SlideShare ist ein Scribd-Unternehmen logo
1 von 45
Downloaden Sie, um offline zu lesen
Smart Cards & Devices Forum 2013, May 23rd, Prague
Wi-Fi Protected Setup
Friend or Foe?
Tomáš Rosa
http://crypto.hyperlink.cz
Smart Cards & Devices Forum 2013
Part ONE
WPS Introduction
Smart Cards & Devices Forum 2013
WPS Standard Body
 Defined by Wi-Fi Alliance in public, but paid
standard [2], [7].
 It goes in parallel with IEEE 802.11 machinery.
 It addresses the user experience of automated
Wi-Fi setup that is somehow completely
neglected by 802.11.
 Anyway, such activity is crucial for Wi-Fi-based
smart devices interworking.
 Also termed as:
 “Wi-Fi Simple Configuration” - WSC
Smart Cards & Devices Forum 2013
Magic Triangle Tells the Story
Registrar
Access PointEnrollee
interface E interface M
interface A
Smart Cards & Devices Forum 2013
Practical Use Cases I
 Enrollee pretends to be an external Registrar and pulls
WLAN credentials from AP for its own setup.
 After having sipped the secret sauce, the Enrollee resigns
its role of WLAN manager.
 In this setup, the idea of PIN brute force attack originated
[5], [9].
Registrar
Enrollee
Access Point
interface (A), M
Smart Cards & Devices Forum 2013
Practical Use Cases II
 AP implements built-in Registrar for new Enrollees
provisioning.
 Variants include external UPnP Registrar whose
communication with Enrollees is proxied through AP.
Registrar
Enrollee
Access Point
interface A, E
Smart Cards & Devices Forum 2013
Device Password Quest
 In-band mutual authentication for E and
M links is based on Device Password.
 Registration Protocol describes the core
verification procedure.
 To be safe, we shall:
 Use fresh Device Password for each and
every authentication run.
 Follow special technical procedures for
brute-force prevention, etc. [2], [7]
Smart Cards & Devices Forum 2013
Born Slippy – Static PIN
Smart Cards & Devices Forum 2013
Going Simpler Than Simple
 PBC – PushButton Configuration
 Pressing a dedicated button (SW or
HW) sets
Device Password = “0000 0000”
 There are further technical procedures
[7] that are worth study.
 As requirements for secure design.
 As inspiration for penetration tests.
Smart Cards & Devices Forum 2013
In Other Words
 What do we need to get a super-strong
WPA2 password out of a physically
accessible AP?
 Dismantle the case and start debugging
the firmware?
 Use HW probes for direct memory dump?
 Invoke complicated side-channel attack?
 Ask a crystal ball?
Smart Cards & Devices Forum 2013
Well, Just Push the Button
Smart Cards & Devices Forum 2013
Part TWO
Bit Commitment in Nutshell
Smart Cards & Devices Forum 2013
Bit Commitment In Nutshell
 Originator announces C:
C = Commit(msg, open), where
msg is some yet-secret message,
and open is yet-secret random value.
 Later on, the Originator makes (msg,
open) public.
 Verifiers can then check that indeed:
C = Commit(msg, open).
Smart Cards & Devices Forum 2013
Security Requirements
 Binding
 Originator cannot change msg after having
announced C.
 Hiding
 Without a help of the originator, recipient of C
cannot obtain any non-negligible information on
msg.
 We cannot have both perfect binding and
perfect concealing.
 We can, however, achieve a secure enough
settlement.
Smart Cards & Devices Forum 2013
Keyed Bit Commitment
 Defines CommitKey(msg, open)
 Only the parties knowing the Key can
participate in the protocol.
 Others can only gain or introduce a
(pseudo)random noise from/to the
protocol flow.
Smart Cards & Devices Forum 2013
WPS-Style Scheme
CommitKey(msg, open) =
= HMAC-SHA-256Key(open || msg),
where open ∈R {0, 1}128.
Smart Cards & Devices Forum 2013
Part THREE
The Registration Protocol
Smart Cards & Devices Forum 2013
Device Password Verification
 Establishes mutual authentication for
interfaces E and M.
 Both parties are initially untrusted.
 There is also an implicit key agreement securing
the ongoing management messages.
 PIN is a special kind of decimal-only DP.
 Defines two entities: Registrar and Enrollee.
 Directly fits interface E.
 For interface M, the Enrollee’s role is played by
AP.
Smart Cards & Devices Forum 2013
Registration Protocol Phases
1. Ephemeral Diffie-Hellman key agreement
 Steps M1, M2
 Provides envelope keys: AuthKey, KeyWrapKey, and
EMSK (Extended Master Session Key).
2. Device Password mutual verification
 Steps M3, …, M7-A
 Uses keyed Bit Commitment variant.
 We focus solely on this part.
3. Configuration data exchange
 Steps M7-B, M8
 There can also be persistent master session that
continually governs the AP (using EMSK).
Smart Cards & Devices Forum 2013
Step M3
E-Hash1 = CommitAuthKey(DPL || PKInf, E-S1)
E-Hash2 = CommitAuthKey(DPR || PKInf, E-S2)
Enrollee Registrar
PKInf … Diffie-Hellman public key info (ephemeral)
DPL … left half of Device Password, |DPL| = [|DP| + (|DP| mod 2)]/2
DPR … right half of Device Password, |DPR| = |DP| - |DPL|
Smart Cards & Devices Forum 2013
Step M4
R-Hash1 = CommitAuthKey(DPL || PKInf, R-S1)
R-Hash2 = CommitAuthKey(DPR || PKInf, R-S2)
ENCKeyWrapKey(R-S1)
Enrollee Registrar
PKInf … Diffie-Hellman public key info (ephemeral)
DPL … left half of Device Password
DPR … right half of Device Password, |DPR| ≤ |DPL|
Smart Cards & Devices Forum 2013
Step M5
ENCKeyWrapKey(E-S1)
Enrollee Registrar
Finishes the mutual authentication (confirmation) of the first half of
Device Password.
Smart Cards & Devices Forum 2013
Step M6
ENCKeyWrapKey(R-S2)
Enrollee Registrar
Starts the mutual confirmation of the second half of Device Password.
Smart Cards & Devices Forum 2013
Step M7
ENCKeyWrapKey(E-S2)
Enrollee Registrar
Finishes the mutual confirmation of the second half of Device
Password.
Smart Cards & Devices Forum 2013
Attack In M4, M6
 Active online brute force on PIN by fraudulent
Registrar.
 Independently by Stefan Viehboeck [5] and
Tactical Network Solutions in 2011 [9].
 In 2008(!), described by Lindell for SSP in BT.[3]
 Online attacker repeatedly queries Enrollee
(usually AP), until PIN is found.
 Splitting Device Password induces O(10N/2).
 Requires intensive protocol restarting.
 Already anticipated by WFA in 2006! [6], [7]
Smart Cards & Devices Forum 2013
Dual Attack In M4, M6
 Active offline brute force on PIN by fraudulent
Enrollee.
 Not so broadly exploited, yet.
 Neither for Bluetooth.
 Attacker receives R-S1 (R-S2) and searches
offline for valid PIN.
 O(10N/2), not limited (or even limitable) by peer
speed.
 Requires two protocol restarts plus one for
utilizing the PIN.
 Already anticipated by WFA! [6], [7]
Smart Cards & Devices Forum 2013
Cousin Bluetooth “Classic”
 Passkey-based Secure Simple Pairing
employs the same idea [1], but:
 Despite having D-H ready in place, the Bit
Commitment is not D-H-keyed!
 We can brute-force the PIN basing on passive
interception. [3]
 The verification is “over split” to bit-by-bit!
 Online/offline k-bit PIN brute-force in just O(k).
