Page 457 - From GMS to LTE
P. 457

Wireless Local Area Network (WLAN)  443

                      all data exchanged remains confidential and an eavesdropping attacker is unable
                      to decode any of the values exchanged either during the authentication proce-
                      dure that follows or later on in an offline attack. It is important to note that this
                      key exchange is not for authentication purposes but just for establishing an
                      encrypted channel over which sensitive data can be exchanged. Only once a
                      bidirectional encrypted channel is established is authentication information
                      exchanged. This approach can be compared to a password‐protected website
                      that uses the secure http (HTTPS) transfer protocol. HTTPS is used to provide
                      an encrypted channel that cannot be decrypted by a third party, and the user-
                      name and password provided by the user to a web page that is received over the
                      encrypted channel serves as authentication.
               Step 2:    The AP and the client device generate a random number that is referred to as
                      a ‘Nonce’. Together with an eight‐digit PIN, it is used as the input to a hash
                      function. The hash function generates a 256‐bit result from the two values
                      from which neither the PIN nor the random number can be deducted as the
                      hash function is not reversible.
               Step 3:    The AP and the client device exchange their hash function results.
               Step 4:    Once each side has received the hash result of the other side, the nonce values
                      are exchanged.
               Step 5:    Both devices now use the nonce value of the other device, add the PIN and
                      execute the hash function over these parameters. If the result matches the hash
                      values that have been transferred in step 1, both sides can be sure that the same
                      PIN was used on both sides.
               Step 6:    After both sides have verified that the PIN was identical on both sides, the
                      WPA/WPA2 password is transmitted. The string transmitted is the password
                      the user would have typed in if WPS was not used.
               Step 7:    Once the client device has received the WPA/WPA2 password, a standard
                      WPA/WPA2 connection establishment is performed.

                The only weakness of the initially designed procedure is that it cannot protect against
               an active attack, that is, a man‐in‐the‐middle attack in which an attacker is able to intercept
               frames from both devices, modify them and forward them to the destination. In practice,
               however, a number of weaknesses were unfortunately introduced during implementa-
               tion that makes some devices very vulnerable to brute force attacks. If WPS is always
               active and the PIN always remains the same, it is possible to retrieve the WPA/WPA2
               key with a brute force attack by trying out all possible PIN combinations. Such an attack
               is typically successful within only a few hours despite the eight‐digit length of the PIN.
               This is because the PIN is validated in two parts of four digits. That means that an
               attacker only needs to perform 10,000 WPS attempts at most to get the first four digits.
               The second step can be performed even faster as one of the remaining four digits is used
               as a checksum to ensure the user has entered the PIN correctly. It is therefore determin-
               istic. Some APs try to slow down attacks by only accepting a few WPS attempts per
               minute. This certainly slows down attacks but often not by a large degree. The only way
               to prevent such an attack is to use a PIN only once as was perhaps initially intended by
               those specifying the WPS authentication exchange. From a usability point of view, this
               is not very convenient as the PIN cannot be printed on the back of a device. As a conse-
               quence, only a few AP vendors have implemented a changing PIN. Therefore, some
               security experts recommend disabling WPS in an AP.
   452   453   454   455   456   457   458   459   460   461   462