SlideShare una empresa de Scribd logo
1 de 7
Descargar para leer sin conexión
Royal Holloway series | Information Security | Underexposed Risks | Public Wi-Fi Hotspots
Underexposed risks of
public Wi-Fi hotspots
This thesis outlines the consideration that should be given by
Wi-Fi hotspot users to the significant and as yet unresolved
security risk such use presents. It promotes awareness and
outlines current thinking in addressing the issue
by Daan Stakenburg and Jason Crampton
Royal Holloway series | Information Security | Underexposed Risks | Public Wi-Fi Hotspots
ISTOCKPHOTO/THINKSTOCK
Royal Holloway series | Information Security | Underexposed Risks | Public Wi-Fi Hotspots
-2-
With the increasing use of smartphones and the deployment of 4G or long-term
evolution (LTE) mobile networks, it is easy to forget the other high-speed internet
access method that is widely used by roaming mobile users: publicly accessible
wireless networks, also known as Wi-Fi hotspots. Hotspots lack the standard
security measures seen in other wireless networks, and if applications do not
implement security features, or implement them badly, these hotspots can, in
some cases, result in very insecure combinations that may lead to identity theft
and information loss.
Hotspots are very common in airports, hotels and coffee shops. They are also
starting to appear on public transport, such as trains and buses, in supermarkets
and in other, less obvious, establishments. The reason for their success is due to
the fact that they are relatively easy to set up and provide the network owner with
an additional direct or indirect stream of revenue. BT, for example, established
around 500,000 Wi-Fi hotspots in London for the 2012 Olympics.
Although there is nothing wrong with providing or using such networks, it is
important to recognise that such networks could be deployed by people with
malicious intent.
The problem
What’s in a name? Everything! The main threat to users of hotspots is that it
is difficult to corroborate the identity of a public wireless access point. Each
wireless access point announces a so-called service set identifier (SSID) to
identify the wireless network. These SSIDs are the names that are listed when
a mobile device searches for nearby wireless networks. Once successfully
connected, the SSID is usually saved by the device to facilitate subsequent
connections to the same network.
Anyone can buy and configure a wireless access point and choose the name
it announces. This could be related to the name of an establishment such as
DonutsAndBagels, but it could also be the name of a wireless network that is
commonly used, such as the wireless network name of a local telecom provider
or the name of a restaurant chain.
Herein lies the problem. When visiting a shop called Donuts & Bagels, one would
assume that the wireless network announcing the name DonutsAndBagels
in the shop’s vicinity is associated with the shop, but this assumption may be
unjustified. By deceiving users into thinking they are connecting to a genuine
access point, an attacker could perform man-in-the-middle attacks, potentially
allowing him to gain access to sensitive information.
Becoming the man-in-the middle does not have to be the attacker’s primary
objective. There are other ways of abusing the inability to properly authenticate a
nearby access point and SSID.
Raising awareness of risks associated
with the use of public Wi-Fi hotspots
All is not always as it appears when users access public Wi-Fi networks via seemingly authentic and
trustworthy providers. This thesis seeks to raise awareness of the underexposed risks for identity and
data theft by exploring the status quo and potential developments for minimising those risks
by Daan Stakenburg and Jason Crampton
Example of a captive portal
Royal Holloway series | Information Security | Underexposed Risks | Public Wi-Fi Hotspots
-3-
Wi-Fi roaming: it’s not a bug, it’s a feature
As and when necessary, most networked client devices will connect to other
access points announcing a known SSID – an understandable feature when you
consider the fact that a wireless network may contain more than one wireless
access point. This allows a client device to jump or roam between access points
without the need for user interaction. But the same happens when there is a
rogue access point advertising the SSID of a wireless network to which the
device has connected before.
Consider the following scenario when a teleworker returns to the office with
his dual-homed laptop (Figure 1). A dual-homed system is a device that can
connect into two different networks. In this case the laptop would be connected
to the corporate network with a cable (e.g. through its docking station) while
having a wireless network interface that is continuously listening for the
availability of any previously configured wireless networks it can connect to.
While the teleworker is sitting at his desk with a firewall protecting the corporate
network from the threats on the internet, an adversary tries to use the laptop
as a proverbial back door to gain access to the corporate network, systems
and data. By setting up a nearby access point with a previously used SSID, the
attacker could trick the laptop into connecting to this rogue access point. This
may allow him to gain access to the laptop and use it as a stepping stone to
other parts of that corporate network.
This may sound unlikely, but an attacker simply has to find the name of a
network to which the laptop has previously connected. With so many commonly
known hotspot networks in use today, there is a good chance an attacker will
be able to find one to which the user previously connected.
This type of attack can be mitigated through the use of a properly configured
host firewall running on the laptop. But that firewall could allow certain traffic
and/or the system may have software vulnerabilities. It is far better to enable
the network auto-switch feature that some laptop suppliers provide. This auto-
switch feature ensures that only one network interface can be active at a time.
The setting can be enabled in the BIOS of the laptop, but is not always enabled
by default.
A wireless security service (WSS) such as rogue access point detection (RAPD)
would not necessarily work. They are usually configured to detect rogue access
points that announce the same SSID as the corporate wireless network.
In our scenario, the corporate office may not even have a wireless network.
RAPD cannot provide a complete solution in this case. One might wonder
whether there is a security feature that would allow devices to confirm the
identity of a nearby hotspot. The short answer is: no, not really.
An attacker simply
has to find the name
of a network to
which the laptop
has previously
connected
Figure 1: Dual homed attack