 So, the risk of static PIN compromise in SSP is
much higher than for WPS.
 It is even higher than for Bluetooth 2.0!
 Despite this, Secure Simple Pairing is quite popular…
Smart Cards & Devices Forum 2013
Bluetooth Low Energy
 Even worse re-incarnation of the same idea.
 Bit Commitment is not keyed.
 There is even no D-H at all, so not only the PIN, but
the whole link key is at risk [11].
 Passkey is verified at once (no split).
 Interestingly, the two Bluetooth standards exercise the
two limit splitting strategies. Both wrong for static PIN.
 BLE is obviously designed to be very simple
and relies on many assumptions.
 Fresh PIN anytime pairing is started.
 No passive adversary during pairing.
Smart Cards & Devices Forum 2013
Bit Commitment á-la BLE
 Defines msg = (TK, p1, p2), where
 TK is a reformatted PIN value,
 p1 and p2 are certain known labels.
 Furthermore open = rand.
 Then C = Commit(msg, open) =
= AESTK[AESTK(open ⊕ p1) ⊕ p2]
Smart Cards & Devices Forum 2013
Lack of Binding in BLE BC
 Having been given any (modified) msg
and a former commitment C,
 we can trivially find its new corresponding
opener rand as
rand = AES-1
TK [AES-1
TK(C) ⊕ p2] ⊕ p1
 Actually, this is just a straight-forward
CBC-MAC inversion towards IV for a
known key and message.
Smart Cards & Devices Forum 2013
One-Time PIN is Broken
 Besides those weaknesses already
noted in BT Core Spec. [1] and
elaborated in [11], this is a new attack.
 Even purely One-Time PIN authentication
can be broken in BLE.
 Due to the lack of binding, the attacker
can utilize a cracked PIN just in the very
same pairing procedure.
Smart Cards & Devices Forum 2013
BLE_decommit(…) PoC
Demonstrating the crypto exploit ------------
!new TK! : 0000000000000000000000000001E240
p1 : 05000800000302070710000001010001
p2 : 00000000A1A2A3A4A5A6B1B2B3B4B5B6
commitment : 1e1e3fef878988ead2a74dc5bef13b86
!new rand! : e27fced1adb1f637c3bbb4eaa0ba409a
recomputed commitment :
1e1e3fef878988ead2a74dc5bef13b86
X-check: OK, commitment is still(!) valid
Python source at: http://crypto.hyperlink.cz/files/blecommit.py
Smart Cards & Devices Forum 2013
Countermeasure
 Assuming only open can change after
sending the commitment C, there are
several ways to a trivial fix.
Either
C = AESTK ⊕ open [AESTK ⊕ open (open ⊕ p1) ⊕ p2]
Or
C = AESTK [AESTK (open ⊕ p1) ⊕ open ⊕ p2]
Or Even
C = AESTK [AESTK (open ⊕ p1) ⊕ p2] ⊕ open
Smart Cards & Devices Forum 2013
Apropos Bluetooth…
Affordable Bluetooth hacking tool is here!
Smart Cards & Devices Forum 2013
Part FOUR
The Swamp
Smart Cards & Devices Forum 2013
WPS Patching Obstacles
 Or, why this effort usually fails?
 Uneasy to correctly stop WPS flow without
leaking any useful information.
 PIN-masking is of no help:
 The mask function – whatever it is – must be still
computable by any active WLAN entity, so it is no
obstacle for active brute force.
 Joining both PIN halves facilitates the dual attack.
 Furthermore, it is impractical to patch all
devices. Usually, we can patch AP only.
Smart Cards & Devices Forum 2013
Swamp
 WPS PIN-verification hardening in case of
standard countermeasures do not help.
 E.g. autonomous, loosely supervised AP with
static PIN and high availability demands.
 Addresses the original attack [5] by patching
the Enrollee (AP) only.
 No need to patch the Registrars.
 Reinstalls O(10N) complexity.
 Preserves reasonable resistance against the
dual attack.
Smart Cards & Devices Forum 2013
New Registration Protocol
 Two phases at the Enrollee (AP) side.
 Brave Step. We behave according to the
original standard, so giving the Registrar
a chance to authenticate.
 Swamp Walk. After a few failed Brave
Steps, we start behaving according to the
Swamp rules.
 Swamp Walk terminates either by a
successful authentication, long timeout, or
supervisor intervention.
Smart Cards & Devices Forum 2013
Brave Step
 Necessary to:
 handle ephemeral PIN,
 prevent honest users annoyance.
 Only just a few steps shall be allowed.
 Say three attempts before swamp.
 The number is settlement between
comfort and information leakage.
Smart Cards & Devices Forum 2013
Swamp Walk Remarks
 We shall still pay attention to brute-force
feasibility.
 The PIN entropy still matters.
 We still need to enforce a safe response rate.
 We shall monitor persistent active attackers.
 Swamp is just a significant sidekick, not a whole
solution.
 It helps by reinstalling the “full exponential” brute
force complexity.
 In other words, it reliefs the pain introduced by the
PIN splitting which was, however, necessary to
defeat the dual attack…
Smart Cards & Devices Forum 2013
How About Cousin Bluetooth?
 Secure Simple Pairing can be patched in
the same way.
 Helps to cope with the active online
adversary playing the Initiator role.
 Reinstalls O(2k) complexity.
 Needs just a slight tailoring for the higher
splitting rate.
 Blue Swamp…
 Hint: Manage all but the final PIN bits in the
same way as DPL
*.
Smart Cards & Devices Forum 2013
Conclusion
 Wi-Fi Protected Setup employs reasonable
cryptographic protocol for practically feasible and
yet-secure PIN-based key agreement.
 The key can be then used to manage network credentials.
 Same principle as Secure Simple Pairing in Bluetooth.
With one exception – WPS is more secure.
 Special care must be taken for static PIN.
 We shall read the standard – it is almost all in there!
 Anyway, this is a vital place where to look for
penetration tests inspiration.
Smart Cards & Devices Forum 2013
Acknowledgement
Special thanks goes to Tomáš Jabůrek
and Radek Komanický of Raiffeisenbank
CZ for continual support.
Smart Cards & Devices Forum 2013
Thank You For Attention
Tomáš Rosa, Ph.D.
http://crypto.hyperlink.cz
Smart Cards & Devices Forum 2013
References
1. Bluetooth Core Specification, ver. 4.0, Bluetooth SIG, June 2010
2. IBSS with Wi-Fi Protected Setup, Technical Specification, ver. 1.0.0, Wi-Fi Alliance, November
2012
3. Lindell, A.-Y.: Attacks on the Pairing Protocol of Bluetooth v2.1, Black Hat USA 2008, June
2008
4. Lulev, H.: Overview of Bit Commitment Schemes, Bachelor Thesis at Darmstadt University of
Technology, Department of Computer Science, December 2007
5. Viehboeck, S.: Brute forcing Wi-Fi Protected Setup – When Poor Design Meets Poor
Implementation, ver. 3, December 2011
6. Wi-Fi Protected Setup Specification, ver. 1.0h, Wi-Fi Alliance, December 2006
7. Wi-Fi Simple Configuration, Technical Specification, ver. 2.0.2, Wi-Fi Alliance, January 2012
8. http://www.wi-fi.org/knowledge-center/articles/wi-fi-protected-setup [retrieved May-02-2013]
9. http://www.tacnetsol.com/news/2011/12/28/cracking-wifi-protected-setup-with-reaver.html,
December 2011 [retrieved May-02-2013]
10. http://ubertooth.sourceforge.net/ [retrieved May-02-2013]
11. Ryan, M.: How Smart is Bluetooth Smart?, Shmoocon 2013, Feb 16th, http://lacklustre.net/
[retrieved May-16-2013]

