SlideShare una empresa de Scribd logo
1 de 19
Descargar para leer sin conexión
Wi-Fi: Open or Secure
                            Making the best out of both...




    Presented by François Proulx
    At the HackFest 2011

Wednesday, 9 November, 11
Who am I ?
      •       François Proulx
            •   Jack of all trade, master of none
            •   RFCs junkie
            •   Specialized in mobile development (iOS)


            •      Been into Wi-Fi (in)security for a while
            •      Founding member of Île Sans Fil
            •      Started the WiFiDog captive portal


            •      Studied 802.11 specs in more depth while working on
                   a Wi-Fi based location system - iFIND @ MIT
Wednesday, 9 November, 11
The take-away message for this talk

      •       We need to fix the insecurity of Wi-Fi hotspot
      •       We already have all the building blocks we need


      •       There’s a simple and elegant solution and
              it is entirely software based
            •     It’s called “Secure Open Wireless Access”


      •       We, as security pundits, need to advocate so that the
              industry makes the necessary changes


Wednesday, 9 November, 11
But let’s rewind for a moment

      •       A brief recap of the state of 802.11
            •   1999 - IEEE 802.11b (the one we know and love)
                  •Open System Authentication
                  •Shared Key Authentication (i.e. WEP)
            •   2001 - 2005
                  •WEP proved utterly insecure (WEP cracking as a sport)
            •   In the meantime...
                  •Starbucks sells outrageously expensive lattés
                   + Wi-Fi to poser kids surfing the Interwebs on their
                   shiny MacBook Pro

Wednesday, 9 November, 11
The state of 802.11 continued...
      •       At home
            •   We tell everybody to secure their home router by
                using WPA2 with an unguessable passphrase
      •       In public Wi-Fi hotspots
            •   It is still the far west (MITM, Firesheep, SSLStrip, etc.)
            •   The majority of hotspots are Open Wi-Fi APs
            •   We know the dangers, so we behave accordingly
                  • Use SSL for all sensitive traffic
                  • Or VPN out to a safer place
            •   Meanwhile, the latté-sipping poser kids have lots of
                fun browsing the Interwebs ... at our expense ;-)

Wednesday, 9 November, 11
What can we do about it?
   • We want robust and yet usable security
     • WPA2 + scan-click-and-connect usability
      •       We have very strong building blocks available
            •  802.11i brought us 802.1X over wireless (EAPoW)
            •  Most of us don’t use 802.1X at home


      •       On the enterprise side, though...
            •  EAP is a way for deploying secure and robust setups
      •       Many EAP authentication methods exist (> 40)
            •  LEAP, EAP-TLS, EAP-TTLS, EAP-SIM, EAP-AKA...
Wednesday, 9 November, 11
How can we leverage EAP
   for the good of public Wi-Fi hotspots?

      •       Enter “Secure Open Wireless Access” (SOWA)
            •   A simple technique relying on WPA2 with EAP-TLS
      •       Typically, EAP-TLS requires server and client side certs.
      •       Efficiently distributing certificates to clients
              can be a pain in the b*tt
      •       Good! That’s the part we throw aside for SOWA


      •       Works just like the good old Web (HTTPS)
            •  You type in an address (ex. https://www.paypal.com),
               establish an SSL connection (one-way auth.)
            •  With SOWA you pick the SSID and do anon. EAP-TLS

Wednesday, 9 November, 11
Brief recap of EAP-TLS




 http://commons.wikimedia.org/wiki/File:EAP-TLS_handshake.png

Wednesday, 9 November, 11
Brief recap of EAP-TLS




 http://commons.wikimedia.org/wiki/File:EAP-TLS_handshake.png

Wednesday, 9 November, 11
Brief recap of EAP-TLS




 http://commons.wikimedia.org/wiki/File:EAP-TLS_handshake.png

Wednesday, 9 November, 11
Wait! Is that compliant with the spec?



