Wi-Fi Roaming Security and Privacy

Karri Huhtanen
Karri HuhtanenManaging Director em Radiator Software Oy (Arch Red Oy+Open System Consultants Pty Ltd)
Wi-Fi roaming
security and privacy
2023-02-23 Karri Huhtanen
Karri Huhtanen
● Installed first Linux distribution ~1993 (Softlanding Linux
System, didn’t know how to exit emacs or vi)
● Have had Internet access since 1993 (but purchased first
Internet subscription in 2006)
● Have worked with wireless networks, security and roaming
since 1997
● Was there to connect Finland to eduroam in 2003
(maintained eduroam Finland top-level RADIUS since then)
● Founded Arch Red Oy (nowadays Radiator Software Oy)
in Tampere University of Technology in 2003 with
two colleagues to productise Wi-Fi access control
and roaming solutions (e.g. roam.fi)
This may not be the Wi-Fi network security
presentation you are looking for…
● This is a presentation about Wi-Fi roaming security and privacy => e.g. local
Wi-Fi network security, radio protocols is covered only briefly
● If there is interest I can do presentation about local Wi-Fi network security as
well some other time / event.
● In Slideshare I do have a presentation about that topic:
https://www.slideshare.net/khuhtanen/security-issues-in-radius-based-wifi-aaa
and more: https://www.slideshare.net/khuhtanen/presentations
● And I am looking for a replacement for Slideshare, because Scribd has
reduced the usability of the service with forced advertisements etc.
So let’s start with Wi-Fi
network security … :)
with slides about Wi-Fi roaming basics as well
How does WPA2/3 Enterprise AAA work?
EAP-PWD EAP method based on elliptic
Curves, real identity shown
EAP-TTLS, TLS secured “envelope”
EAP-PEAP outer identity can be anonymous
or real identity
EAP-TLS Certificate based EAP method,
certificate details can be seen
EAP-SIM, SIM card based EAP method,
EAP-AKA(‘) temporary identities etc.
User credentials
(username+password, certificate,
SIM card) travel within encrypted
EAP envelope
Network Access
Server (NAS):
E.g Wi-Fi
controller, Wi-Fi
AP
RADIUS AAA
server software
RADIUS protocol
WPA2/3 Enterprise
Authentication
So where does WPA2/3 Enterprise AAA fail?
● Very rarely with technology
● Sometimes with network and security
design
● Often with misconfiguration or lack of
configuration provisioning
● Most commonly with end users and
manual device configuration
What is the difference between WPA2 and WPA3?
● WPA3 mandates Protected Management Frames (PMF),
WPA2 has those, but by default does not mandate their
use
● WPA3 has additional stronger encryption methods,
improvements in the key exchange (SAE instead of
PSK)
● WPA2 will still be around and can be secured more with
mandating PMF and disabling WPA1, TKIP
compatibility
Visited organisation
(VO) Wi-Fi network
How does Wi-Fi RADIUS roaming work?
NAS
Roaming visitor’s device
Outer identity:anonymous@example.com
Inner identity: realusername@example.com
1 Roaming visitor
(anonymous@example.com)
want to join to this Wi-Fi
network
2 NAS forwards request
to VO RADIUS server. As
example.com is not VO
realm, RADIUS server
proxies request to its
default server
3 Federation Top Level RADIUS server knows that
realm example.com is handled by example.com
RADIUS server and proxies request to it
4 Home organisation (example.com)
RADIUS server and example.com user
device negotiate and arrange TLS secured
tunnel for authentication. Authentication
happens between example.com user device
and example.com RADIUS server using the
infrastructure in between.
5 Home organisation RADIUS server
makes OK or NOT decision based on
the authentication and returns
access decision response via same
infrastructure route
6 NAS lets example.com user device
connect (or not) to the VO Wi-Fi
network based on the proxied
RADIUS response
Radiator Auth.Fi
Enterprise Wi-Fi as a
service
Redundant roam.fi
RADIUS service in public
cloud
RADIUS based roaming federation
Tampere University
RADIUS
Other customers
connecting via
RADIUS, e.g. City of
Seinäjoki, Seinäjoki
education etc.
Default RADIUS route
for all roam.fi
members, but no own
default RADIUS route
RADIUS
RADIUS
RADIUS
RADIUS
example.org
RADIUS server
example.com
RADIUS server
How does OpenRoaming work?
(https://wballiance.com/openroaming/)
Passpoint (Hotspot 2.0)
compatible Wi-Fi network
SSID: *any*
RCOI (Settled): BA-A2-D0-xx-xx
or RCOI (Settlement-Free):
5A-03-BA-xx-xx
RADIUS capable
Wi-Fi controller or
example.net’s own
RADIUS server
OpenRoaming Settled or
Settlement-Free Access
Service Provider
Static Radius over
TLS (RadSec, RFC
6614) connection
Passpoint (Hotspot 2.0)
compatible Wi-Fi network
SSID: *any*
RCOI (Settled): BA-A2-D0-xx-xx
or RCOI (Settlement-Free):
5A-03-BA-xx-xx
Global Public DNS
Passpoint (Hotspot 2.0)
compatible Wi-Fi network
SSID: *any*
RCOI (Settled): BA-A2-D0-xx-xx
or RCOI (Settlement-Free):
5A-03-BA-xx-xx
DNS discovery:
NAPTR aaa+auth:radius.tls.tcp <realm>
SRV <NAPTR result>
Name lookup <SRV result>
Dynamic RadSec
connection to
example.net’s IdP
service provider
Dynamic RadSec
connections to
example.com IdP
Dynamic RadSec
connection to
example.org IdP
user@example.com user@example.net user2@example.com user@example.org
Wi-Fi Roaming Security
Attacker sets up an Evil
Twin Wi-Fi network
Evil Twin Man-in-the-Middle (MitM) attack
NAS
Victim’s device
Outer identity: anonymous@example.com
Inner identity: realusername@example.com
Federation Top Level RADIUS server
2) Victim’s device tries to negotiate
TLS connection over RADIUS with
home organisation RADIUS but evil
twin intercepts and tries to
impersonate home organisation
RADIUS server.
Federation RADIUS connectivity is not
needed. The evil twin just needs to be able to
terminate the TLS tunnel for RADIUS
authentication. There have been accidental
and ignorant evil twin RADIUS server
configurations in organisations.
1) Evil twin sets up a Wi-Fi network
with the Wi-Fi network name (SSID) or
Roaming Consortium Organisation