Weitere ähnliche Inhalte

Was ist angesagt? (7)

Final report
Final reportFinal report
Final report
 
Nullcon 2011 RFID - NÂO ENVIADO AO EVENTO
Nullcon 2011   RFID - NÂO ENVIADO AO EVENTONullcon 2011   RFID - NÂO ENVIADO AO EVENTO
Nullcon 2011 RFID - NÂO ENVIADO AO EVENTO
 
LA Micro Stock Report 28th February 2014
 LA Micro Stock Report 28th February 2014 LA Micro Stock Report 28th February 2014
LA Micro Stock Report 28th February 2014
 
LA Micro Stock Report 24th February 2014
 LA Micro Stock Report 24th February 2014 LA Micro Stock Report 24th February 2014
LA Micro Stock Report 24th February 2014
 
LA Micro Stock Report 21st February 2014
 LA Micro Stock Report 21st February 2014 LA Micro Stock Report 21st February 2014
LA Micro Stock Report 21st February 2014
 
LA Micro Stock Report 3rd March 2014
 LA Micro Stock Report 3rd March 2014 LA Micro Stock Report 3rd March 2014
LA Micro Stock Report 3rd March 2014
 
LA Micro Stock Report 7th March 2014
 LA Micro Stock Report 7th March 2014 LA Micro Stock Report 7th March 2014
LA Micro Stock Report 7th March 2014
 

Ähnlich wie Smart Cards & Devices Forum 2013 - Wi-fi protected setup

Smart Cards & Devices Forum 2012 - Smart Phones Security
Smart Cards & Devices Forum 2012 - Smart Phones SecuritySmart Cards & Devices Forum 2012 - Smart Phones Security
Smart Cards & Devices Forum 2012 - Smart Phones Security
OKsystem
 
Dual Authentication For Bluetooth Connection
Dual Authentication For Bluetooth ConnectionDual Authentication For Bluetooth Connection
Dual Authentication For Bluetooth Connection
IJERA Editor
 
DEFCON-21-Koscher-Butler-The-Secret-Life-of-SIM-Cards-Updated.pdf
DEFCON-21-Koscher-Butler-The-Secret-Life-of-SIM-Cards-Updated.pdfDEFCON-21-Koscher-Butler-The-Secret-Life-of-SIM-Cards-Updated.pdf
DEFCON-21-Koscher-Butler-The-Secret-Life-of-SIM-Cards-Updated.pdf
Wlamir Molinari
 
eSmartlock - an antipiracy dongle with integrated DRM functionalities
eSmartlock - an antipiracy dongle with integrated DRM functionalitieseSmartlock - an antipiracy dongle with integrated DRM functionalities
eSmartlock - an antipiracy dongle with integrated DRM functionalities
Yiannis Hatzopoulos
 