Royal Holloway series | Information Security | Underexposed Risks | Public Wi-Fi Hotspots
-4-
In physical networking the identity of the network is not fully confirmed either,
but a physical network has physical boundaries. It is normally quite safe to
assume that a network wall socket in an office building is connected to the
company’s network. Wireless networks do not have these kinds of boundaries,
and thus require their identity to be confirmed.
Current solutions
Hotspot authentication: Hotspots currently use a technique called universal
access method (UAM) and use a captive portal to authenticate/authorise
customers. As mentioned earlier, access to the wireless network is open to any
device in the vicinity of the access point. Only when you want to use the internet
service provided by the underlying network are you requested to provide some
form of credentials or payment.
The captive portal does not provide any credible form of authentication to the
user of a wireless network, as an attacker could create an exact copy of the
genuine captive portal.
An attacker could, just like the genuine portal, even add an X.509 certificate to
his captive portal to increase its apparent trustworthiness. The certificate only
authenticates the host name of the website being accessed, which could be
any host name, including ones available to an attacker.
The validity of the certificate may be confirmed by the client, but this only
confirms the certificate authority (CA) signed the certificate for a particular
website; the CA signing the certificate may not be aware how the certificate
will be used. It should be clear that even though the two actions may
appear to be the same, authenticating the captive portal is not the same as
authenticating the wireless network.
By creating a portal of his own, an attacker could, for example, harvest
credit card information. This may not be of interest to an attacker at a small
establishment in a rural area, but has great potential at a public place, such
as an airport, with thousands of travellers passing through each day. Users
should be wary of this possible attack and only use keys or codes purchased
in advance.
Pre-shared key: Small wireless network set-ups use a so-called pre-shared
key (PSK). Users requiring access to the network are given this PSK in
advance. This PSK and associated SSID would normally provide a good level of
authentication because there is a high probability that the combination is unique,
and there is a small chance that the PSK is known to an attacker.
There is, however, only one PSK for all users. Using a PSK would prevent the
hotspot provider from uniquely identifying each user. This makes it impossible
for the provider to distinguish one user from the other, thereby restricting the
provider’s ability to charge each user separately. The PSK should be changed
regularly to prevent former users from gaining unauthorised access. But that
could only take place when there are no active users, as changing the PSK
would instantly prevent all users from accessing the network.
Using a PSK would also imply a level of trust between its users. That is clearly
an unreasonable assumption for hotspots in a public area such as a railway
station. It would allow an attacker to set up a hotspot with the same SSID and
PSK, thereby defeating the brittle level of authentication taking place. Using a
PSK to authenticate hotspots is therefore not an option.
Extensible Authentication Protocol (EAP): Larger networks use a protocol
standard called 802.1X, or “EAP over LAN”, to authenticate users. The latter
Small wireless
network set-ups
use a so-called
pre-shared key.
This should be
changed regularly
to prevent former
users from gaining
unauthorised
access
Royal Holloway series | Information Security | Underexposed Risks | Public Wi-Fi Hotspots
-5-
could be read as: LAN, not wireless LAN, because of the following reasons:
Two protocols using this standard, called protected EAP (PEAP) and tunnelled
transport layer security (TTLS), allow the use of username and password for
authentication.
To confirm the identity and authorisation of a connecting client, an access
point would allow the client to send its credentials to an external authentication
server. Before the client transmits its credentials, it would want to know if the
authentication server is a trusted entity. The identity of the authentication server
is confirmed with a digital certificate. But that certificate only confirms the
identity of the authentication server, not the association with either the SSID or
the access point.
This leaves an attacker with a way to set up a rogue 802.1X-enabled network
(Figure 2) with a known SSID of his own. When trying to authenticate such a
rogue access point, users may receive a warning about the authentication server
certificate presented not being trusted. This is because an 802.1X wireless
network is usually pre-configured on a client with a setting that only trusts a
specific CA to have signed the certificate presented by the authentication server.
Using a public CA would in this case be worse as it would allow the attacker
to get a signed, and thus trusted, certificate for his rogue authentication server
and may result in no warning to the user at all. Even if the user were warned of
certificate issues, it could easily be ignored.
Once the user accepts the rogue server, running an altered version of the
authentication service, would allow an attacker to retrieve the transmitted
credentials from users while accepting any password submitted to prevent
users from becoming suspicious. These credentials could then be used to
access the legitimate wireless network and maybe even systems residing on
the underlying network.
These implementations of 802.1X are not entirely robust methods for
authenticating hotspots for the reasons mentioned above. It would also require
the client configuration of credentials, the names of trusted authentication
servers and signing certificate authorities to be distributed in advance. Local
distribution of these settings would require hotspot providers to invest and set
up nearby vending machines or counters.
It is worth noting that administrators running 802.1X-based networks in their
enterprise should deploy their configurations to managed clients with restrictions
on possible authentication servers and certificates, and not use public CAs to
sign the authentication server certificates to prevent the above attacks from
taking place.
Figure 2: Spoofing an 802.1X wireless network
To confirm the
identity and
authorisation of a
connecting client, an
access point would
allow the client to
send its credentials
to an external
authentication
server
Royal Holloway series | Information Security | Underexposed Risks | Public Wi-Fi Hotspots
-6-
The Future
Open Wireless Network Authentication Protocol (OWNAP): A solution could