Identifier (RCOI) as the real roaming
network provider. Victim’s device tries
automatically to join this network.
3) If victim’s device does not have a
proper Wi-Fi network configuration, or
capabilities, to check the RADIUS
server details, the device may send the
credentials (username, password,
password hash) to the attacker’s
RADIUS server.
Evil Twin attack mitigation
● Proper Wi-Fi configuration profiles (eduroam-cat/geteduroam.app,
Windows policies, Apple Configurator)
● Using Private CA signed RADIUS server certificate instead of well-known
or system CA (Android) signed one => impersonation with another
certificate signed by the same CA does not work (some devices cannot
check the certificate CN or SubjectAltNames)
● Using client-certificate authentication (EAP-TLS) or EAP-PWD => no
credentials sent, but identity may be still sent
● Rogue access point detection and isolation features in Wi-Fi controllers
● Using separate network credentials (different username and password) or
Multi-Factor Authentication => lost credentials are less valuable or do not
work
Visited organisation
(VO) Wi-Fi network
Brute force / Denial of Service (DoS) attack
NAS
Attacker’s device
Outer identity: anonymous@example.com
Inner identity: victim@example.com
Password: password guess
1) Attacker tries to bruteforce victim’s
password by using visited organisation’s
Wi-Fi network and roaming infrastructure
2) example.com RADIUS server
tries to authenticate
victim@example.com from
authentication backend (Active
Directory, SQL, LDAP etc.)
Roaming infrastructure or RADIUS
servers do not usually have any
rate-limiting. The round trip time for
single roaming authentication is
usually 1-5 seconds.
3) example.com RADIUS server
authentication backend
responds to all requests, but
may also lock the user account
for a while or completely (DoS)
Brute force / Denial of Service (DoS) mitigation
● Rate limiting RADIUS requests in the home organisation RADIUS server
○ Can be complex to design, implement and configure depending on the
EAP protocol and inner EAP authentication method
○ Contributes to Denial of Service attack
● Rate limiting requests the in home organisation authentication backend
○ Backends may not have support for rate limiting
○ Contributes to Denial of Service attack
● Rate limiting in the Wi-Fi network controller or Visited Organisation RADIUS
server
○ Some support exists for detecting devices failing multiple authentication
requests in the controllers
● Automatic locking and unlocking of the user account
● Rate limiting is rarely done because real attacks are equally rare
Visited organisation
(VO) Wi-Fi network
Injection attack
NAS
Attacker’s device
Outer identity: <exploit>@victim.domain
Inner identity: <exploit>@victim.domain | <exploit>
Password: <exploit>
1) Attacker inserts the exploit (log4j, SQL,
JavaScript, XSS, HTML …) payload to outer
or inner identity or password instead of the
credentials
3) victim.domain systems
processing outer/inner identity
and password are exposed to
the exploit
2) Any device, RADIUS server,
centralised log system, web based
user interface etc. which processes
or displays the outer identity is
exposed to the exploit.
Injection attack comments and mitigation
Comments
● There have not yet been successful public cases or occurrences of this attack
● In eduroam this was tested when log4j exploit was published but just placing log4j
exploit in the RADIUS request did not work
● Maximum length of an RADIUS attribute is 253 characters, which limits exploits
Mitigation
● Sanitising inputs in software
● Sanitising User-Name (outer identity), inner identity and password in RADIUS servers
○ Done sometimes for example for whitespaces in User-Name
○ Done also sometimes for specific characters, but extra care needs to be taken to
not break legit requests
○ Only home organisation is exposed to the exploit placed in the inner identity or
password
Visited organisation
(VO) Wi-Fi network
VLAN penetration attack
NAS
Attacker’s device
Outer identity: anonymous@attacker.com
Inner identity: realusername@attacker.com
Password: realpassword
1) Attacker tries to authenticate to the
Visited Organisation Wi-Fi network using
roaming credentials from attacker
controlled RADIUS server
Roaming federation servers often
clean at least the standard VLAN
assignment attributes from the
request but mostly pass all RADIUS
attributes through.
2) Attacker’s RADIUS server
accepts attacker authentication
and includes in its response
VLAN assignment attributes
targeted at VO’s Wi-Fi
equipment.
3) If VO RADIUS does not strip VLAN
assignment from responses coming from
roaming federation the attributes are
passed to the Wi-Fi network equipment
as they are
4) If VO uses VLAN assignment in its Wi-Fi
network, the Wi-Fi network equipment
drops attacker’s device to the VLAN
defined by attacker’s RADIUS server.
VLAN penetration attack mitigation
● Strip standard and vendor specific VLAN assignment
RADIUS attributes in the own organisation RADIUS server
● Strip attributes in the other federation RADIUS servers
● Take care what organisations can join the roaming
federation and in identifying them
Wi-Fi Roaming Privacy
You may have seen this in the Internet …
It’s funny, because it’s true...
(at least with these adjustments)
MAC ADDRESS
TRACKING YOUR DEVICE
MAC addresses, we all got them...
● Most of the network interfaces
on your device have a unique
address called a MAC address
● Wi-Fi and Bluetooth interfaces
may “broadcast” the address
even if the interface is not in
active use
MAC addresses are used ...
● to identify devices and users
● to control access to network
● to limit use of network resources
● to keep track of sessions
● to assign and track IP addresses
● to track devices => to track
persons
Wi-Fi devices send
so called probe
requests to find out
what Wi-Fi networks
are available and
they may do this
even if Wi-Fi is
turned off.
Bluetooth devices
respond to queries
and may do own
