Re: 802.11 Wired Equivalent Privacy (WEP) attacks

2001-02-13 Thread itojun


WF1

In WF1 the 802.11 WEP keys would be changed many times each hour, say 
every 10 minutes. A parameter, P , determines how many time per hour 
the key is to be changed, where P must divide 3600 evenly. The WEP 
keys are  derived from a master key, M,  by taking the low order N 
bits (N = 40, 104, whatever) of the SHA1 hash of the master key with 
the date and time (UTC) of the key change appended.

  WEPkey = Bits[0-N](SHA1(M | mmddhhmmss))
(snip)
Clearly good synchronization of the time-of-day clock on each node is 
essential in WF1,  but protocols already exist that can do this over 
a network. Small synchronization discrepancies can be handled by the 
802 retry mechanism and should look very much like a short RF outage. 

i see chicken and egg loop here - for instance, if I've got a laptop
with 802.11 card only, I need to use the 802.11 network to synchronize
clock.  i'm not sure if WF1 is workable (if you have other secure
channel for synchronizing clock, you are okay - but then why bother
using 802.11?).

itojun




Re: 802.11 Wired Equivalent Privacy (WEP) attacks

2001-02-13 Thread Arnold G. Reinhold

At 5:55 AM +0900 2/10/2001, [EMAIL PROTECTED] wrote:
 WF1

In WF1 the 802.11 WEP keys would be changed many times each hour, say
every 10 minutes. A parameter, P , determines how many time per hour
the key is to be changed, where P must divide 3600 evenly. The WEP
keys are  derived from a master key, M,  by taking the low order N
bits (N = 40, 104, whatever) of the SHA1 hash of the master key with
the date and time (UTC) of the key change appended.

  WEPkey = Bits[0-N](SHA1(M | mmddhhmmss))
(snip)
Clearly good synchronization of the time-of-day clock on each node is
essential in WF1,  but protocols already exist that can do this over
a network. Small synchronization discrepancies can be handled by the
802 retry mechanism and should look very much like a short RF outage.

   i see chicken and egg loop here - for instance, if I've got a laptop
   with 802.11 card only, I need to use the 802.11 network to synchronize
   clock.  i'm not sure if WF1 is workable (if you have other secure
   channel for synchronizing clock, you are okay - but then why bother
   using 802.11?).

 
That is one of the reasons I suggested a key change interval of every 
10 minutes. Most PCs internal clocks will keep time to within a few 
seconds from day to day, so re-synchronization should not be a 
problem. If necessary the PC's time can be manually set well enough 
using any number of time sources:
 
Most phone companies in the US have a number you can call.
"News" radio stations announce the time frequently.
Many cell phones have clocks.
GPS receivers give accurate time.
For about $60 you can buy a clock that synchronizes itself to WWVB.
802.11 has a short range, so there are likely other PCs nearby 
that you can get the time from.

I don't know how tolerant actual 802.11 systems are to a delayed key 
change (experiments are welcome), but if a user sets their PC time in 
the middle of a ten minute interval, there will be no delay at all.

Actually there is a highly accurate time synchronism mechanism built 
into 802.11. The transceivers must be sync'd way before they get to 
worry about encryption.  But I don't know if that time value is 
accessible by the client computer.  If so, more frequent key changes 
should be workable.


Arnold Reinhold




Re: 802.11 Wired Equivalent Privacy (WEP) attacks

2001-02-13 Thread R. A. Hettinga

At 12:05 PM -0500 on 2/8/01, Arnold G. Reinhold wrote:


 Thus there is a need for a short term remedy that can work with the
 existing standard.

Not to pull your leg (too hard), or anything, but, we were told, at
mac-crypto, that it's called "super-encryption". ;-)

IPSec anyone?

Cheers,
RAH
-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




Re: 802.11 Wired Equivalent Privacy (WEP) attacks

2001-02-13 Thread David Wagner

Arnold G. Reinhold wrote:
Thus there is a need for a short term remedy that can work with the 
existing standard.

Maybe the easiest short term remedy that does not require
any changes to hardware is the following:

  * Put the wireless network outside your firewall
(or place a firewall between your wireless network and your
 internal, security-sensitive network), and
  * Use a VPN with strong end-to-end cryptographic authentication
and encryption (e.g., IPSEC or equivalent)

In short, don't trust the wireless devices to provide security
-- treat the wireless cards as a way of getting insecure access,
and then use an independent security mechanism.




New stuff with Envelope Mail

2001-02-13 Thread Bram Cohen

I've done a bunch more work on Envelope Mail, as always, the latest info
is at -

http://gawth.com/bram/envelope_mail/

New is actual code, complete with test code. Plans are next to write a
patch for BoboMail implementing the dummy version of the crypto API.

I could use immediate help on the following things -

A logo - I'm incapable of graphic design

A non-dummy version of the crypto API - the dummy one makes it
excruciatingly clear how the real one should work and gives a strong
indication of how it might be implemented. I'd make the 'real' one myself,
but, you know, you're not supposed to do that, and I'm trying to play
nice, despite the crypto community being remarkably unhelpful in this
regard.

-Bram Cohen

"Markets can remain irrational longer than you can remain solvent"
-- John Maynard Keynes