be sought in the way an internet browser authenticates a website using X.509
certificates. Each access point, or at least each wireless network, would need to
have such a certificate in place.
A client trying to establish a connection would perform the required
authentication by verifying that the name in the certificate matches both the
SSID and the access point hardware address. The client would even be able to
establish a secret key to encrypt all further communications.
This would, however, require the SSID to be globally unique. It is something
that could be achieved by registering a new top-level domain (TLD), say Wi‑Fi,
and dedicating this TLD to SSID registration alone. Then the registration of
SSIDs would provide CAs signing the SSID certificate requests with a familiar
process for verifying the owner of the SSID – CAs are used to doing this when
processing certificate renewal requests for the regular, fully qualified domain
names used with, for example, SSL/TLS.
However, deploying certificates to all access points would introduce substantial
overheads as X.509 certificates expire and need to be replaced or, in some
cases, revoked. It is therefore not expected that the proposed OWNAP protocol
would ever reach such maturity.
Hotspot 2.0: The Wi-Fi Alliance has launched an alternative to captive portal
authentication under the name Passpoint or Hotspot 2.0. It is based on the new
IEEE standard 802.11u.
In regular wireless networks, devices use active probing techniques or listen for
access point broadcasts to discover nearby wireless networks. The discovery
process of 802.11u is still the same, but it allows devices to query a Passpoint-
enabled hotspot for more information. This includes queries on the ability to
roam via the hotspot, similar to how a mobile phone roams on guest mobile
networks.
But, just like mobile networks, service providers must establish mutual roaming
agreements that cover credential validation and billing before roaming can take
place.
Once implemented Passpoint would allow the mobile service provider to
charge customers for both mobile and Wi-Fi roaming. Charging is, of course,
only possible when the device is identified and thus requires any connecting
device to be authenticated. Passpoint includes the following three techniques to
accommodate this requirement:
n EAP-SIM, which uses the GSM authentication triplet for credentials;
n EAP-AKA, which uses the UMTS authentication quintet for credentials. This
method is more secure as it includes an encrypted sequence number that is
incremented for each authentication event. It allows the device to confirm that
the home network has actually produced the challenge;
n Software agent for legacy devices such as laptops using credentials (e.g. a
username and password).
The pros and cons of Hotspot 2.0
Passpoint will increase transparency and ease of the use of secure
authenticated wireless networks and will not require the user to submit credit
card details when he/she tries to gain access to the internet. This is a big
security advantage.
The Wi-Fi Alliance
has launched an
alternative to
captive portal
authentication,
under the name
Passpoint or
Hotspot 2.0, based
on the new IEEE
standard 802.11u
Royal Holloway series | Information Security | Underexposed Risks | Public Wi-Fi Hotspots
-7-
There are, however, some things to recognise, as follows:
n The three techniques would need to implement the same certificate and
server restrictions mentioned in the EAP section, as the SSID and access
point are still not authenticated;
n An attacker could set up an access point with the same SSID as a Passpoint
access point and prevent access to the genuine access points. Though
user devices would not connect automatically to it, users can still be social
engineered into connecting and providing sensitive information: something
along the lines of “Our system is down. Your credit card will not be charged
but please provide it as a method of identification”;
n Though interesting for mobile telecom companies, others providers may
not want to upgrade to Passpoint as it will force them to share the revenue
generated. Mobile telecom providers may not allow the necessary second set
of credentials to be stored on the SIM;
n Even if a user has a Passpoint-enabled device, he or she may prefer to use
another nearby wireless network that is free of charge instead of paying
roaming charges. That network may use captive portal and not provide proper
protection;
n Tablets are being sold without a slot for a SIM card, possibly preventing these
systems from using Passpoint access points. Their access to the wireless
interface may be restricted to built-in apps;
n Legacy devices will still require a set of credentials in advance, possibly
limiting their “plug and surf” capability. The intention is to leave captive portals
in place for legacy systems
Conclusion
People generally have a good sense of whether or not they can trust other
people. These senses are part of our social skills that have been developing
since the beginning of mankind. We rely on them to protect us from harm.
We cannot do the same with technology as it requires a level of technical
understanding available to very few users.
With most preventative and detective security measures focusing on
client authentication and blocking unauthorised access, it is difficult for
devices to confirm the identity of a hotspot and establish a secure channel
of communication. Other higher level protocols, such as HTTPS, could
prevent eavesdropping, but those are not implemented all the time either. If
implemented, these higher level protocols would only provide a single layer of
security, where multiple layers would be better because a security warning may
be considered a glitch and ignored by users.
This article has shown that network entry and exit points are easy points of
attack and should therefore be properly authenticated. With Passpoint, a first
step is made towards enhancing the security measures on the user’s side. n
About the authors
Daan Stakenburg is an Information Security Architect at a global technology company listed on the London Stock
Exchange. With almost 15 years of IT experience in a variety of multinational organisations, he acts as an internal consultant
advising departments and project teams on a multitude of network and information security matters
Jason Crampton has a BSc in Mathematics (University of Manchester) and a PhD in Computer Science (University of
London). He has worked in the Information Security Group at Royal Holloway, University of London since 2002, where he is
a Professor of Information Security. His research focuses on access control in multi-user computer systems
Network entry and
exit points are easy
points of attack and
should therefore
be properly
authenticated