      •       Actually, yes it is!
      •       RFC5216 (latest version of EAP-TLS) defines the
              certificate_request message as optional
      •       The auth. server (RADIUS) can skip that message
              (most implementations already behave correctly)

      •       The idea was that APs could be used anonymously
              for emergency services


   http://tools.ietf.org/html/rfc5216
   http://tools.ietf.org/html/draft-ietf-ecrit-unauthenticated-access-03

Wednesday, 9 November, 11
What do we need to deploy it?




                       Note the secure.expensivecafe.com string
                 in both the SSID and the certifcate common name (CN)

                             They need to match to provide authentication
                            Protecting the user against rogue access points
Wednesday, 9 November, 11
But... it’s not that easy

      1. Operating Systems patches
        • Network selection GUI (to allow connection without a client cert.)
        • Supplicant (so that is matches the SSID with the CN in the X.509 cert)
      2. RADIUS server patches (FreeRadius patches exist)
        • Allowing anonymous EAP-TLS
      3. APs should use the RSN caps field (802.11 beacon)
         to differentiate from other EAP-TLS SSID
              (NOT mandatory for SOWA to work, but helps usability)




Wednesday, 9 November, 11
But... it’s not that easy

      1. Operating Systems patches
        • Network selection GUI (to allow connection without a client cert.)
        • Supplicant (so that is matches the SSID with the CN in the X.509 cert)
      2. RADIUS server patches (FreeRadius patches exist)
        • Allowing anonymous EAP-TLS
      3. APs should use the RSN caps field (802.11 beacon)
         to differentiate from other EAP-TLS SSID
              (NOT mandatory for SOWA to work, but helps usability)




Wednesday, 9 November, 11
Food for thought...
      •       What kind of iconography should we use to differentiate
            •  “Open”
            •  “Secure and Authenticated”
            •  “Secure Open”




Wednesday, 9 November, 11
Food for thought...
      •       What kind of iconography should we use to differentiate
            •  “Open”
            •  “Secure and Authenticated”
            •  “Secure Open”




Wednesday, 9 November, 11
Please, help us spread the word



      •       Thanks to Chris Byrd and IBM X-Force for inventing the
              technique and presenting it at BlackHat 2011
              http://blogs.iss.net/archive/SownCode.html

      •       There’s still a long way to go before SOWA can be used
              by actual users, but play with it and spread the word




Wednesday, 9 November, 11
Q&A
                 +
               Demo
Wednesday, 9 November, 11
Q&A
                 +
               Demo
Wednesday, 9 November, 11

Más contenido relacionado

La actualidad más candente

Kali linux
Kali linux Kali linux
Kali linux Fa6ma_
 
Computer Architecture - Software - Lessons 11-12 - Windows networking and the...
Computer Architecture - Software - Lessons 11-12 - Windows networking and the...Computer Architecture - Software - Lessons 11-12 - Windows networking and the...
Computer Architecture - Software - Lessons 11-12 - Windows networking and the...Eric Vanderburg
 
Hack wifi password using kali linux
Hack wifi password using kali linuxHack wifi password using kali linux
Hack wifi password using kali linuxHelder Oliveira
 
Kali Linux - CleveSec 2015
Kali Linux - CleveSec 2015Kali Linux - CleveSec 2015
Kali Linux - CleveSec 2015TGodfrey
 
Developers are from Mars, Security guys are from Venus
Developers are from Mars, Security guys are from VenusDevelopers are from Mars, Security guys are from Venus
Developers are from Mars, Security guys are from VenusXavier Mertens
 
Kali linux and some features [view in Full screen mode]
Kali linux and some features [view in Full screen mode]Kali linux and some features [view in Full screen mode]
Kali linux and some features [view in Full screen mode]abdou Bahassou
 

La actualidad más candente (20)

Kali linux
Kali linux Kali linux
Kali linux
 
Computer Architecture - Software - Lessons 11-12 - Windows networking and the...
Computer Architecture - Software - Lessons 11-12 - Windows networking and the...Computer Architecture - Software - Lessons 11-12 - Windows networking and the...
Computer Architecture - Software - Lessons 11-12 - Windows networking and the...
 