probing as well.
This makes it
possible to track for
example people and
their movements in
shopping malls. =>
nice tracking
business.
7 people
hanging near
certain store
person’
s path
recurring
visitor
MAC address randomisation
● first done only in the probe requests
● has been extended to network connections
● is currently per Wi-Fi network (profile)
● is expected in the future to be time-based as
well
● is enabled by default in Android 10,11,
iOS/iPadOS 14+
Check also
globalreachtech.com
WWW pages for
more analysis of
MAC address
randomisation by
Dr Chris Spencer
Randomised MAC address does not stop tracking
● In most devices randomised MAC address only changes when a
network or profile is deleted and create again => recurring
visitors can be identified at least within same network
● In authenticated and roaming networks MAC address does not
really matter, User-Name and Chargeable-User-Identity can be
used if these are not protected
● User-Name and Chargeable-User-Identity are sent in clear text
○ EAP-TLS with TLS<1.3, PEAP/EAP-TTLS, EAP-SIM /
EAP-AKA / EAP-AKA’ without IMSI Privacy
● While WPA2/3 authentication protects RADIUS authentication
with TLS, RADIUS accounting is sent in clear text
EAP-SIM/EAP-AKA/EAP-AKA’ privacy
EAP-SIM, EAP-AKA and EAP-AKA’ are SIM-based WiFi
authentication methods used to achieve seamless offloading to
carrier and partner WiFi. International Mobile Subscriber Identifier
(IMSI) derived from the SIM card is the unique identifier for each
user.
On the first connection to a WiFi network, the mobile device
communicates its permanent subscriber identity information
(IMSI), which is then sent to the home operator for authentication.
Without IMSI Privacy features, this identity is sent in the clear.
A potential 3rd party adversary installing a WiFi sniffer in the
vicinity of such networks can harvest permanent identities and
track users. This tracking can also be done by the venue or
network owner when connecting to the WiFi network.
Example: warning in iOS when joining WiFi without IMSI privacy in place
RADIUS Accounting Start message
e86bff00 Thu Feb 23 14:50:10 2023 594131: DEBUG: Packet dump:
e86bff00 *** Received from 10.255.255.245 port 61503 ....
e86bff00 Code: Accounting-Request
e86bff00 Identifier: 1
e86bff00 Authentic: <167>[<8>i+<250><208><242><12>A<179><226>d<183><183>S
e86bff00 Attributes:
e86bff00 Acct-Status-Type = Start
e86bff00 NAS-IP-Address = 10.255.255.245
e86bff00 User-Name = "0001012014020013@wlan.mnc001.mcc001.3gppnetwork.org"
e86bff00 NAS-Port = 0
e86bff00 NAS-Port-Type = Wireless-IEEE-802-11
e86bff00 Calling-Station-Id = "aa2b0b553528"
e86bff00 Called-Station-Id = "6026efcdcdc4"
e86bff00 Framed-IP-Address = 172.16.145.111
e86bff00 Acct-Multi-Session-Id = "AA2B0B553528-1677156607"
e86bff00 Acct-Session-Id = "6026EF5CDC55-AA2B0B553528-63F76102-8F448"
e86bff00 Acct-Delay-Time = 0
e86bff00 Aruba-Essid-Name = "RS-TEST"
e86bff00 Aruba-Location-Id = "rs-aruba-ap-1"
e86bff00 Aruba-User-Vlan = 145
e86bff00 Aruba-User-Role = "RS-TEST"
e86bff00 Aruba-Device-Type = "NOFP"
e86bff00 Acct-Authentic = RADIUS
e86bff00 Service-Type = Login-User
e86bff00 NAS-Identifier = "rs-aruba-ap-1"
e86bff00
Note IMSI in the User-Name,
MAC addresses, IP addresses,
Session-Ids, Aruba vendor
specific RADIUS attributes.
RADIUS Accounting Stop message
d5b39070 Thu Feb 23 14:53:52 2023 182291: DEBUG: Packet dump:
d5b39070 *** Received from 10.255.255.245 port 61503 ....
d5b39070 Code: Accounting-Request
d5b39070 Identifier: 1
d5b39070 Authentic: <188>9>g[<186><157>U|`<244><143>"<171><183><127>
d5b39070 Attributes:
d5b39070 Acct-Status-Type = Stop
d5b39070 NAS-IP-Address = 10.255.255.245
d5b39070 User-Name = "0001012014020013@wlan.mnc001.mcc001.3gppnetwork.org"
d5b39070 NAS-Port = 0
d5b39070 NAS-Port-Type = Wireless-IEEE-802-11
d5b39070 Calling-Station-Id = "aa2b0b553528"
d5b39070 Called-Station-Id = "6026efcdcdc4"
d5b39070 Framed-IP-Address = 172.16.145.111
d5b39070 Acct-Multi-Session-Id = "AA2B0B553528-1677156607"
d5b39070 Acct-Session-Id = "6026EF5CDC55-AA2B0B553528-63F76102-8F448"
d5b39070 Acct-Delay-Time = 0
d5b39070 Aruba-Essid-Name = "RS-TEST"
d5b39070 Aruba-Location-Id = "rs-aruba-ap-1"
d5b39070 Aruba-User-Vlan = 145
d5b39070 Aruba-User-Role = "RS-TEST"
d5b39070 Aruba-Device-Type = "NOFP"
d5b39070 Acct-Input-Octets = 35954
d5b39070 Acct-Output-Octets = 855517
d5b39070 Acct-Input-Packets = 549
d5b39070 Acct-Output-Packets = 453
d5b39070 Acct-Input-Gigawords = 0
Note also one Location
attribute. There are a lot more
related attributes in the
standardisation process and
under development is also a
technology called Wi-Fi
sensing, which probably also
brings new attributes to
RADIUS requests.
How to protect privacy?
● Use MAC address randomisation
● Use anonymous outer identity in Wi-Fi configurations
● Don’t send RADIUS accounting if it is not required (eduroam
recommendation)
● Use RadSec (RADIUS over TLS, RFC 6614) to protect both
authentication and accounting (OpenRoaming requirement)
● Use EAP-TLS with TLSv1.3 support for client certificate
authentication
● Use IMSI Privacy Protection supporting clients, server
software and operator
Radiator Auth.Fi
Enterprise Wi-Fi as a
service
Redundant roam.fi
RADIUS service in public
cloud
Adding RadSec to roam.fi roaming federation
Tampere University
RADIUS
Other customers
connecting via
RADIUS, e.g. City of
Seinäjoki, Seinäjoki
education etc.
RADIUS
RADIUS
RADIUS
RADIUS
Two more instances added
for inbound RadSec for
roam.fi organisations
outbound
OpenRoaming
outbound
OpenRoaming
inbound
OpenRoaming
inbound
OpenRoaming
inbound RadSec
for roam.fi
organisations
inbound RadSec
for roam.fi
organisations
Thank you, any questions?
Slideshare (personal): slideshare.net/khuhtanen/
Radiator Software webinars: radiatorsoftware.com/webinars/
Mastodon (personal): @khuhtanen@infosec.exchange
Twitter (personal): @khuhtanen
Twitter (company): @RadiatorAAA
Radiator Software: radiatorsoftware.com
1 de 34