Más contenido relacionado

La actualidad más candente

Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and Solutionshemantchaskar
 
Paper id 2820149
Paper id 2820149Paper id 2820149
Paper id 2820149IJRAT
 
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...AIRCC Publishing Corporation
 
LBS-2011: a new model for getting local content
LBS-2011: a new model for getting local contentLBS-2011: a new model for getting local content
LBS-2011: a new model for getting local contentColdbeans Software
 
Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014Đồng Quốc Vương
 
Dos on 802.11 and other security issues ( Case Study )
Dos on 802.11 and other security issues ( Case Study ) Dos on 802.11 and other security issues ( Case Study )
Dos on 802.11 and other security issues ( Case Study ) Shrobon Biswas
 
Ccna 1 chapter 1 v5
Ccna 1 chapter 1 v5Ccna 1 chapter 1 v5
Ccna 1 chapter 1 v5atom1716
 
Wireside Only Rogue Access Point Detection
Wireside Only Rogue Access Point DetectionWireside Only Rogue Access Point Detection
Wireside Only Rogue Access Point Detectionbanchar
 
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...CSCJournals
 
When WLANs Launch Self DoS Attacks
When WLANs Launch Self DoS AttacksWhen WLANs Launch Self DoS Attacks
When WLANs Launch Self DoS AttacksAirTight Networks
 
IRJET- Wireless LAN Intrusion Detection and Prevention System for Malicious A...
IRJET- Wireless LAN Intrusion Detection and Prevention System for Malicious A...IRJET- Wireless LAN Intrusion Detection and Prevention System for Malicious A...
IRJET- Wireless LAN Intrusion Detection and Prevention System for Malicious A...IRJET Journal
 

La actualidad más candente (19)

Vp npresentation (1)
Vp npresentation (1)Vp npresentation (1)
Vp npresentation (1)
 
Vp npresentation
Vp npresentationVp npresentation
Vp npresentation
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and Solutions
 
woot15-paper-novella
woot15-paper-novellawoot15-paper-novella
woot15-paper-novella
 
Paper id 2820149
Paper id 2820149Paper id 2820149
Paper id 2820149
 
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
Safely Scaling Virtual Private Network for a Major Telecom Company during A P...
 
802.11w Tutorial
802.11w Tutorial802.11w Tutorial
802.11w Tutorial
 
Intranets and Extranets
Intranets and Extranets Intranets and Extranets
Intranets and Extranets
 
Technical Report
Technical ReportTechnical Report
Technical Report
 
LBS-2011: a new model for getting local content
LBS-2011: a new model for getting local contentLBS-2011: a new model for getting local content
LBS-2011: a new model for getting local content
 
Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014
Www ccnav5 net_ccna_1_chapter_1_v5_0_exam_answers_2014
 
Dos on 802.11 and other security issues ( Case Study )
Dos on 802.11 and other security issues ( Case Study ) Dos on 802.11 and other security issues ( Case Study )
Dos on 802.11 and other security issues ( Case Study )
 
Research paper
Research paperResearch paper
Research paper
 
Ccna 1 chapter 1 v5
Ccna 1 chapter 1 v5Ccna 1 chapter 1 v5
Ccna 1 chapter 1 v5
 
Insights of vpn
Insights of vpnInsights of vpn
Insights of vpn
 
Wireside Only Rogue Access Point Detection
Wireside Only Rogue Access Point DetectionWireside Only Rogue Access Point Detection
Wireside Only Rogue Access Point Detection
 
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...
 
When WLANs Launch Self DoS Attacks
When WLANs Launch Self DoS AttacksWhen WLANs Launch Self DoS Attacks
When WLANs Launch Self DoS Attacks
 
IRJET- Wireless LAN Intrusion Detection and Prevention System for Malicious A...
IRJET- Wireless LAN Intrusion Detection and Prevention System for Malicious A...IRJET- Wireless LAN Intrusion Detection and Prevention System for Malicious A...
IRJET- Wireless LAN Intrusion Detection and Prevention System for Malicious A...
 