Gattacking Bluetooth Smart devices - introducing new BLE MITM proxy tool
Gattacking Bluetooth Smart devices - introducing new BLE MITM proxy toolGattacking Bluetooth Smart devices - introducing new BLE MITM proxy tool
Gattacking Bluetooth Smart devices - introducing new BLE MITM proxy tool
Slawomir Jasek
 
Brute forcing Wi-Fi Protected Setup
Brute forcing Wi-Fi Protected SetupBrute forcing Wi-Fi Protected Setup
Brute forcing Wi-Fi Protected Setup
Scientia Groups
 

Ähnlich wie Smart Cards & Devices Forum 2013 - Wi-fi protected setup (20)

Smart Cards & Devices Forum 2012 - Smart Phones Security
Smart Cards & Devices Forum 2012 - Smart Phones SecuritySmart Cards & Devices Forum 2012 - Smart Phones Security
Smart Cards & Devices Forum 2012 - Smart Phones Security
 
23c3 Bluetooth hacking revisited
23c3 Bluetooth hacking revisited23c3 Bluetooth hacking revisited
23c3 Bluetooth hacking revisited
 
Fundamentals of network hacking
Fundamentals of network hackingFundamentals of network hacking
Fundamentals of network hacking
 
Controlling Bluetooth Low Energy Devices
Controlling Bluetooth Low Energy DevicesControlling Bluetooth Low Energy Devices
Controlling Bluetooth Low Energy Devices
 
iot hacking, smartlockpick
 iot hacking, smartlockpick iot hacking, smartlockpick
iot hacking, smartlockpick
 
Dual Authentication For Bluetooth Connection
Dual Authentication For Bluetooth ConnectionDual Authentication For Bluetooth Connection
Dual Authentication For Bluetooth Connection
 
How to create your Smart Toy with bluemix & 7688 Duo board
How to create your Smart Toy with bluemix & 7688 Duo boardHow to create your Smart Toy with bluemix & 7688 Duo board
How to create your Smart Toy with bluemix & 7688 Duo board
 
Call your key to phone all
Call your key to phone allCall your key to phone all
Call your key to phone all
 
DEFCON-21-Koscher-Butler-The-Secret-Life-of-SIM-Cards-Updated.pdf
DEFCON-21-Koscher-Butler-The-Secret-Life-of-SIM-Cards-Updated.pdfDEFCON-21-Koscher-Butler-The-Secret-Life-of-SIM-Cards-Updated.pdf
DEFCON-21-Koscher-Butler-The-Secret-Life-of-SIM-Cards-Updated.pdf
 
eSmartlock - an antipiracy dongle with integrated DRM functionalities
eSmartlock - an antipiracy dongle with integrated DRM functionalitieseSmartlock - an antipiracy dongle with integrated DRM functionalities
eSmartlock - an antipiracy dongle with integrated DRM functionalities
 
Wi-FI Hacking
Wi-FI Hacking Wi-FI Hacking
Wi-FI Hacking
 
OWASP Cambridge Chapter Meeting 13/12/2016
OWASP Cambridge Chapter Meeting 13/12/2016OWASP Cambridge Chapter Meeting 13/12/2016
OWASP Cambridge Chapter Meeting 13/12/2016
 
Deauthentication Attack with Node MCU & Esp8266
Deauthentication Attack with Node MCU & Esp8266Deauthentication Attack with Node MCU & Esp8266
Deauthentication Attack with Node MCU & Esp8266
 
Iot Security
Iot SecurityIot Security
Iot Security
 
Wi-Foo Ninjitsu Exploitation
Wi-Foo Ninjitsu ExploitationWi-Foo Ninjitsu Exploitation
Wi-Foo Ninjitsu Exploitation
 
Security Theatre - Benelux
Security Theatre - BeneluxSecurity Theatre - Benelux
Security Theatre - Benelux
 
Gattacking Bluetooth Smart devices - introducing new BLE MITM proxy tool
Gattacking Bluetooth Smart devices - introducing new BLE MITM proxy toolGattacking Bluetooth Smart devices - introducing new BLE MITM proxy tool
Gattacking Bluetooth Smart devices - introducing new BLE MITM proxy tool
 
Make the Smartcard great again
Make the Smartcard great againMake the Smartcard great again
Make the Smartcard great again
 
Hacking Of MIBand 3
Hacking Of MIBand 3Hacking Of MIBand 3
Hacking Of MIBand 3
 
Brute forcing Wi-Fi Protected Setup
Brute forcing Wi-Fi Protected SetupBrute forcing Wi-Fi Protected Setup
Brute forcing Wi-Fi Protected Setup
 

Mehr von OKsystem

Smart Cards & Devices Forum 2013 - Aritmetika s velkými čísly
Smart Cards & Devices Forum 2013 - Aritmetika s velkými číslySmart Cards & Devices Forum 2013 - Aritmetika s velkými čísly
Smart Cards & Devices Forum 2013 - Aritmetika s velkými čísly
OKsystem
 
Smart Cards & Devices Forum 2013 - Mobile financial services
Smart Cards & Devices Forum 2013 - Mobile financial servicesSmart Cards & Devices Forum 2013 - Mobile financial services
Smart Cards & Devices Forum 2013 - Mobile financial services
OKsystem
 
Smart Cards & Devices Forum 2013 - Komerční prezentace aplikace cryptocult
Smart Cards & Devices Forum 2013 - Komerční prezentace aplikace cryptocultSmart Cards & Devices Forum 2013 - Komerční prezentace aplikace cryptocult
Smart Cards & Devices Forum 2013 - Komerční prezentace aplikace cryptocult
OKsystem
 
Smart Cards & Devices Forum 2013 - Cards going mobile
Smart Cards & Devices Forum 2013 - Cards going mobileSmart Cards & Devices Forum 2013 - Cards going mobile
Smart Cards & Devices Forum 2013 - Cards going mobile
OKsystem
 