Recomendados

Security issues in RADIUS based Wi-Fi AAA por
Security issues in RADIUS based Wi-Fi AAASecurity issues in RADIUS based Wi-Fi AAA
Security issues in RADIUS based Wi-Fi AAAKarri Huhtanen
702 visualizações18 slides
Wireless Security null seminar por
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminarNilesh Sapariya
4.2K visualizações51 slides
Implementing 802.1x Authentication por
Implementing 802.1x AuthenticationImplementing 802.1x Authentication
Implementing 802.1x Authenticationdkaya
15.3K visualizações30 slides
EAP-TLS (extended version) por
EAP-TLS (extended version)EAP-TLS (extended version)
EAP-TLS (extended version)Karri Huhtanen
262 visualizações13 slides
wireless lan security.ppt por
wireless lan security.pptwireless lan security.ppt
wireless lan security.pptSagarBedarkar3
21 visualizações52 slides
Wireless LAN Deployment Best Practices por
Wireless LAN Deployment Best PracticesWireless LAN Deployment Best Practices
Wireless LAN Deployment Best PracticesMichael Boman
2.4K visualizações86 slides

Mais conteúdo relacionado

Similar a Wi-Fi Roaming Security and Privacy

Operations: Security por
Operations: SecurityOperations: Security
Operations: SecurityAmazon Web Services
238 visualizações47 slides
Operations: Security Crash Course — Best Practices for Securing your Company por
Operations: Security Crash Course — Best Practices for Securing your CompanyOperations: Security Crash Course — Best Practices for Securing your Company
Operations: Security Crash Course — Best Practices for Securing your CompanyAmazon Web Services
367 visualizações47 slides
Enterprise Cloud Security por
Enterprise Cloud SecurityEnterprise Cloud Security
Enterprise Cloud SecurityMongoDB
232 visualizações41 slides
Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010 por
Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010
Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010Priyanka Aash
7.2K visualizações124 slides
E Snet Raf Essc Jan2005 por
E Snet Raf Essc Jan2005E Snet Raf Essc Jan2005
E Snet Raf Essc Jan2005FNian
534 visualizações44 slides
Securing Network Access with Open Source solutions por
Securing Network Access with Open Source solutionsSecuring Network Access with Open Source solutions
Securing Network Access with Open Source solutionsNick Owen
2.1K visualizações46 slides

Similar a Wi-Fi Roaming Security and Privacy(20)

