On 11 September 2024 18:22:51 BST, Martin Pauly <pa...@hrz.uni-marburg.de> wrote: >Am 11.09.24 um 05:29 schrieb Daniel Lenski: >> But as an end user of eduroam, why should I actually be concerned if >> I've connected to a "counterfeit" eduroam access point, as long as it >> gives me real internet connectivity? The eduroam network doesn't >> really give me access to any particular internal network. There isn't >> really a trust boundary with eduroam. > >It all depends, e.g. on the network segmentation of the institution at hand. >The 802.1X "Evil Twin" situation has been really bad due to a combination >of circumstances: >1. SSID is the same everywhere around the world (sounds trivial, but makes >attacks even more effective) >2. Unlike HTTPS, IMAPS etc., here is no DNS step involved when the end device >makes > first contact with the local RADIUS server. It just starts EAP over LAN/WLAN > negotiations; the EAP messages carry the TLS stuff. The wireless > infrastructure forwards these > as EAP over RADIUS to their local RADIUS server which acts as SSL server > side, presenting its certificate. > So at least the client MUST talk to anyone claiming to be "eduroam" from > the start, including a rogue AP. >3. This will do no harm, IF the supplicant (client) checks the cert of the >peer, Server Name + CA is sufficient. > Both SHOULD be configured with the supplicant beforehand. If not, you will > get a "Trust this server?" question > on Windows and most Apple devices. >4. If the client skips cert validation, it will hand its password to whatever >RADIUS server it is talking to.
You skipped over an important detail there without calling it out explicitly: We choose EAP methods which involve handing our password in plain text (even if over EAP-(T)TLS) to the server we happen to be talking to. I feel that warrants more attention. > Turns out, this had been the case with ~90% of Androids in 2008, and ~30% > of Androids in 2020. > Due to the EAP-Success Bug of 2018, some iOS devices where also affected in > 2020, but only a small fraction. > >Why have Android supplicants been that ignorant? >First, users won't notice a difference, the gullible device connects to both >correct and rogue eduroam WiFis. >Second, the CA and Server name settings for a particular SSID seemed to slip >away at least with every update. >Also, a change to settings of some _different_ SSID could cause a silent reset >to CA = Do not validate. >Third, the fallback to connect anyway is _much_ more dangerous than the "Trust >on first use" approach >of other manufacturers. Phones are "always on", longing for a known SSID to >send their password to. > >All this adds up to a toxic mix and makes the attack trivial. >The real damage that comes out of this largely depends on what the attacker >can do with a stolen >eduroam password. If it gives the attacker access to e.g. the home >institution's VPN (which has been the case with >a great many institutions), the fun starts right away, as presumably happened >to us. >OTOH, in the rare case of client-side certs (EAP-TLS), the credential won't >leave the client, >and a rogue AP can hijack a single session at best. > >As to the current state of affairs, I can only guess. While we could watch >CA="Do not validate" >from most clients during 2020 because Google had removed it from AOSP, some >manufacturers would happily patch in >their old codebase, and there it was again e.g. in Motorola phones. >I can send a detailed report to anyone interested. Interestingly, there are >effective countermeasures >even if you use passwords with BYOD devices. > >Cheers, Martin > > _______________________________________________ openconnect-devel mailing list openconnect-devel@lists.infradead.org http://lists.infradead.org/mailman/listinfo/openconnect-devel