Smart Cards & Devices Forum 2013 - Babel
Smart Cards & Devices Forum 2013 - BabelSmart Cards & Devices Forum 2013 - Babel
Smart Cards & Devices Forum 2013 - Babel
OKsystem
 
Smart Cards & Devices Forum 2013 - Zabezpečení mobilních bankovnictví
Smart Cards & Devices Forum 2013 - Zabezpečení mobilních bankovnictvíSmart Cards & Devices Forum 2013 - Zabezpečení mobilních bankovnictví
Smart Cards & Devices Forum 2013 - Zabezpečení mobilních bankovnictví
OKsystem
 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
OKsystem
 
Smart Cards & Devices Forum 2013 - Security on mobile
Smart Cards & Devices Forum 2013 - Security on mobileSmart Cards & Devices Forum 2013 - Security on mobile
Smart Cards & Devices Forum 2013 - Security on mobile
OKsystem
 
Smart Cards & Devices Forum 2013 - Šifrování hlasu včera a dnes
Smart Cards & Devices Forum 2013 - Šifrování hlasu včera a dnesSmart Cards & Devices Forum 2013 - Šifrování hlasu včera a dnes
Smart Cards & Devices Forum 2013 - Šifrování hlasu včera a dnes
OKsystem
 
Smart Cards & Devices Forum 2013 - [NFC@Telefonica CZ] Near Future Cases
Smart Cards & Devices Forum 2013 - [NFC@Telefonica CZ] Near Future CasesSmart Cards & Devices Forum 2013 - [NFC@Telefonica CZ] Near Future Cases
Smart Cards & Devices Forum 2013 - [NFC@Telefonica CZ] Near Future Cases
OKsystem
 
Smart Card and Strong Cryptography for instant security
Smart Card and Strong Cryptography for instant securitySmart Card and Strong Cryptography for instant security
Smart Card and Strong Cryptography for instant security
OKsystem
 
OKbase - Efektivní využití moderních IT nástrojů při řízení HR
OKbase - Efektivní využití moderních IT nástrojů při řízení HROKbase - Efektivní využití moderních IT nástrojů při řízení HR
OKbase - Efektivní využití moderních IT nástrojů při řízení HR
OKsystem
 
OKbase - Optimalizujte náklady na vzdělávání moderně
OKbase - Optimalizujte náklady na vzdělávání moderněOKbase - Optimalizujte náklady na vzdělávání moderně
OKbase - Optimalizujte náklady na vzdělávání moderně
OKsystem
 
OKbase - moderní IT nástroj pro HR
OKbase - moderní IT nástroj pro HROKbase - moderní IT nástroj pro HR
OKbase - moderní IT nástroj pro HR
OKsystem
 
OKadresy - (nejen) od UIR-ADR k RUIAN
OKadresy - (nejen) od UIR-ADR k RUIANOKadresy - (nejen) od UIR-ADR k RUIAN
OKadresy - (nejen) od UIR-ADR k RUIAN
OKsystem
 
Software pro čipové karty
Software pro čipové kartySoftware pro čipové karty
Software pro čipové karty
OKsystem
 
MicroStrategy GI a GIS Connector
MicroStrategy GI a GIS ConnectorMicroStrategy GI a GIS Connector
MicroStrategy GI a GIS Connector
OKsystem
 
Od atributu k reportu
Od atributu k reportuOd atributu k reportu
Od atributu k reportu
OKsystem
 
Outsourcing - pohled dodavatele
Outsourcing - pohled dodavateleOutsourcing - pohled dodavatele
Outsourcing - pohled dodavatele
OKsystem
 
Umíte efektivně spravovat požadavky (nejen) na IT služby?
Umíte efektivně spravovat požadavky (nejen) na IT služby?Umíte efektivně spravovat požadavky (nejen) na IT služby?
Umíte efektivně spravovat požadavky (nejen) na IT služby?
OKsystem
 

Mehr von OKsystem (20)

Smart Cards & Devices Forum 2013 - Aritmetika s velkými čísly
Smart Cards & Devices Forum 2013 - Aritmetika s velkými číslySmart Cards & Devices Forum 2013 - Aritmetika s velkými čísly
Smart Cards & Devices Forum 2013 - Aritmetika s velkými čísly
 
Smart Cards & Devices Forum 2013 - Mobile financial services
Smart Cards & Devices Forum 2013 - Mobile financial servicesSmart Cards & Devices Forum 2013 - Mobile financial services
Smart Cards & Devices Forum 2013 - Mobile financial services
 
Smart Cards & Devices Forum 2013 - Komerční prezentace aplikace cryptocult
Smart Cards & Devices Forum 2013 - Komerční prezentace aplikace cryptocultSmart Cards & Devices Forum 2013 - Komerční prezentace aplikace cryptocult
Smart Cards & Devices Forum 2013 - Komerční prezentace aplikace cryptocult
 
Smart Cards & Devices Forum 2013 - Cards going mobile
Smart Cards & Devices Forum 2013 - Cards going mobileSmart Cards & Devices Forum 2013 - Cards going mobile
Smart Cards & Devices Forum 2013 - Cards going mobile
 
Smart Cards & Devices Forum 2013 - Babel
Smart Cards & Devices Forum 2013 - BabelSmart Cards & Devices Forum 2013 - Babel
Smart Cards & Devices Forum 2013 - Babel
 
Smart Cards & Devices Forum 2013 - Zabezpečení mobilních bankovnictví
Smart Cards & Devices Forum 2013 - Zabezpečení mobilních bankovnictvíSmart Cards & Devices Forum 2013 - Zabezpečení mobilních bankovnictví
Smart Cards & Devices Forum 2013 - Zabezpečení mobilních bankovnictví
 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
 
Smart Cards & Devices Forum 2013 - Security on mobile
Smart Cards & Devices Forum 2013 - Security on mobileSmart Cards & Devices Forum 2013 - Security on mobile
Smart Cards & Devices Forum 2013 - Security on mobile
 