Operations: Security por Amazon Web Services
Operations: SecurityOperations: Security
Operations: Security
Amazon Web Services238 visualizações
Operations: Security Crash Course — Best Practices for Securing your Company por Amazon Web Services
Operations: Security Crash Course — Best Practices for Securing your CompanyOperations: Security Crash Course — Best Practices for Securing your Company
Operations: Security Crash Course — Best Practices for Securing your Company
Amazon Web Services367 visualizações
Enterprise Cloud Security por MongoDB
Enterprise Cloud SecurityEnterprise Cloud Security
Enterprise Cloud Security
MongoDB232 visualizações
Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010 por Priyanka Aash
Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010
Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010
Priyanka Aash7.2K visualizações
E Snet Raf Essc Jan2005 por FNian
E Snet Raf Essc Jan2005E Snet Raf Essc Jan2005
E Snet Raf Essc Jan2005
FNian534 visualizações
Securing Network Access with Open Source solutions por Nick Owen
Securing Network Access with Open Source solutionsSecuring Network Access with Open Source solutions
Securing Network Access with Open Source solutions
Nick Owen2.1K visualizações
Firewalls por Deevena Dayaal
FirewallsFirewalls
Firewalls
Deevena Dayaal168 visualizações
Isa por deshvikas
IsaIsa
Isa
deshvikas908 visualizações
Sem cis ise por Lino Quivén
Sem cis iseSem cis ise
Sem cis ise
Lino Quivén689 visualizações
AAA server por hetvi naik
AAA serverAAA server
AAA server
hetvi naik367 visualizações
Corporate Security Issues and countering them using Unified Threat Management... por Rishabh Dangwal
Corporate Security Issues and countering them using Unified Threat Management...Corporate Security Issues and countering them using Unified Threat Management...
Corporate Security Issues and countering them using Unified Threat Management...
Rishabh Dangwal2.5K visualizações
19.) security pivot (policy byod nac) por Jeff Green
19.) security pivot (policy byod nac)19.) security pivot (policy byod nac)
19.) security pivot (policy byod nac)
Jeff Green816 visualizações
19.) security pivot (policy byod nac) por Jeff Green
19.) security pivot (policy byod nac)19.) security pivot (policy byod nac)
19.) security pivot (policy byod nac)
Jeff Green441 visualizações
e-Xpert Gate / Reverse Proxy - WAF 1ere génération por Sylvain Maret
e-Xpert Gate / Reverse Proxy - WAF 1ere génératione-Xpert Gate / Reverse Proxy - WAF 1ere génération
e-Xpert Gate / Reverse Proxy - WAF 1ere génération
Sylvain Maret729 visualizações
Design a Secure Azure IaaS - Lesson Learnt from Government Cloud por Thuan Ng
Design a Secure Azure IaaS - Lesson Learnt from Government Cloud Design a Secure Azure IaaS - Lesson Learnt from Government Cloud
Design a Secure Azure IaaS - Lesson Learnt from Government Cloud
Thuan Ng2.5K visualizações
Quantum Architecture Overview por jinpeng
Quantum Architecture OverviewQuantum Architecture Overview
Quantum Architecture Overview
jinpeng154 visualizações
Quantum Architecture Overview por jinpeng
Quantum Architecture OverviewQuantum Architecture Overview
Quantum Architecture Overview
jinpeng432 visualizações
Firewall por lmbriscoe
FirewallFirewall
Firewall
lmbriscoe4.7K visualizações
CNG 256 wireless wi-fi and bluetooth por Frank Victory
CNG 256 wireless   wi-fi and bluetoothCNG 256 wireless   wi-fi and bluetooth
CNG 256 wireless wi-fi and bluetooth
Frank Victory154 visualizações

Mais de Karri Huhtanen

OpenRoaming and CapPort por
OpenRoaming and CapPortOpenRoaming and CapPort
OpenRoaming and CapPortKarri Huhtanen
106 visualizações18 slides
Suomen eduroam-juuripalvelun uudistukset por
Suomen eduroam-juuripalvelun uudistuksetSuomen eduroam-juuripalvelun uudistukset
Suomen eduroam-juuripalvelun uudistuksetKarri Huhtanen
14 visualizações7 slides
Adding OpenRoaming to existing IdP and roaming federation service por
Adding OpenRoaming to existing IdP and roaming federation serviceAdding OpenRoaming to existing IdP and roaming federation service
Adding OpenRoaming to existing IdP and roaming federation serviceKarri Huhtanen
25 visualizações18 slides
OpenRoaming -- Wi-Fi Roaming for All por
OpenRoaming -- Wi-Fi Roaming for AllOpenRoaming -- Wi-Fi Roaming for All
OpenRoaming -- Wi-Fi Roaming for AllKarri Huhtanen
30 visualizações14 slides
Beyond eduroam: Combining eduroam, (5G) SIM authentication and OpenRoaming por
Beyond eduroam: Combining eduroam, (5G) SIM authentication and OpenRoamingBeyond eduroam: Combining eduroam, (5G) SIM authentication and OpenRoaming
Beyond eduroam: Combining eduroam, (5G) SIM authentication and OpenRoamingKarri Huhtanen
353 visualizações20 slides
Routing host certificates in eduroam/govroam por
Routing host certificates in eduroam/govroamRouting host certificates in eduroam/govroam
Routing host certificates in eduroam/govroamKarri Huhtanen
173 visualizações20 slides

Mais de Karri Huhtanen(20)