Similar a Public wifi

Domain 6 of CEH: Wireless Network Hacking
Domain 6 of CEH: Wireless Network HackingDomain 6 of CEH: Wireless Network Hacking
Domain 6 of CEH: Wireless Network HackingShivamSharma909
 
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdf
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdfWireless Security – From A to Z – Types, Threats, To How to Secure.pdf
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdfSeanHussey8
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
Wi fi security dedicated architectures
Wi fi security dedicated architecturesWi fi security dedicated architectures
Wi fi security dedicated architecturesparipec
 
Wi fi Technilogy
Wi fi TechnilogyWi fi Technilogy
Wi fi Technilogythasnim1304
 
Retail Stores and Wireless Security—Recommendations
Retail Stores and Wireless Security—RecommendationsRetail Stores and Wireless Security—Recommendations
Retail Stores and Wireless Security—RecommendationsAirTight Networks
 
10 Wireless Home Network Security Tips
10 Wireless Home Network Security Tips10 Wireless Home Network Security Tips
10 Wireless Home Network Security TipsPECB
 
Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Saravana Kumar
 
Auditing a Wireless Network and Planning for a Secure WLAN Implementation
Auditing a Wireless Network and Planning for a Secure WLAN ImplementationAuditing a Wireless Network and Planning for a Secure WLAN Implementation
Auditing a Wireless Network and Planning for a Secure WLAN ImplementationCARMEN ALCIVAR
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesMichael Boman
 
Pentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 IssuePentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 IssueIshan Girdhar
 

Similar a Public wifi (20)

How Popular of a Hotspot.pdf
How Popular of a Hotspot.pdfHow Popular of a Hotspot.pdf
How Popular of a Hotspot.pdf
 
Wireless security
Wireless securityWireless security
Wireless security
 
Wi Fi
Wi FiWi Fi
Wi Fi
 
CEH Domain 6.pdf
CEH Domain 6.pdfCEH Domain 6.pdf
CEH Domain 6.pdf
 
Domain 6 of CEH: Wireless Network Hacking
Domain 6 of CEH: Wireless Network HackingDomain 6 of CEH: Wireless Network Hacking
Domain 6 of CEH: Wireless Network Hacking
 
Wireless Lan Security
Wireless Lan SecurityWireless Lan Security
Wireless Lan Security
 
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdf
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdfWireless Security – From A to Z – Types, Threats, To How to Secure.pdf
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdf
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Wi fi security dedicated architectures
Wi fi security dedicated architecturesWi fi security dedicated architectures
Wi fi security dedicated architectures
 
Wlan security
Wlan securityWlan security
Wlan security
 
Wi fi Technilogy
Wi fi TechnilogyWi fi Technilogy
Wi fi Technilogy
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hacking
 
Retail Stores and Wireless Security—Recommendations
Retail Stores and Wireless Security—RecommendationsRetail Stores and Wireless Security—Recommendations
Retail Stores and Wireless Security—Recommendations
 
10 Wireless Home Network Security Tips
10 Wireless Home Network Security Tips10 Wireless Home Network Security Tips
10 Wireless Home Network Security Tips
 
Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Ichci13 submission 104 (1)
Ichci13 submission 104 (1)
 
Wireless security
Wireless securityWireless security
Wireless security
 
Auditing a Wireless Network and Planning for a Secure WLAN Implementation
Auditing a Wireless Network and Planning for a Secure WLAN ImplementationAuditing a Wireless Network and Planning for a Secure WLAN Implementation
Auditing a Wireless Network and Planning for a Secure WLAN Implementation
 
The mfn 3
The mfn 3The mfn 3
The mfn 3
 
Wireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best Practices
 
Pentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 IssuePentesting Your Own Wireless Networks, June 2011 Issue
Pentesting Your Own Wireless Networks, June 2011 Issue
 

Más de Samuel K. Itotia

Enterprise Application Integration
Enterprise Application IntegrationEnterprise Application Integration
Enterprise Application IntegrationSamuel K. Itotia
 
Public cloud 101,One individual does not hold all the keys to the kingdom. Co...
Public cloud 101,One individual does not hold all the keys to the kingdom. Co...Public cloud 101,One individual does not hold all the keys to the kingdom. Co...
Public cloud 101,One individual does not hold all the keys to the kingdom. Co...Samuel K. Itotia
 
Apress.html5.and.java script.projects.oct.2011
Apress.html5.and.java script.projects.oct.2011Apress.html5.and.java script.projects.oct.2011
Apress.html5.and.java script.projects.oct.2011Samuel K. Itotia
 

Más de Samuel K. Itotia (6)

Enterprise Application Integration
Enterprise Application IntegrationEnterprise Application Integration
Enterprise Application Integration
 
Steve jobs innovator
Steve jobs innovatorSteve jobs innovator
Steve jobs innovator
 
Wp passpoint wi-fi
Wp passpoint wi-fiWp passpoint wi-fi
Wp passpoint wi-fi
 
Public cloud 101,One individual does not hold all the keys to the kingdom. Co...
Public cloud 101,One individual does not hold all the keys to the kingdom. Co...Public cloud 101,One individual does not hold all the keys to the kingdom. Co...
Public cloud 101,One individual does not hold all the keys to the kingdom. Co...
 