kali linux
kali linuxkali linux
kali linux
 
Kali linux
Kali linuxKali linux
Kali linux
 
Kali linux summarised
Kali linux summarisedKali linux summarised
Kali linux summarised
 
Kali linux os
Kali linux osKali linux os
Kali linux os
 
Hack wifi password using kali linux
Hack wifi password using kali linuxHack wifi password using kali linux
Hack wifi password using kali linux
 
Kali linux
Kali linuxKali linux
Kali linux
 
Kali Linux
Kali LinuxKali Linux
Kali Linux
 
Kali Linux - CleveSec 2015
Kali Linux - CleveSec 2015Kali Linux - CleveSec 2015
Kali Linux - CleveSec 2015
 
Kali linux
Kali linuxKali linux
Kali linux
 
Developers are from Mars, Security guys are from Venus
Developers are from Mars, Security guys are from VenusDevelopers are from Mars, Security guys are from Venus
Developers are from Mars, Security guys are from Venus
 
kali linux
kali linux kali linux
kali linux
 
Kali linux
Kali linuxKali linux
Kali linux
 
Kali linux
Kali linuxKali linux
Kali linux
 
Kali linux tutorial
Kali linux tutorialKali linux tutorial
Kali linux tutorial
 
Kali Linux
Kali LinuxKali Linux
Kali Linux
 
kali linux.pptx
kali linux.pptxkali linux.pptx
kali linux.pptx
 
Kali linux and some features [view in Full screen mode]
Kali linux and some features [view in Full screen mode]Kali linux and some features [view in Full screen mode]
Kali linux and some features [view in Full screen mode]
 
Kalilinux
KalilinuxKalilinux
Kalilinux
 

Destacado (20)

Digital network lecturer5
Digital network  lecturer5Digital network  lecturer5
Digital network lecturer5
 
Digital network lecturer7
Digital network  lecturer7Digital network  lecturer7
Digital network lecturer7
 
Four electrical conduit mounting tips
Four electrical conduit mounting tipsFour electrical conduit mounting tips
Four electrical conduit mounting tips
 
Digital network lecturer4
Digital network  lecturer4Digital network  lecturer4
Digital network lecturer4
 
Comandos linux
Comandos linuxComandos linux
Comandos linux
 
Maximizing Conduit Manager For Electric Distribution
Maximizing Conduit Manager For Electric DistributionMaximizing Conduit Manager For Electric Distribution
Maximizing Conduit Manager For Electric Distribution
 
OpenWRT and Perl
OpenWRT and PerlOpenWRT and Perl
OpenWRT and Perl
 
IEEE 802.11ac Standard
IEEE 802.11ac StandardIEEE 802.11ac Standard
IEEE 802.11ac Standard
 
Intro to Enterprise Wi-Fi Troubleshooting
Intro to Enterprise Wi-Fi TroubleshootingIntro to Enterprise Wi-Fi Troubleshooting
Intro to Enterprise Wi-Fi Troubleshooting
 
802.11ac: What It Is and Why You Need It
802.11ac: What It Is and Why You Need It802.11ac: What It Is and Why You Need It
802.11ac: What It Is and Why You Need It
 
Advanced RF Design & Troubleshooting
Advanced RF Design & TroubleshootingAdvanced RF Design & Troubleshooting
Advanced RF Design & Troubleshooting
 
OpenWRT guide and memo
OpenWRT guide and memoOpenWRT guide and memo
OpenWRT guide and memo
 
Digital network lecturer8
Digital network  lecturer8Digital network  lecturer8
Digital network lecturer8
 
802.11ac Gigabit Wi-Fi Infographic
802.11ac Gigabit Wi-Fi Infographic802.11ac Gigabit Wi-Fi Infographic
802.11ac Gigabit Wi-Fi Infographic
 
802.11ac
802.11ac802.11ac
802.11ac
 
Digital network lecturer3
Digital network  lecturer3Digital network  lecturer3
Digital network lecturer3
 
WPA2
WPA2WPA2
WPA2
 
Wireless AP Product Catalog
Wireless AP Product CatalogWireless AP Product Catalog
Wireless AP Product Catalog
 