OpenRoaming and CapPort por Karri Huhtanen
OpenRoaming and CapPortOpenRoaming and CapPort
OpenRoaming and CapPort
Karri Huhtanen106 visualizações
Suomen eduroam-juuripalvelun uudistukset por Karri Huhtanen
Suomen eduroam-juuripalvelun uudistuksetSuomen eduroam-juuripalvelun uudistukset
Suomen eduroam-juuripalvelun uudistukset
Karri Huhtanen14 visualizações
Adding OpenRoaming to existing IdP and roaming federation service por Karri Huhtanen
Adding OpenRoaming to existing IdP and roaming federation serviceAdding OpenRoaming to existing IdP and roaming federation service
Adding OpenRoaming to existing IdP and roaming federation service
Karri Huhtanen25 visualizações
OpenRoaming -- Wi-Fi Roaming for All por Karri Huhtanen
OpenRoaming -- Wi-Fi Roaming for AllOpenRoaming -- Wi-Fi Roaming for All
OpenRoaming -- Wi-Fi Roaming for All
Karri Huhtanen30 visualizações
Beyond eduroam: Combining eduroam, (5G) SIM authentication and OpenRoaming por Karri Huhtanen
Beyond eduroam: Combining eduroam, (5G) SIM authentication and OpenRoamingBeyond eduroam: Combining eduroam, (5G) SIM authentication and OpenRoaming
Beyond eduroam: Combining eduroam, (5G) SIM authentication and OpenRoaming
Karri Huhtanen353 visualizações
Routing host certificates in eduroam/govroam por Karri Huhtanen
Routing host certificates in eduroam/govroamRouting host certificates in eduroam/govroam
Routing host certificates in eduroam/govroam
Karri Huhtanen173 visualizações
Cooperative labs, testbeds and networks por Karri Huhtanen
Cooperative labs, testbeds and networksCooperative labs, testbeds and networks
Cooperative labs, testbeds and networks
Karri Huhtanen190 visualizações
Privacy and traceability in Wi-Fi networks por Karri Huhtanen
Privacy and traceability in Wi-Fi networksPrivacy and traceability in Wi-Fi networks
Privacy and traceability in Wi-Fi networks
Karri Huhtanen164 visualizações
EAP-TLS por Karri Huhtanen
EAP-TLSEAP-TLS
EAP-TLS
Karri Huhtanen435 visualizações
TLS and Certificates por Karri Huhtanen
TLS and CertificatesTLS and Certificates
TLS and Certificates
Karri Huhtanen692 visualizações
What is Network Function Virtualisation (NFV)? por Karri Huhtanen
What is Network Function Virtualisation (NFV)?What is Network Function Virtualisation (NFV)?
What is Network Function Virtualisation (NFV)?
Karri Huhtanen512 visualizações
What is Network Function Virtualisation (NFV)? por Karri Huhtanen
What is Network Function Virtualisation (NFV)?What is Network Function Virtualisation (NFV)?
What is Network Function Virtualisation (NFV)?
Karri Huhtanen2.5K visualizações
Building secure, privacy aware, quality Wi-Fi coverage via cooperation por Karri Huhtanen
Building secure, privacy aware, quality Wi-Fi coverage via cooperationBuilding secure, privacy aware, quality Wi-Fi coverage via cooperation
Building secure, privacy aware, quality Wi-Fi coverage via cooperation
Karri Huhtanen636 visualizações
Connecting the Dots: Integrating RADIUS to Network Measurement and Monitoring por Karri Huhtanen
Connecting the Dots: Integrating RADIUS to Network Measurement and MonitoringConnecting the Dots: Integrating RADIUS to Network Measurement and Monitoring
Connecting the Dots: Integrating RADIUS to Network Measurement and Monitoring
Karri Huhtanen1.5K visualizações
Building city and nationwide Wi-Fi coverage via cooperation por Karri Huhtanen
Building city and nationwide Wi-Fi coverage via cooperationBuilding city and nationwide Wi-Fi coverage via cooperation
Building city and nationwide Wi-Fi coverage via cooperation
Karri Huhtanen948 visualizações
eduroam diagnostics in NTLR, IdPs and SPs por Karri Huhtanen
eduroam diagnostics in NTLR, IdPs and SPseduroam diagnostics in NTLR, IdPs and SPs
eduroam diagnostics in NTLR, IdPs and SPs
Karri Huhtanen1.4K visualizações
Using NoSQL databases to store RADIUS and Syslog data por Karri Huhtanen
Using NoSQL databases to store RADIUS and Syslog dataUsing NoSQL databases to store RADIUS and Syslog data
Using NoSQL databases to store RADIUS and Syslog data
Karri Huhtanen10.6K visualizações
Open WiFi or Broken WiFi? por Karri Huhtanen
Open WiFi or Broken WiFi?Open WiFi or Broken WiFi?
Open WiFi or Broken WiFi?
Karri Huhtanen1.1K visualizações
Cloud Based Identity Management por Karri Huhtanen
Cloud Based Identity ManagementCloud Based Identity Management
Cloud Based Identity Management
Karri Huhtanen385 visualizações
eduroam ennen, nyt ja tulevaisuudessa por Karri Huhtanen
eduroam ennen, nyt ja tulevaisuudessaeduroam ennen, nyt ja tulevaisuudessa
eduroam ennen, nyt ja tulevaisuudessa
Karri Huhtanen773 visualizações

Último

Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ por
Confidence in CloudStack - Aron Wagner, Nathan Gleason - AmericConfidence in CloudStack - Aron Wagner, Nathan Gleason - Americ
Confidence in CloudStack - Aron Wagner, Nathan Gleason - AmericShapeBlue
88 visualizações9 slides
DRBD Deep Dive - Philipp Reisner - LINBIT por
DRBD Deep Dive - Philipp Reisner - LINBITDRBD Deep Dive - Philipp Reisner - LINBIT
DRBD Deep Dive - Philipp Reisner - LINBITShapeBlue
140 visualizações21 slides
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R... por
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...ShapeBlue
132 visualizações15 slides
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ... por
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...ShapeBlue
85 visualizações10 slides
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue por
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlueMigrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlueShapeBlue
176 visualizações20 slides
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ... por
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...ShapeBlue
123 visualizações28 slides

Último(20)

Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ por ShapeBlue
Confidence in CloudStack - Aron Wagner, Nathan Gleason - AmericConfidence in CloudStack - Aron Wagner, Nathan Gleason - Americ
Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ
ShapeBlue88 visualizações
DRBD Deep Dive - Philipp Reisner - LINBIT por ShapeBlue
DRBD Deep Dive - Philipp Reisner - LINBITDRBD Deep Dive - Philipp Reisner - LINBIT
DRBD Deep Dive - Philipp Reisner - LINBIT
ShapeBlue140 visualizações
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R... por ShapeBlue
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...
ShapeBlue132 visualizações
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ... por ShapeBlue
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...
Live Demo Showcase: Unveiling Dell PowerFlex’s IaaS Capabilities with Apache ...
ShapeBlue85 visualizações
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue por ShapeBlue
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlueMigrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue
ShapeBlue176 visualizações
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ... por ShapeBlue
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
ShapeBlue123 visualizações
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti... por ShapeBlue
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
ShapeBlue98 visualizações
Microsoft Power Platform.pptx por Uni Systems S.M.S.A.
Microsoft Power Platform.pptxMicrosoft Power Platform.pptx
Microsoft Power Platform.pptx
Uni Systems S.M.S.A.80 visualizações
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates por ShapeBlue
Keynote Talk: Open Source is Not Dead - Charles Schulz - VatesKeynote Talk: Open Source is Not Dead - Charles Schulz - Vates
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates
ShapeBlue210 visualizações
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ... por ShapeBlue
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...
ShapeBlue146 visualizações
Extending KVM Host HA for Non-NFS Storage - Alex Ivanov - StorPool por ShapeBlue
Extending KVM Host HA for Non-NFS Storage -  Alex Ivanov - StorPoolExtending KVM Host HA for Non-NFS Storage -  Alex Ivanov - StorPool
Extending KVM Host HA for Non-NFS Storage - Alex Ivanov - StorPool
ShapeBlue84 visualizações
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive por Network Automation Forum
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Network Automation Forum50 visualizações
Uni Systems for Power Platform.pptx por Uni Systems S.M.S.A.
Uni Systems for Power Platform.pptxUni Systems for Power Platform.pptx
Uni Systems for Power Platform.pptx
Uni Systems S.M.S.A.61 visualizações
Why and How CloudStack at weSystems - Stephan Bienek - weSystems por ShapeBlue
Why and How CloudStack at weSystems - Stephan Bienek - weSystemsWhy and How CloudStack at weSystems - Stephan Bienek - weSystems
Why and How CloudStack at weSystems - Stephan Bienek - weSystems
ShapeBlue197 visualizações
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue por ShapeBlue
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlueCloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue
ShapeBlue93 visualizações
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha... por ShapeBlue
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
ShapeBlue138 visualizações
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or... por ShapeBlue
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
ShapeBlue158 visualizações
Ransomware is Knocking your Door_Final.pdf por Security Bootcamp
Ransomware is Knocking your Door_Final.pdfRansomware is Knocking your Door_Final.pdf
Ransomware is Knocking your Door_Final.pdf
Security Bootcamp90 visualizações