Byod
ByodByod
Byod
 
Apress.html5.and.java script.projects.oct.2011
Apress.html5.and.java script.projects.oct.2011Apress.html5.and.java script.projects.oct.2011
Apress.html5.and.java script.projects.oct.2011
 

Último

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 

Último (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 

Public wifi

  • 1. Royal Holloway series | Information Security | Underexposed Risks | Public Wi-Fi Hotspots Underexposed risks of public Wi-Fi hotspots This thesis outlines the consideration that should be given by Wi-Fi hotspot users to the significant and as yet unresolved security risk such use presents. It promotes awareness and outlines current thinking in addressing the issue by Daan Stakenburg and Jason Crampton Royal Holloway series | Information Security | Underexposed Risks | Public Wi-Fi Hotspots ISTOCKPHOTO/THINKSTOCK
  • 2. Royal Holloway series | Information Security | Underexposed Risks | Public Wi-Fi Hotspots -2- With the increasing use of smartphones and the deployment of 4G or long-term evolution (LTE) mobile networks, it is easy to forget the other high-speed internet access method that is widely used by roaming mobile users: publicly accessible wireless networks, also known as Wi-Fi hotspots. Hotspots lack the standard security measures seen in other wireless networks, and if applications do not implement security features, or implement them badly, these hotspots can, in some cases, result in very insecure combinations that may lead to identity theft and information loss. Hotspots are very common in airports, hotels and coffee shops. They are also starting to appear on public transport, such as trains and buses, in supermarkets and in other, less obvious, establishments. The reason for their success is due to the fact that they are relatively easy to set up and provide the network owner with an additional direct or indirect stream of revenue. BT, for example, established around 500,000 Wi-Fi hotspots in London for the 2012 Olympics. Although there is nothing wrong with providing or using such networks, it is important to recognise that such networks could be deployed by people with malicious intent. The problem What’s in a name? Everything! The main threat to users of hotspots is that it is difficult to corroborate the identity of a public wireless access point. Each wireless access point announces a so-called service set identifier (SSID) to identify the wireless network. These SSIDs are the names that are listed when a mobile device searches for nearby wireless networks. Once successfully connected, the SSID is usually saved by the device to facilitate subsequent connections to the same network. Anyone can buy and configure a wireless access point and choose the name it announces. This could be related to the name of an establishment such as DonutsAndBagels, but it could also be the name of a wireless network that is commonly used, such as the wireless network name of a local telecom provider or the name of a restaurant chain. Herein lies the problem. When visiting a shop called Donuts & Bagels, one would assume that the wireless network announcing the name DonutsAndBagels in the shop’s vicinity is associated with the shop, but this assumption may be unjustified. By deceiving users into thinking they are connecting to a genuine access point, an attacker could perform man-in-the-middle attacks, potentially allowing him to gain access to sensitive information. Becoming the man-in-the middle does not have to be the attacker’s primary objective. There are other ways of abusing the inability to properly authenticate a nearby access point and SSID. Raising awareness of risks associated with the use of public Wi-Fi hotspots All is not always as it appears when users access public Wi-Fi networks via seemingly authentic and trustworthy providers. This thesis seeks to raise awareness of the underexposed risks for identity and data theft by exploring the status quo and potential developments for minimising those risks by Daan Stakenburg and Jason Crampton Example of a captive portal
  • 3. Royal Holloway series | Information Security | Underexposed Risks | Public Wi-Fi Hotspots -3- Wi-Fi roaming: it’s not a bug, it’s a feature As and when necessary, most networked client devices will connect to other access points announcing a known SSID – an understandable feature when you consider the fact that a wireless network may contain more than one wireless access point. This allows a client device to jump or roam between access points without the need for user interaction. But the same happens when there is a rogue access point advertising the SSID of a wireless network to which the device has connected before. Consider the following scenario when a teleworker returns to the office with his dual-homed laptop (Figure 1). A dual-homed system is a device that can connect into two different networks. In this case the laptop would be connected to the corporate network with a cable (e.g. through its docking station) while having a wireless network interface that is continuously listening for the availability of any previously configured wireless networks it can connect to. While the teleworker is sitting at his desk with a firewall protecting the corporate network from the threats on the internet, an adversary tries to use the laptop as a proverbial back door to gain access to the corporate network, systems and data. By setting up a nearby access point with a previously used SSID, the attacker could trick the laptop into connecting to this rogue access point. This may allow him to gain access to the laptop and use it as a stepping stone to other parts of that corporate network. This may sound unlikely, but an attacker simply has to find the name of a network to which the laptop has previously connected. With so many commonly known hotspot networks in use today, there is a good chance an attacker will be able to find one to which the user previously connected. This type of attack can be mitigated through the use of a properly configured host firewall running on the laptop. But that firewall could allow certain traffic and/or the system may have software vulnerabilities. It is far better to enable the network auto-switch feature that some laptop suppliers provide. This auto- switch feature ensures that only one network interface can be active at a time. The setting can be enabled in the BIOS of the laptop, but is not always enabled by default. A wireless security service (WSS) such as rogue access point detection (RAPD) would not necessarily work. They are usually configured to detect rogue access points that announce the same SSID as the corporate wireless network. In our scenario, the corporate office may not even have a wireless network. RAPD cannot provide a complete solution in this case. One might wonder whether there is a security feature that would allow devices to confirm the identity of a nearby hotspot. The short answer is: no, not really. An attacker simply has to find the name of a network to which the laptop has previously connected Figure 1: Dual homed attack