Wireless technologies
Wireless technologiesWireless technologies
Wireless technologies
 
Mining a Large Web Corpus
Mining a Large Web CorpusMining a Large Web Corpus
Mining a Large Web Corpus
 

Similar a Wi-Fi: Secure or Open / Secure Open Wireless Access / SOWA @ HackFest 2011

High Availability Asterisk and FreePBX on Microsoft Azure
High Availability Asterisk and FreePBX on Microsoft AzureHigh Availability Asterisk and FreePBX on Microsoft Azure
High Availability Asterisk and FreePBX on Microsoft AzureSanjay Willie
 
Overview & Demo: OpSource Cloud
Overview & Demo: OpSource CloudOverview & Demo: OpSource Cloud
Overview & Demo: OpSource CloudOpSource
 
Setting Up .Onion Addresses for your Enterprise, v3.5
Setting Up .Onion Addresses for your Enterprise, v3.5Setting Up .Onion Addresses for your Enterprise, v3.5
Setting Up .Onion Addresses for your Enterprise, v3.5Alec Muffett
 
Share on LinkedIn Share on Twitter Share on Facebook Share on Google+ Share b...
Share on LinkedIn Share on Twitter Share on Facebook Share on Google+ Share b...Share on LinkedIn Share on Twitter Share on Facebook Share on Google+ Share b...
Share on LinkedIn Share on Twitter Share on Facebook Share on Google+ Share b...Avere Systems
 
Connecting Oracle Cloud to your Data Centre (Part A)
Connecting Oracle Cloud to your Data Centre (Part A)Connecting Oracle Cloud to your Data Centre (Part A)
Connecting Oracle Cloud to your Data Centre (Part A)Simon Haslam
 
The First Mile -- Edge and IoT Data Collection with Apache NiFi and MiNiFi
The First Mile -- Edge and IoT Data Collection with Apache NiFi and MiNiFiThe First Mile -- Edge and IoT Data Collection with Apache NiFi and MiNiFi
The First Mile -- Edge and IoT Data Collection with Apache NiFi and MiNiFiDataWorks Summit
 
Introduction to Filecoin
Introduction to Filecoin   Introduction to Filecoin
Introduction to Filecoin Vanessa Lošić
 
Access over Ethernet: Insecurites in AoE
Access over Ethernet: Insecurites in AoEAccess over Ethernet: Insecurites in AoE
Access over Ethernet: Insecurites in AoEamiable_indian
 
Hands-on Lab: Test Drive Your OpenStack Network
Hands-on Lab: Test Drive Your OpenStack NetworkHands-on Lab: Test Drive Your OpenStack Network
Hands-on Lab: Test Drive Your OpenStack NetworkPLUMgrid
 
The First Mile - Edge and IoT Data Collection With Apache Nifi and MiniFi
The First Mile - Edge and IoT Data Collection With Apache Nifi and MiniFiThe First Mile - Edge and IoT Data Collection With Apache Nifi and MiniFi
The First Mile - Edge and IoT Data Collection With Apache Nifi and MiniFiDataWorks Summit
 
The Pendulum Swings Back: Converged and Hyperconverged Environments
The Pendulum Swings Back: Converged and Hyperconverged EnvironmentsThe Pendulum Swings Back: Converged and Hyperconverged Environments
The Pendulum Swings Back: Converged and Hyperconverged EnvironmentsTony Pearson
 
80211 the end of wireles or is it
80211 the end of wireles or is it80211 the end of wireles or is it
80211 the end of wireles or is itInterop
 
Internet2 DNSSEC Pilot
Internet2 DNSSEC PilotInternet2 DNSSEC Pilot
Internet2 DNSSEC PilotShumon Huque
 
OpenStack 101 - All Things Open 2015
OpenStack 101 - All Things Open 2015OpenStack 101 - All Things Open 2015
OpenStack 101 - All Things Open 2015Mark Voelker
 