Smart Cards & Devices Forum 2013 - Šifrování hlasu včera a dnes
Smart Cards & Devices Forum 2013 - Šifrování hlasu včera a dnesSmart Cards & Devices Forum 2013 - Šifrování hlasu včera a dnes
Smart Cards & Devices Forum 2013 - Šifrování hlasu včera a dnes
 
Smart Cards & Devices Forum 2013 - [NFC@Telefonica CZ] Near Future Cases
Smart Cards & Devices Forum 2013 - [NFC@Telefonica CZ] Near Future CasesSmart Cards & Devices Forum 2013 - [NFC@Telefonica CZ] Near Future Cases
Smart Cards & Devices Forum 2013 - [NFC@Telefonica CZ] Near Future Cases
 
Smart Card and Strong Cryptography for instant security
Smart Card and Strong Cryptography for instant securitySmart Card and Strong Cryptography for instant security
Smart Card and Strong Cryptography for instant security
 
OKbase - Efektivní využití moderních IT nástrojů při řízení HR
OKbase - Efektivní využití moderních IT nástrojů při řízení HROKbase - Efektivní využití moderních IT nástrojů při řízení HR
OKbase - Efektivní využití moderních IT nástrojů při řízení HR
 
OKbase - Optimalizujte náklady na vzdělávání moderně
OKbase - Optimalizujte náklady na vzdělávání moderněOKbase - Optimalizujte náklady na vzdělávání moderně
OKbase - Optimalizujte náklady na vzdělávání moderně
 
OKbase - moderní IT nástroj pro HR
OKbase - moderní IT nástroj pro HROKbase - moderní IT nástroj pro HR
OKbase - moderní IT nástroj pro HR
 
OKadresy - (nejen) od UIR-ADR k RUIAN
OKadresy - (nejen) od UIR-ADR k RUIANOKadresy - (nejen) od UIR-ADR k RUIAN
OKadresy - (nejen) od UIR-ADR k RUIAN
 
Software pro čipové karty
Software pro čipové kartySoftware pro čipové karty
Software pro čipové karty
 
MicroStrategy GI a GIS Connector
MicroStrategy GI a GIS ConnectorMicroStrategy GI a GIS Connector
MicroStrategy GI a GIS Connector
 
Od atributu k reportu
Od atributu k reportuOd atributu k reportu
Od atributu k reportu
 
Outsourcing - pohled dodavatele
Outsourcing - pohled dodavateleOutsourcing - pohled dodavatele
Outsourcing - pohled dodavatele
 
Umíte efektivně spravovat požadavky (nejen) na IT služby?
Umíte efektivně spravovat požadavky (nejen) na IT služby?Umíte efektivně spravovat požadavky (nejen) na IT služby?
Umíte efektivně spravovat požadavky (nejen) na IT služby?
 