  • 4. Royal Holloway series | Information Security | Underexposed Risks | Public Wi-Fi Hotspots -4- In physical networking the identity of the network is not fully confirmed either, but a physical network has physical boundaries. It is normally quite safe to assume that a network wall socket in an office building is connected to the company’s network. Wireless networks do not have these kinds of boundaries, and thus require their identity to be confirmed. Current solutions Hotspot authentication: Hotspots currently use a technique called universal access method (UAM) and use a captive portal to authenticate/authorise customers. As mentioned earlier, access to the wireless network is open to any device in the vicinity of the access point. Only when you want to use the internet service provided by the underlying network are you requested to provide some form of credentials or payment. The captive portal does not provide any credible form of authentication to the user of a wireless network, as an attacker could create an exact copy of the genuine captive portal. An attacker could, just like the genuine portal, even add an X.509 certificate to his captive portal to increase its apparent trustworthiness. The certificate only authenticates the host name of the website being accessed, which could be any host name, including ones available to an attacker. The validity of the certificate may be confirmed by the client, but this only confirms the certificate authority (CA) signed the certificate for a particular website; the CA signing the certificate may not be aware how the certificate will be used. It should be clear that even though the two actions may appear to be the same, authenticating the captive portal is not the same as authenticating the wireless network. By creating a portal of his own, an attacker could, for example, harvest credit card information. This may not be of interest to an attacker at a small establishment in a rural area, but has great potential at a public place, such as an airport, with thousands of travellers passing through each day. Users should be wary of this possible attack and only use keys or codes purchased in advance. Pre-shared key: Small wireless network set-ups use a so-called pre-shared key (PSK). Users requiring access to the network are given this PSK in advance. This PSK and associated SSID would normally provide a good level of authentication because there is a high probability that the combination is unique, and there is a small chance that the PSK is known to an attacker. There is, however, only one PSK for all users. Using a PSK would prevent the hotspot provider from uniquely identifying each user. This makes it impossible for the provider to distinguish one user from the other, thereby restricting the provider’s ability to charge each user separately. The PSK should be changed regularly to prevent former users from gaining unauthorised access. But that could only take place when there are no active users, as changing the PSK would instantly prevent all users from accessing the network. Using a PSK would also imply a level of trust between its users. That is clearly an unreasonable assumption for hotspots in a public area such as a railway station. It would allow an attacker to set up a hotspot with the same SSID and PSK, thereby defeating the brittle level of authentication taking place. Using a PSK to authenticate hotspots is therefore not an option. Extensible Authentication Protocol (EAP): Larger networks use a protocol standard called 802.1X, or “EAP over LAN”, to authenticate users. The latter Small wireless network set-ups use a so-called pre-shared key. This should be changed regularly to prevent former users from gaining unauthorised access
  • 5. Royal Holloway series | Information Security | Underexposed Risks | Public Wi-Fi Hotspots -5- could be read as: LAN, not wireless LAN, because of the following reasons: Two protocols using this standard, called protected EAP (PEAP) and tunnelled transport layer security (TTLS), allow the use of username and password for authentication. To confirm the identity and authorisation of a connecting client, an access point would allow the client to send its credentials to an external authentication server. Before the client transmits its credentials, it would want to know if the authentication server is a trusted entity. The identity of the authentication server is confirmed with a digital certificate. But that certificate only confirms the identity of the authentication server, not the association with either the SSID or the access point. This leaves an attacker with a way to set up a rogue 802.1X-enabled network (Figure 2) with a known SSID of his own. When trying to authenticate such a rogue access point, users may receive a warning about the authentication server certificate presented not being trusted. This is because an 802.1X wireless network is usually pre-configured on a client with a setting that only trusts a specific CA to have signed the certificate presented by the authentication server. Using a public CA would in this case be worse as it would allow the attacker to get a signed, and thus trusted, certificate for his rogue authentication server and may result in no warning to the user at all. Even if the user were warned of certificate issues, it could easily be ignored. Once the user accepts the rogue server, running an altered version of the authentication service, would allow an attacker to retrieve the transmitted credentials from users while accepting any password submitted to prevent users from becoming suspicious. These credentials could then be used to access the legitimate wireless network and maybe even systems residing on the underlying network. These implementations of 802.1X are not entirely robust methods for authenticating hotspots for the reasons mentioned above. It would also require the client configuration of credentials, the names of trusted authentication servers and signing certificate authorities to be distributed in advance. Local distribution of these settings would require hotspot providers to invest and set up nearby vending machines or counters. It is worth noting that administrators running 802.1X-based networks in their enterprise should deploy their configurations to managed clients with restrictions on possible authentication servers and certificates, and not use public CAs to sign the authentication server certificates to prevent the above attacks from taking place. Figure 2: Spoofing an 802.1X wireless network To confirm the identity and authorisation of a connecting client, an access point would allow the client to send its credentials to an external authentication server
