[20000] in bugtraq

home help back first fref pref prev next nref lref last post

Design Flaw in Lucent/Orinoco 802.11 proprietary access control-

daemon@ATHENA.MIT.EDU (Bill Arbaugh)
Tue Apr 3 15:44:58 2001

MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Message-ID:  <Pine.SOL.4.21.0104022033550.6061-100000@laffytaffy.cs.umd.edu>
Date:         Mon, 2 Apr 2001 20:35:05 -0400
Reply-To: Bill Arbaugh <waa@CS.UMD.EDU>
From: Bill Arbaugh <waa@CS.UMD.EDU>
To: BUGTRAQ@SECURITYFOCUS.COM

Name:		Lucent/Orinoco Closed Network design flaw

Products:	Most access points based on Orinoco wireless cards.

Severity:	An attacker can determine the network name, or SSID,
		which controls access to the network. Knowledge of the
		SSID permits a client to associate/join the
		network. If WEP is not enabled, the attacker gains
		unrestricted access to the network immediately.

Author:		William A. Arbaugh
		waa@cs.umd.edu
		http://www.cs.umd.edu/~waa

Vendor Status:  Vendor informed of the problem on April 1, 2001 via
		electronic mail. Vendor responded that this is just
		"one little hurdle .." to gaining access on April 2,
		2001 via electronic mail.

Details:
		Lucent has defined a proprietary access control
		mechanism entitled Closed Network [1]. With this
		mechanism, a network manager can use either an open or
		a closed network. In an open network, anyone is
		permitted to join the network. In a closed network,
		only those clients with knowledge of the network name,
		or SSID, can join. In essence, the network name acts
		as a shared secret. Claims are made in [1] that a
		Closed Network prevents unauthorized users from
		accessing the network.

		In practice, security mechanisms based on a shared
		secret are robust provided the secrets are
		well-protected in use and when
		distributed. Unfortunately, this is not the case with
		Lucent's proprietary access control mechanism. Several
		802.11 management messages contain the network name,
		or SSID, and these messages are broadcast in the clear
		by access points and clients. The actual message
		containing the SSID depends on the vendor and model of
		the access point. The end result, however, is that an
		attacker can easily sniff the network name-
		determining the shared secret and gaining immediate
		access to the ``protected'' network if WEP is not
		enabled. Even with WEP enabled, however, the attacker
		could utilize previously disclosed WEP flaws [2,3] to
		gain access by forging packets.

		A description of this flaw and others contained in
		802.11 are described in [4].


References:

		[1] Lucent Orinoco, User's Guide for the ORiNOCO
		    Manager's Suite, November 2000.

		[2] J. Walker, "Unsafe at any key size: An analysis of
		the WEP encapsulation", Tech Rep. 03628E, IEEE 802.11
		committee, March 2000.
		http://grouper.ieee.org/groups/802/11/Documents/DocumentHolder/0-362.zip.

		[3] N. Borisov, I. Goldberg, and D. Wagner,
		Intercepting Mobile Communications: The Insecurity of
		802.11. http://www.isaac.cs.berkeley.edu/isaac/wep-faq.html

		[4] W. Arbaugh, N. Shankar, and Y. Wan, Your 802.11
		Wireless Network has No Clothes.
		http://www.cs.umd.edu/~waa/wireless.pdf

home help back first fref pref prev next nref lref last post