Kürzlich hochgeladen

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

Smart Cards & Devices Forum 2013 - Wi-fi protected setup

  • 1. Smart Cards & Devices Forum 2013, May 23rd, Prague Wi-Fi Protected Setup Friend or Foe? Tomáš Rosa http://crypto.hyperlink.cz
  • 2. Smart Cards & Devices Forum 2013 Part ONE WPS Introduction
  • 3. Smart Cards & Devices Forum 2013 WPS Standard Body  Defined by Wi-Fi Alliance in public, but paid standard [2], [7].  It goes in parallel with IEEE 802.11 machinery.  It addresses the user experience of automated Wi-Fi setup that is somehow completely neglected by 802.11.  Anyway, such activity is crucial for Wi-Fi-based smart devices interworking.  Also termed as:  “Wi-Fi Simple Configuration” - WSC
  • 4. Smart Cards & Devices Forum 2013 Magic Triangle Tells the Story Registrar Access PointEnrollee interface E interface M interface A
  • 5. Smart Cards & Devices Forum 2013 Practical Use Cases I  Enrollee pretends to be an external Registrar and pulls WLAN credentials from AP for its own setup.  After having sipped the secret sauce, the Enrollee resigns its role of WLAN manager.  In this setup, the idea of PIN brute force attack originated [5], [9]. Registrar Enrollee Access Point interface (A), M
  • 6. Smart Cards & Devices Forum 2013 Practical Use Cases II  AP implements built-in Registrar for new Enrollees provisioning.  Variants include external UPnP Registrar whose communication with Enrollees is proxied through AP. Registrar Enrollee Access Point interface A, E
  • 7. Smart Cards & Devices Forum 2013 Device Password Quest  In-band mutual authentication for E and M links is based on Device Password.  Registration Protocol describes the core verification procedure.  To be safe, we shall:  Use fresh Device Password for each and every authentication run.  Follow special technical procedures for brute-force prevention, etc. [2], [7]
  • 8. Smart Cards & Devices Forum 2013 Born Slippy – Static PIN
  • 9. Smart Cards & Devices Forum 2013 Going Simpler Than Simple  PBC – PushButton Configuration  Pressing a dedicated button (SW or HW) sets Device Password = “0000 0000”  There are further technical procedures [7] that are worth study.  As requirements for secure design.  As inspiration for penetration tests.
  • 10. Smart Cards & Devices Forum 2013 In Other Words  What do we need to get a super-strong WPA2 password out of a physically accessible AP?  Dismantle the case and start debugging the firmware?  Use HW probes for direct memory dump?  Invoke complicated side-channel attack?  Ask a crystal ball?
  • 11. Smart Cards & Devices Forum 2013 Well, Just Push the Button
  • 12. Smart Cards & Devices Forum 2013 Part TWO Bit Commitment in Nutshell
  • 13. Smart Cards & Devices Forum 2013 Bit Commitment In Nutshell  Originator announces C: C = Commit(msg, open), where msg is some yet-secret message, and open is yet-secret random value.  Later on, the Originator makes (msg, open) public.  Verifiers can then check that indeed: C = Commit(msg, open).
  • 14. Smart Cards & Devices Forum 2013 Security Requirements  Binding  Originator cannot change msg after having announced C.  Hiding  Without a help of the originator, recipient of C cannot obtain any non-negligible information on msg.  We cannot have both perfect binding and perfect concealing.  We can, however, achieve a secure enough settlement.
  • 15. Smart Cards & Devices Forum 2013 Keyed Bit Commitment  Defines CommitKey(msg, open)  Only the parties knowing the Key can participate in the protocol.  Others can only gain or introduce a (pseudo)random noise from/to the protocol flow.
  • 16. Smart Cards & Devices Forum 2013 WPS-Style Scheme CommitKey(msg, open) = = HMAC-SHA-256Key(open || msg), where open ∈R {0, 1}128.
  • 17. Smart Cards & Devices Forum 2013 Part THREE The Registration Protocol
  • 18. Smart Cards & Devices Forum 2013 Device Password Verification  Establishes mutual authentication for interfaces E and M.  Both parties are initially untrusted.  There is also an implicit key agreement securing the ongoing management messages.  PIN is a special kind of decimal-only DP.  Defines two entities: Registrar and Enrollee.  Directly fits interface E.  For interface M, the Enrollee’s role is played by AP.
  • 19. Smart Cards & Devices Forum 2013 Registration Protocol Phases 1. Ephemeral Diffie-Hellman key agreement  Steps M1, M2  Provides envelope keys: AuthKey, KeyWrapKey, and EMSK (Extended Master Session Key). 2. Device Password mutual verification  Steps M3, …, M7-A  Uses keyed Bit Commitment variant.  We focus solely on this part. 3. Configuration data exchange  Steps M7-B, M8  There can also be persistent master session that continually governs the AP (using EMSK).
  • 20. Smart Cards & Devices Forum 2013 Step M3 E-Hash1 = CommitAuthKey(DPL || PKInf, E-S1) E-Hash2 = CommitAuthKey(DPR || PKInf, E-S2) Enrollee Registrar PKInf … Diffie-Hellman public key info (ephemeral) DPL … left half of Device Password, |DPL| = [|DP| + (|DP| mod 2)]/2 DPR … right half of Device Password, |DPR| = |DP| - |DPL|
  • 21. Smart Cards & Devices Forum 2013 Step M4 R-Hash1 = CommitAuthKey(DPL || PKInf, R-S1) R-Hash2 = CommitAuthKey(DPR || PKInf, R-S2) ENCKeyWrapKey(R-S1) Enrollee Registrar PKInf … Diffie-Hellman public key info (ephemeral) DPL … left half of Device Password DPR … right half of Device Password, |DPR| ≤ |DPL|
  • 22. Smart Cards & Devices Forum 2013 Step M5 ENCKeyWrapKey(E-S1) Enrollee Registrar Finishes the mutual authentication (confirmation) of the first half of Device Password.
  • 23. Smart Cards & Devices Forum 2013 Step M6 ENCKeyWrapKey(R-S2) Enrollee Registrar Starts the mutual confirmation of the second half of Device Password.
  • 24. Smart Cards & Devices Forum 2013 Step M7 ENCKeyWrapKey(E-S2) Enrollee Registrar Finishes the mutual confirmation of the second half of Device Password.
  • 25. Smart Cards & Devices Forum 2013 Attack In M4, M6  Active online brute force on PIN by fraudulent Registrar.  Independently by Stefan Viehboeck [5] and Tactical Network Solutions in 2011 [9].  In 2008(!), described by Lindell for SSP in BT.[3]  Online attacker repeatedly queries Enrollee (usually AP), until PIN is found.  Splitting Device Password induces O(10N/2).  Requires intensive protocol restarting.  Already anticipated by WFA in 2006! [6], [7]
  • 26. Smart Cards & Devices Forum 2013 Dual Attack In M4, M6  Active offline brute force on PIN by fraudulent Enrollee.  Not so broadly exploited, yet.  Neither for Bluetooth.  Attacker receives R-S1 (R-S2) and searches offline for valid PIN.  O(10N/2), not limited (or even limitable) by peer speed.  Requires two protocol restarts plus one for utilizing the PIN.  Already anticipated by WFA! [6], [7]
  • 27. Smart Cards & Devices Forum 2013 Cousin Bluetooth “Classic”  Passkey-based Secure Simple Pairing employs the same idea [1], but:  Despite having D-H ready in place, the Bit Commitment is not D-H-keyed!  We can brute-force the PIN basing on passive interception. [3]  The verification is “over split” to bit-by-bit!  Online/offline k-bit PIN brute-force in just O(k).  So, the risk of static PIN compromise in SSP is much higher than for WPS.  It is even higher than for Bluetooth 2.0!  Despite this, Secure Simple Pairing is quite popular…