Wi-Fi Roaming Security and Privacy

  • 1. Wi-Fi roaming security and privacy 2023-02-23 Karri Huhtanen
  • 2. Karri Huhtanen ● Installed first Linux distribution ~1993 (Softlanding Linux System, didn’t know how to exit emacs or vi) ● Have had Internet access since 1993 (but purchased first Internet subscription in 2006) ● Have worked with wireless networks, security and roaming since 1997 ● Was there to connect Finland to eduroam in 2003 (maintained eduroam Finland top-level RADIUS since then) ● Founded Arch Red Oy (nowadays Radiator Software Oy) in Tampere University of Technology in 2003 with two colleagues to productise Wi-Fi access control and roaming solutions (e.g. roam.fi)
  • 3. This may not be the Wi-Fi network security presentation you are looking for… ● This is a presentation about Wi-Fi roaming security and privacy => e.g. local Wi-Fi network security, radio protocols is covered only briefly ● If there is interest I can do presentation about local Wi-Fi network security as well some other time / event. ● In Slideshare I do have a presentation about that topic: https://www.slideshare.net/khuhtanen/security-issues-in-radius-based-wifi-aaa and more: https://www.slideshare.net/khuhtanen/presentations ● And I am looking for a replacement for Slideshare, because Scribd has reduced the usability of the service with forced advertisements etc.
  • 4. So let’s start with Wi-Fi network security … :) with slides about Wi-Fi roaming basics as well
  • 5. How does WPA2/3 Enterprise AAA work? EAP-PWD EAP method based on elliptic Curves, real identity shown EAP-TTLS, TLS secured “envelope” EAP-PEAP outer identity can be anonymous or real identity EAP-TLS Certificate based EAP method, certificate details can be seen EAP-SIM, SIM card based EAP method, EAP-AKA(‘) temporary identities etc. User credentials (username+password, certificate, SIM card) travel within encrypted EAP envelope Network Access Server (NAS): E.g Wi-Fi controller, Wi-Fi AP RADIUS AAA server software RADIUS protocol WPA2/3 Enterprise Authentication
  • 6. So where does WPA2/3 Enterprise AAA fail? ● Very rarely with technology ● Sometimes with network and security design ● Often with misconfiguration or lack of configuration provisioning ● Most commonly with end users and manual device configuration
  • 7. What is the difference between WPA2 and WPA3? ● WPA3 mandates Protected Management Frames (PMF), WPA2 has those, but by default does not mandate their use ● WPA3 has additional stronger encryption methods, improvements in the key exchange (SAE instead of PSK) ● WPA2 will still be around and can be secured more with mandating PMF and disabling WPA1, TKIP compatibility
  • 8. Visited organisation (VO) Wi-Fi network How does Wi-Fi RADIUS roaming work? NAS Roaming visitor’s device Outer identity:anonymous@example.com Inner identity: realusername@example.com 1 Roaming visitor (anonymous@example.com) want to join to this Wi-Fi network 2 NAS forwards request to VO RADIUS server. As example.com is not VO realm, RADIUS server proxies request to its default server 3 Federation Top Level RADIUS server knows that realm example.com is handled by example.com RADIUS server and proxies request to it 4 Home organisation (example.com) RADIUS server and example.com user device negotiate and arrange TLS secured tunnel for authentication. Authentication happens between example.com user device and example.com RADIUS server using the infrastructure in between. 5 Home organisation RADIUS server makes OK or NOT decision based on the authentication and returns access decision response via same infrastructure route 6 NAS lets example.com user device connect (or not) to the VO Wi-Fi network based on the proxied RADIUS response
  • 9. Radiator Auth.Fi Enterprise Wi-Fi as a service Redundant roam.fi RADIUS service in public cloud RADIUS based roaming federation Tampere University RADIUS Other customers connecting via RADIUS, e.g. City of Seinäjoki, Seinäjoki education etc. Default RADIUS route for all roam.fi members, but no own default RADIUS route RADIUS RADIUS RADIUS RADIUS
  • 10. example.org RADIUS server example.com RADIUS server How does OpenRoaming work? (https://wballiance.com/openroaming/) Passpoint (Hotspot 2.0) compatible Wi-Fi network SSID: *any* RCOI (Settled): BA-A2-D0-xx-xx or RCOI (Settlement-Free): 5A-03-BA-xx-xx RADIUS capable Wi-Fi controller or example.net’s own RADIUS server OpenRoaming Settled or Settlement-Free Access Service Provider Static Radius over TLS (RadSec, RFC 6614) connection Passpoint (Hotspot 2.0) compatible Wi-Fi network SSID: *any* RCOI (Settled): BA-A2-D0-xx-xx or RCOI (Settlement-Free): 5A-03-BA-xx-xx Global Public DNS Passpoint (Hotspot 2.0) compatible Wi-Fi network SSID: *any* RCOI (Settled): BA-A2-D0-xx-xx or RCOI (Settlement-Free): 5A-03-BA-xx-xx DNS discovery: NAPTR aaa+auth:radius.tls.tcp <realm> SRV <NAPTR result> Name lookup <SRV result> Dynamic RadSec connection to example.net’s IdP service provider Dynamic RadSec connections to example.com IdP Dynamic RadSec connection to example.org IdP user@example.com user@example.net user2@example.com user@example.org