[CLASS 2014] Palestra Técnica - Jonathan Knudsen
[CLASS 2014] Palestra Técnica - Jonathan Knudsen[CLASS 2014] Palestra Técnica - Jonathan Knudsen
[CLASS 2014] Palestra Técnica - Jonathan KnudsenTI Safe
 
Asia Pacific Internet Leadership Program
Asia Pacific Internet Leadership ProgramAsia Pacific Internet Leadership Program
Asia Pacific Internet Leadership ProgramAPNIC
 
Chris Swan's presentation for Thingmonk 2014 - security protocols in constra...
Chris Swan's presentation for Thingmonk 2014 -  security protocols in constra...Chris Swan's presentation for Thingmonk 2014 -  security protocols in constra...
Chris Swan's presentation for Thingmonk 2014 - security protocols in constra...Cohesive Networks
 
DEF CON 27 - ORANGE TSAI and MEH CHANG - infiltrating corporate intranet like...
DEF CON 27 - ORANGE TSAI and MEH CHANG - infiltrating corporate intranet like...DEF CON 27 - ORANGE TSAI and MEH CHANG - infiltrating corporate intranet like...
DEF CON 27 - ORANGE TSAI and MEH CHANG - infiltrating corporate intranet like...Felipe Prado
 

Similar a Wi-Fi: Secure or Open / Secure Open Wireless Access / SOWA @ HackFest 2011 (20)

High Availability Asterisk and FreePBX on Microsoft Azure
High Availability Asterisk and FreePBX on Microsoft AzureHigh Availability Asterisk and FreePBX on Microsoft Azure
High Availability Asterisk and FreePBX on Microsoft Azure
 
Airheads dallas 2011 wireless security
Airheads dallas 2011   wireless securityAirheads dallas 2011   wireless security
Airheads dallas 2011 wireless security
 
Overview & Demo: OpSource Cloud
Overview & Demo: OpSource CloudOverview & Demo: OpSource Cloud
Overview & Demo: OpSource Cloud
 
Setting Up .Onion Addresses for your Enterprise, v3.5
Setting Up .Onion Addresses for your Enterprise, v3.5Setting Up .Onion Addresses for your Enterprise, v3.5
Setting Up .Onion Addresses for your Enterprise, v3.5
 
Share on LinkedIn Share on Twitter Share on Facebook Share on Google+ Share b...
Share on LinkedIn Share on Twitter Share on Facebook Share on Google+ Share b...Share on LinkedIn Share on Twitter Share on Facebook Share on Google+ Share b...
Share on LinkedIn Share on Twitter Share on Facebook Share on Google+ Share b...
 
Connecting Oracle Cloud to your Data Centre (Part A)
Connecting Oracle Cloud to your Data Centre (Part A)Connecting Oracle Cloud to your Data Centre (Part A)
Connecting Oracle Cloud to your Data Centre (Part A)
 
The First Mile -- Edge and IoT Data Collection with Apache NiFi and MiNiFi
The First Mile -- Edge and IoT Data Collection with Apache NiFi and MiNiFiThe First Mile -- Edge and IoT Data Collection with Apache NiFi and MiNiFi
The First Mile -- Edge and IoT Data Collection with Apache NiFi and MiNiFi
 
Introduction to Filecoin
Introduction to Filecoin   Introduction to Filecoin
Introduction to Filecoin
 
Access over Ethernet: Insecurites in AoE
Access over Ethernet: Insecurites in AoEAccess over Ethernet: Insecurites in AoE
Access over Ethernet: Insecurites in AoE
 
Hands-on Lab: Test Drive Your OpenStack Network
Hands-on Lab: Test Drive Your OpenStack NetworkHands-on Lab: Test Drive Your OpenStack Network
Hands-on Lab: Test Drive Your OpenStack Network
 
The First Mile - Edge and IoT Data Collection With Apache Nifi and MiniFi
The First Mile - Edge and IoT Data Collection With Apache Nifi and MiniFiThe First Mile - Edge and IoT Data Collection With Apache Nifi and MiniFi
The First Mile - Edge and IoT Data Collection With Apache Nifi and MiniFi
 