  • 28. Smart Cards & Devices Forum 2013 Bluetooth Low Energy  Even worse re-incarnation of the same idea.  Bit Commitment is not keyed.  There is even no D-H at all, so not only the PIN, but the whole link key is at risk [11].  Passkey is verified at once (no split).  Interestingly, the two Bluetooth standards exercise the two limit splitting strategies. Both wrong for static PIN.  BLE is obviously designed to be very simple and relies on many assumptions.  Fresh PIN anytime pairing is started.  No passive adversary during pairing.
  • 29. Smart Cards & Devices Forum 2013 Bit Commitment á-la BLE  Defines msg = (TK, p1, p2), where  TK is a reformatted PIN value,  p1 and p2 are certain known labels.  Furthermore open = rand.  Then C = Commit(msg, open) = = AESTK[AESTK(open ⊕ p1) ⊕ p2]
  • 30. Smart Cards & Devices Forum 2013 Lack of Binding in BLE BC  Having been given any (modified) msg and a former commitment C,  we can trivially find its new corresponding opener rand as rand = AES-1 TK [AES-1 TK(C) ⊕ p2] ⊕ p1  Actually, this is just a straight-forward CBC-MAC inversion towards IV for a known key and message.
  • 31. Smart Cards & Devices Forum 2013 One-Time PIN is Broken  Besides those weaknesses already noted in BT Core Spec. [1] and elaborated in [11], this is a new attack.  Even purely One-Time PIN authentication can be broken in BLE.  Due to the lack of binding, the attacker can utilize a cracked PIN just in the very same pairing procedure.
  • 32. Smart Cards & Devices Forum 2013 BLE_decommit(…) PoC Demonstrating the crypto exploit ------------ !new TK! : 0000000000000000000000000001E240 p1 : 05000800000302070710000001010001 p2 : 00000000A1A2A3A4A5A6B1B2B3B4B5B6 commitment : 1e1e3fef878988ead2a74dc5bef13b86 !new rand! : e27fced1adb1f637c3bbb4eaa0ba409a recomputed commitment : 1e1e3fef878988ead2a74dc5bef13b86 X-check: OK, commitment is still(!) valid Python source at: http://crypto.hyperlink.cz/files/blecommit.py
  • 33. Smart Cards & Devices Forum 2013 Countermeasure  Assuming only open can change after sending the commitment C, there are several ways to a trivial fix. Either C = AESTK ⊕ open [AESTK ⊕ open (open ⊕ p1) ⊕ p2] Or C = AESTK [AESTK (open ⊕ p1) ⊕ open ⊕ p2] Or Even C = AESTK [AESTK (open ⊕ p1) ⊕ p2] ⊕ open
  • 34. Smart Cards & Devices Forum 2013 Apropos Bluetooth… Affordable Bluetooth hacking tool is here!
  • 35. Smart Cards & Devices Forum 2013 Part FOUR The Swamp
  • 36. Smart Cards & Devices Forum 2013 WPS Patching Obstacles  Or, why this effort usually fails?  Uneasy to correctly stop WPS flow without leaking any useful information.  PIN-masking is of no help:  The mask function – whatever it is – must be still computable by any active WLAN entity, so it is no obstacle for active brute force.  Joining both PIN halves facilitates the dual attack.  Furthermore, it is impractical to patch all devices. Usually, we can patch AP only.
  • 37. Smart Cards & Devices Forum 2013 Swamp  WPS PIN-verification hardening in case of standard countermeasures do not help.  E.g. autonomous, loosely supervised AP with static PIN and high availability demands.  Addresses the original attack [5] by patching the Enrollee (AP) only.  No need to patch the Registrars.  Reinstalls O(10N) complexity.  Preserves reasonable resistance against the dual attack.
  • 38. Smart Cards & Devices Forum 2013 New Registration Protocol  Two phases at the Enrollee (AP) side.  Brave Step. We behave according to the original standard, so giving the Registrar a chance to authenticate.  Swamp Walk. After a few failed Brave Steps, we start behaving according to the Swamp rules.  Swamp Walk terminates either by a successful authentication, long timeout, or supervisor intervention.
  • 39. Smart Cards & Devices Forum 2013 Brave Step  Necessary to:  handle ephemeral PIN,  prevent honest users annoyance.  Only just a few steps shall be allowed.  Say three attempts before swamp.  The number is settlement between comfort and information leakage.
  • 40. Smart Cards & Devices Forum 2013 Swamp Walk Remarks  We shall still pay attention to brute-force feasibility.  The PIN entropy still matters.  We still need to enforce a safe response rate.  We shall monitor persistent active attackers.  Swamp is just a significant sidekick, not a whole solution.  It helps by reinstalling the “full exponential” brute force complexity.  In other words, it reliefs the pain introduced by the PIN splitting which was, however, necessary to defeat the dual attack…
  • 41. Smart Cards & Devices Forum 2013 How About Cousin Bluetooth?  Secure Simple Pairing can be patched in the same way.  Helps to cope with the active online adversary playing the Initiator role.  Reinstalls O(2k) complexity.  Needs just a slight tailoring for the higher splitting rate.  Blue Swamp…  Hint: Manage all but the final PIN bits in the same way as DPL *.
  • 42. Smart Cards & Devices Forum 2013 Conclusion  Wi-Fi Protected Setup employs reasonable cryptographic protocol for practically feasible and yet-secure PIN-based key agreement.  The key can be then used to manage network credentials.  Same principle as Secure Simple Pairing in Bluetooth. With one exception – WPS is more secure.  Special care must be taken for static PIN.  We shall read the standard – it is almost all in there!  Anyway, this is a vital place where to look for penetration tests inspiration.
  • 43. Smart Cards & Devices Forum 2013 Acknowledgement Special thanks goes to Tomáš Jabůrek and Radek Komanický of Raiffeisenbank CZ for continual support.
  • 44. Smart Cards & Devices Forum 2013 Thank You For Attention Tomáš Rosa, Ph.D. http://crypto.hyperlink.cz
  • 45. Smart Cards & Devices Forum 2013 References 1. Bluetooth Core Specification, ver. 4.0, Bluetooth SIG, June 2010 2. IBSS with Wi-Fi Protected Setup, Technical Specification, ver. 1.0.0, Wi-Fi Alliance, November 2012 3. Lindell, A.-Y.: Attacks on the Pairing Protocol of Bluetooth v2.1, Black Hat USA 2008, June 2008 4. Lulev, H.: Overview of Bit Commitment Schemes, Bachelor Thesis at Darmstadt University of Technology, Department of Computer Science, December 2007 5. Viehboeck, S.: Brute forcing Wi-Fi Protected Setup – When Poor Design Meets Poor Implementation, ver. 3, December 2011 6. Wi-Fi Protected Setup Specification, ver. 1.0h, Wi-Fi Alliance, December 2006 7. Wi-Fi Simple Configuration, Technical Specification, ver. 2.0.2, Wi-Fi Alliance, January 2012 8. http://www.wi-fi.org/knowledge-center/articles/wi-fi-protected-setup [retrieved May-02-2013] 9. http://www.tacnetsol.com/news/2011/12/28/cracking-wifi-protected-setup-with-reaver.html, December 2011 [retrieved May-02-2013] 10. http://ubertooth.sourceforge.net/ [retrieved May-02-2013] 11. Ryan, M.: How Smart is Bluetooth Smart?, Shmoocon 2013, Feb 16th, http://lacklustre.net/ [retrieved May-16-2013]