[ale] WPA encryption crackable in less than 15 minutes

Michael H. Warfield mhw at WittsEnd.com
Fri Nov 7 12:15:19 EST 2008


On Fri, 2008-11-07 at 08:10 -0500, krwatson at cc.gatech.edu wrote:
> Once Thought Safe, WPA Wi-Fi Encryption Is Cracked
> http://www.pcworld.com/article/153396/

	Not really...  Not quite as bad as the sky is falling articles are
running around.  They've cracked TKIP but that's a long way off from
breaking the whole thing...

	Battered, but not broken: understanding the WPA crack
	http://arstechnica.com/articles/paedia/wpa-cracked.ars

===
> With the Tews/Beck method, an attacker sniffs a packet, makes minor
> modifications to affect the checksum, and checks the results by
> sending the packet back to the access point. "It's not a key recovery
> attack," Tews said, "It just allows you to do the decryption of
> individual packets." This approach works only with short packets, but
> could allow ARP (Address Resolution Protocol) poisoning and possibly
> DNS (Domain Name Service) spoofing or poisoning.

	:


> Now let's back up a little. The early coverage of this crack indicated
> that TKIP keys were broken. They are not. "We only have a single
> keystream; we do not recover the keys used for encryption in
> generating the keystream," Tews said. 

	:


> Tews pointed out that "if you used security features just for
> preventing other people from using your bandwidth, you are perfectly
> safe," which is the case for most home users. Someone can't use this
> attack to break into a home or corporate network, nor decipher all the
> data that passes.

> If a network uses AES, it's immune to this attack, and many corporate
> and high-security networks settled on AES when it became feasible a
> couple of years ago in order to avoid any lingering problems with TKIP
> that might eventually rear their heads.

	:

> So WPA isn't broken, it turns out, and TKIP remains mostly intact. But
> this exploit based on integrity and checksums should argue for a fast
> migration to AES-only WiFi networks for businesses who want to keep
> themselves secure against further research in this area—research
> already planned by Tews and Beck. And now that these two have opened
> the door, WPA will certainly become subject to even closer scrutiny by
> thousands of others interested in this space: black-, gray-, and
> white-hatted.
===

> keith

> --
> 
> Keith R. Watson                        Georgia Institute of Technology
> Systems Support Specialist IV          College of Computing
> keith.watson at cc.gatech.edu             801 Atlantic Drive NW
> (404) 385-7401                         Atlanta, GA  30332-0280

	Mike
-- 
Michael H. Warfield (AI4NB) | (770) 985-6132 |  mhw at WittsEnd.com
   /\/\|=mhw=|\/\/          | (678) 463-0932 |  http://www.wittsend.com/mhw/
   NIC whois: MHW9          | An optimist believes we live in the best of all
 PGP Key: 0xDF1DD471        | possible worlds.  A pessimist is sure of it!

-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 307 bytes
Desc: This is a digitally signed message part
Url : http://mail.ale.org/pipermail/ale/attachments/20081107/1da6a70c/attachment.bin 


More information about the Ale mailing list