The Pendulum Swings Back: Converged and Hyperconverged Environments
The Pendulum Swings Back: Converged and Hyperconverged EnvironmentsThe Pendulum Swings Back: Converged and Hyperconverged Environments
The Pendulum Swings Back: Converged and Hyperconverged Environments
 
80211 the end of wireles or is it
80211 the end of wireles or is it80211 the end of wireles or is it
80211 the end of wireles or is it
 
Internet2 DNSSEC Pilot
Internet2 DNSSEC PilotInternet2 DNSSEC Pilot
Internet2 DNSSEC Pilot
 
OpenStack 101
OpenStack 101OpenStack 101
OpenStack 101
 
OpenStack 101 - All Things Open 2015
OpenStack 101 - All Things Open 2015OpenStack 101 - All Things Open 2015
OpenStack 101 - All Things Open 2015
 
[CLASS 2014] Palestra Técnica - Jonathan Knudsen
[CLASS 2014] Palestra Técnica - Jonathan Knudsen[CLASS 2014] Palestra Técnica - Jonathan Knudsen
[CLASS 2014] Palestra Técnica - Jonathan Knudsen
 
Asia Pacific Internet Leadership Program
Asia Pacific Internet Leadership ProgramAsia Pacific Internet Leadership Program
Asia Pacific Internet Leadership Program
 
Chris Swan's presentation for Thingmonk 2014 - security protocols in constra...
Chris Swan's presentation for Thingmonk 2014 -  security protocols in constra...Chris Swan's presentation for Thingmonk 2014 -  security protocols in constra...
Chris Swan's presentation for Thingmonk 2014 - security protocols in constra...
 
DEF CON 27 - ORANGE TSAI and MEH CHANG - infiltrating corporate intranet like...
DEF CON 27 - ORANGE TSAI and MEH CHANG - infiltrating corporate intranet like...DEF CON 27 - ORANGE TSAI and MEH CHANG - infiltrating corporate intranet like...
DEF CON 27 - ORANGE TSAI and MEH CHANG - infiltrating corporate intranet like...
 

Último

Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 

Último (20)

Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 

Wi-Fi: Secure or Open / Secure Open Wireless Access / SOWA @ HackFest 2011

  • 1. Wi-Fi: Open or Secure Making the best out of both... Presented by François Proulx At the HackFest 2011 Wednesday, 9 November, 11
  • 2. Who am I ? • François Proulx • Jack of all trade, master of none • RFCs junkie • Specialized in mobile development (iOS) • Been into Wi-Fi (in)security for a while • Founding member of Île Sans Fil • Started the WiFiDog captive portal • Studied 802.11 specs in more depth while working on a Wi-Fi based location system - iFIND @ MIT Wednesday, 9 November, 11
  • 3. The take-away message for this talk • We need to fix the insecurity of Wi-Fi hotspot • We already have all the building blocks we need • There’s a simple and elegant solution and it is entirely software based • It’s called “Secure Open Wireless Access” • We, as security pundits, need to advocate so that the industry makes the necessary changes Wednesday, 9 November, 11
  • 4. But let’s rewind for a moment • A brief recap of the state of 802.11 • 1999 - IEEE 802.11b (the one we know and love) •Open System Authentication •Shared Key Authentication (i.e. WEP) • 2001 - 2005 •WEP proved utterly insecure (WEP cracking as a sport) • In the meantime... •Starbucks sells outrageously expensive lattés + Wi-Fi to poser kids surfing the Interwebs on their shiny MacBook Pro Wednesday, 9 November, 11
  • 5. The state of 802.11 continued... • At home • We tell everybody to secure their home router by using WPA2 with an unguessable passphrase • In public Wi-Fi hotspots • It is still the far west (MITM, Firesheep, SSLStrip, etc.) • The majority of hotspots are Open Wi-Fi APs • We know the dangers, so we behave accordingly • Use SSL for all sensitive traffic • Or VPN out to a safer place • Meanwhile, the latté-sipping poser kids have lots of fun browsing the Interwebs ... at our expense ;-) Wednesday, 9 November, 11
  • 6. What can we do about it? • We want robust and yet usable security • WPA2 + scan-click-and-connect usability • We have very strong building blocks available • 802.11i brought us 802.1X over wireless (EAPoW) • Most of us don’t use 802.1X at home • On the enterprise side, though... • EAP is a way for deploying secure and robust setups • Many EAP authentication methods exist (> 40) • LEAP, EAP-TLS, EAP-TTLS, EAP-SIM, EAP-AKA... Wednesday, 9 November, 11
  • 7. How can we leverage EAP for the good of public Wi-Fi hotspots? • Enter “Secure Open Wireless Access” (SOWA) • A simple technique relying on WPA2 with EAP-TLS • Typically, EAP-TLS requires server and client side certs. • Efficiently distributing certificates to clients can be a pain in the b*tt • Good! That’s the part we throw aside for SOWA • Works just like the good old Web (HTTPS) • You type in an address (ex. https://www.paypal.com), establish an SSL connection (one-way auth.) • With SOWA you pick the SSID and do anon. EAP-TLS Wednesday, 9 November, 11
  • 8. Brief recap of EAP-TLS http://commons.wikimedia.org/wiki/File:EAP-TLS_handshake.png Wednesday, 9 November, 11
  • 9. Brief recap of EAP-TLS http://commons.wikimedia.org/wiki/File:EAP-TLS_handshake.png Wednesday, 9 November, 11
  • 10. Brief recap of EAP-TLS http://commons.wikimedia.org/wiki/File:EAP-TLS_handshake.png Wednesday, 9 November, 11
  • 11. Wait! Is that compliant with the spec? • Actually, yes it is! • RFC5216 (latest version of EAP-TLS) defines the certificate_request message as optional • The auth. server (RADIUS) can skip that message (most implementations already behave correctly) • The idea was that APs could be used anonymously for emergency services http://tools.ietf.org/html/rfc5216 http://tools.ietf.org/html/draft-ietf-ecrit-unauthenticated-access-03 Wednesday, 9 November, 11
  • 12. What do we need to deploy it? Note the secure.expensivecafe.com string in both the SSID and the certifcate common name (CN) They need to match to provide authentication Protecting the user against rogue access points Wednesday, 9 November, 11
  • 13. But... it’s not that easy 1. Operating Systems patches • Network selection GUI (to allow connection without a client cert.) • Supplicant (so that is matches the SSID with the CN in the X.509 cert) 2. RADIUS server patches (FreeRadius patches exist) • Allowing anonymous EAP-TLS 3. APs should use the RSN caps field (802.11 beacon) to differentiate from other EAP-TLS SSID (NOT mandatory for SOWA to work, but helps usability) Wednesday, 9 November, 11
  • 14. But... it’s not that easy 1. Operating Systems patches • Network selection GUI (to allow connection without a client cert.) • Supplicant (so that is matches the SSID with the CN in the X.509 cert) 2. RADIUS server patches (FreeRadius patches exist) • Allowing anonymous EAP-TLS 3. APs should use the RSN caps field (802.11 beacon) to differentiate from other EAP-TLS SSID (NOT mandatory for SOWA to work, but helps usability) Wednesday, 9 November, 11
  • 15. Food for thought... • What kind of iconography should we use to differentiate • “Open” • “Secure and Authenticated” • “Secure Open” Wednesday, 9 November, 11
  • 16. Food for thought... • What kind of iconography should we use to differentiate • “Open” • “Secure and Authenticated” • “Secure Open” Wednesday, 9 November, 11
  • 17. Please, help us spread the word • Thanks to Chris Byrd and IBM X-Force for inventing the technique and presenting it at BlackHat 2011 http://blogs.iss.net/archive/SownCode.html • There’s still a long way to go before SOWA can be used by actual users, but play with it and spread the word Wednesday, 9 November, 11
  • 18. Q&A + Demo Wednesday, 9 November, 11
  • 19. Q&A + Demo Wednesday, 9 November, 11