  • 6. Royal Holloway series | Information Security | Underexposed Risks | Public Wi-Fi Hotspots -6- The Future Open Wireless Network Authentication Protocol (OWNAP): A solution could be sought in the way an internet browser authenticates a website using X.509 certificates. Each access point, or at least each wireless network, would need to have such a certificate in place. A client trying to establish a connection would perform the required authentication by verifying that the name in the certificate matches both the SSID and the access point hardware address. The client would even be able to establish a secret key to encrypt all further communications. This would, however, require the SSID to be globally unique. It is something that could be achieved by registering a new top-level domain (TLD), say Wi‑Fi, and dedicating this TLD to SSID registration alone. Then the registration of SSIDs would provide CAs signing the SSID certificate requests with a familiar process for verifying the owner of the SSID – CAs are used to doing this when processing certificate renewal requests for the regular, fully qualified domain names used with, for example, SSL/TLS. However, deploying certificates to all access points would introduce substantial overheads as X.509 certificates expire and need to be replaced or, in some cases, revoked. It is therefore not expected that the proposed OWNAP protocol would ever reach such maturity. Hotspot 2.0: The Wi-Fi Alliance has launched an alternative to captive portal authentication under the name Passpoint or Hotspot 2.0. It is based on the new IEEE standard 802.11u. In regular wireless networks, devices use active probing techniques or listen for access point broadcasts to discover nearby wireless networks. The discovery process of 802.11u is still the same, but it allows devices to query a Passpoint- enabled hotspot for more information. This includes queries on the ability to roam via the hotspot, similar to how a mobile phone roams on guest mobile networks. But, just like mobile networks, service providers must establish mutual roaming agreements that cover credential validation and billing before roaming can take place. Once implemented Passpoint would allow the mobile service provider to charge customers for both mobile and Wi-Fi roaming. Charging is, of course, only possible when the device is identified and thus requires any connecting device to be authenticated. Passpoint includes the following three techniques to accommodate this requirement: n EAP-SIM, which uses the GSM authentication triplet for credentials; n EAP-AKA, which uses the UMTS authentication quintet for credentials. This method is more secure as it includes an encrypted sequence number that is incremented for each authentication event. It allows the device to confirm that the home network has actually produced the challenge; n Software agent for legacy devices such as laptops using credentials (e.g. a username and password). The pros and cons of Hotspot 2.0 Passpoint will increase transparency and ease of the use of secure authenticated wireless networks and will not require the user to submit credit card details when he/she tries to gain access to the internet. This is a big security advantage. The Wi-Fi Alliance has launched an alternative to captive portal authentication, under the name Passpoint or Hotspot 2.0, based on the new IEEE standard 802.11u
  • 7. Royal Holloway series | Information Security | Underexposed Risks | Public Wi-Fi Hotspots -7- There are, however, some things to recognise, as follows: n The three techniques would need to implement the same certificate and server restrictions mentioned in the EAP section, as the SSID and access point are still not authenticated; n An attacker could set up an access point with the same SSID as a Passpoint access point and prevent access to the genuine access points. Though user devices would not connect automatically to it, users can still be social engineered into connecting and providing sensitive information: something along the lines of “Our system is down. Your credit card will not be charged but please provide it as a method of identification”; n Though interesting for mobile telecom companies, others providers may not want to upgrade to Passpoint as it will force them to share the revenue generated. Mobile telecom providers may not allow the necessary second set of credentials to be stored on the SIM; n Even if a user has a Passpoint-enabled device, he or she may prefer to use another nearby wireless network that is free of charge instead of paying roaming charges. That network may use captive portal and not provide proper protection; n Tablets are being sold without a slot for a SIM card, possibly preventing these systems from using Passpoint access points. Their access to the wireless interface may be restricted to built-in apps; n Legacy devices will still require a set of credentials in advance, possibly limiting their “plug and surf” capability. The intention is to leave captive portals in place for legacy systems Conclusion People generally have a good sense of whether or not they can trust other people. These senses are part of our social skills that have been developing since the beginning of mankind. We rely on them to protect us from harm. We cannot do the same with technology as it requires a level of technical understanding available to very few users. With most preventative and detective security measures focusing on client authentication and blocking unauthorised access, it is difficult for devices to confirm the identity of a hotspot and establish a secure channel of communication. Other higher level protocols, such as HTTPS, could prevent eavesdropping, but those are not implemented all the time either. If implemented, these higher level protocols would only provide a single layer of security, where multiple layers would be better because a security warning may be considered a glitch and ignored by users. This article has shown that network entry and exit points are easy points of attack and should therefore be properly authenticated. With Passpoint, a first step is made towards enhancing the security measures on the user’s side. n About the authors Daan Stakenburg is an Information Security Architect at a global technology company listed on the London Stock Exchange. With almost 15 years of IT experience in a variety of multinational organisations, he acts as an internal consultant advising departments and project teams on a multitude of network and information security matters Jason Crampton has a BSc in Mathematics (University of Manchester) and a PhD in Computer Science (University of London). He has worked in the Information Security Group at Royal Holloway, University of London since 2002, where he is a Professor of Information Security. His research focuses on access control in multi-user computer systems Network entry and exit points are easy points of attack and should therefore be properly authenticated