Service - Free White Paper
Secure Your WLAN - Free Intel white paper shows you how to deploy a secure wireless LAN
Stalker Software - CommuniGate Pro - Transform your Email and Calendaring

Search the IDG White Paper Library:


SPONSORED LINKS
BMC Software - SmartDBA from BMC Software is ranked #1 by IDC. Find out why
ADIC - Subscribe Now! - 6 Complimentary Newsletters from ADIC featuring Gartner Analysis
AMD - Introducing the AMD Opteron (TM) Processor
HP - Win an HP iPaq now on the Business Resource Center!
Serena - FREE Report: Automate Application Change Across the Enterprise
INFOWORLD MARKETPLACE


Get NEC's MobilePro 900, the most versatile handheld PC ever - Now your mobile workforce can hit the road running with the MobilePro 900 from NEC. This 1.8 pound compact handheld PC comes equipped with Intel's PXA255 processor with Xscale technology and can comfortably handle powerful enterprise applications. To learn everything you need to know about the MobilePro 900 and empower your mobile workforce.
GoToMyPC: Secure Enterprise Remote Access - All the TCO advantages of a managed service with multi-level security and control. Click here for more information and a complimentary evaluation of GoToMyPC.
Vonage DigitalVoice...The BROADBAND Phone Company - Vonage is a digital phone service that replaces your current phone company, offering unlimited local and long distance calling for $34.99 per month
FREE Mobile Printing White Paper from Zebra - Mobile devices enable users to conduct business virtually anywhere. Learn how rugged and reliable mobile printers can support and improve a growing variety of business operations.
PDA Security Software for the Enterprise - PDA Defense is a multi-tiered security software solution for the Palm OS and Pocket PC with exclusive features, including brute force attack prevention.

 
 
 HOME  NEWS  TEST CENTER  OPINIONS  TECHINDEX   About InfoWorld :: Advertise :: Subscribe :: Contact Us :: Awards :: Events 

Copyright © 2003, Reprints, Permissions, Licensing