  • 12. Attacker sets up an Evil Twin Wi-Fi network Evil Twin Man-in-the-Middle (MitM) attack NAS Victim’s device Outer identity: anonymous@example.com Inner identity: realusername@example.com Federation Top Level RADIUS server 2) Victim’s device tries to negotiate TLS connection over RADIUS with home organisation RADIUS but evil twin intercepts and tries to impersonate home organisation RADIUS server. Federation RADIUS connectivity is not needed. The evil twin just needs to be able to terminate the TLS tunnel for RADIUS authentication. There have been accidental and ignorant evil twin RADIUS server configurations in organisations. 1) Evil twin sets up a Wi-Fi network with the Wi-Fi network name (SSID) or Roaming Consortium Organisation Identifier (RCOI) as the real roaming network provider. Victim’s device tries automatically to join this network. 3) If victim’s device does not have a proper Wi-Fi network configuration, or capabilities, to check the RADIUS server details, the device may send the credentials (username, password, password hash) to the attacker’s RADIUS server.
  • 13. Evil Twin attack mitigation ● Proper Wi-Fi configuration profiles (eduroam-cat/geteduroam.app, Windows policies, Apple Configurator) ● Using Private CA signed RADIUS server certificate instead of well-known or system CA (Android) signed one => impersonation with another certificate signed by the same CA does not work (some devices cannot check the certificate CN or SubjectAltNames) ● Using client-certificate authentication (EAP-TLS) or EAP-PWD => no credentials sent, but identity may be still sent ● Rogue access point detection and isolation features in Wi-Fi controllers ● Using separate network credentials (different username and password) or Multi-Factor Authentication => lost credentials are less valuable or do not work
  • 14. Visited organisation (VO) Wi-Fi network Brute force / Denial of Service (DoS) attack NAS Attacker’s device Outer identity: anonymous@example.com Inner identity: victim@example.com Password: password guess 1) Attacker tries to bruteforce victim’s password by using visited organisation’s Wi-Fi network and roaming infrastructure 2) example.com RADIUS server tries to authenticate victim@example.com from authentication backend (Active Directory, SQL, LDAP etc.) Roaming infrastructure or RADIUS servers do not usually have any rate-limiting. The round trip time for single roaming authentication is usually 1-5 seconds. 3) example.com RADIUS server authentication backend responds to all requests, but may also lock the user account for a while or completely (DoS)
  • 15. Brute force / Denial of Service (DoS) mitigation ● Rate limiting RADIUS requests in the home organisation RADIUS server ○ Can be complex to design, implement and configure depending on the EAP protocol and inner EAP authentication method ○ Contributes to Denial of Service attack ● Rate limiting requests the in home organisation authentication backend ○ Backends may not have support for rate limiting ○ Contributes to Denial of Service attack ● Rate limiting in the Wi-Fi network controller or Visited Organisation RADIUS server ○ Some support exists for detecting devices failing multiple authentication requests in the controllers ● Automatic locking and unlocking of the user account ● Rate limiting is rarely done because real attacks are equally rare
  • 16. Visited organisation (VO) Wi-Fi network Injection attack NAS Attacker’s device Outer identity: <exploit>@victim.domain Inner identity: <exploit>@victim.domain | <exploit> Password: <exploit> 1) Attacker inserts the exploit (log4j, SQL, JavaScript, XSS, HTML …) payload to outer or inner identity or password instead of the credentials 3) victim.domain systems processing outer/inner identity and password are exposed to the exploit 2) Any device, RADIUS server, centralised log system, web based user interface etc. which processes or displays the outer identity is exposed to the exploit.
  • 17. Injection attack comments and mitigation Comments ● There have not yet been successful public cases or occurrences of this attack ● In eduroam this was tested when log4j exploit was published but just placing log4j exploit in the RADIUS request did not work ● Maximum length of an RADIUS attribute is 253 characters, which limits exploits Mitigation ● Sanitising inputs in software ● Sanitising User-Name (outer identity), inner identity and password in RADIUS servers ○ Done sometimes for example for whitespaces in User-Name ○ Done also sometimes for specific characters, but extra care needs to be taken to not break legit requests ○ Only home organisation is exposed to the exploit placed in the inner identity or password
  • 18. Visited organisation (VO) Wi-Fi network VLAN penetration attack NAS Attacker’s device Outer identity: anonymous@attacker.com Inner identity: realusername@attacker.com Password: realpassword 1) Attacker tries to authenticate to the Visited Organisation Wi-Fi network using roaming credentials from attacker controlled RADIUS server Roaming federation servers often clean at least the standard VLAN assignment attributes from the request but mostly pass all RADIUS attributes through. 2) Attacker’s RADIUS server accepts attacker authentication and includes in its response VLAN assignment attributes targeted at VO’s Wi-Fi equipment. 3) If VO RADIUS does not strip VLAN assignment from responses coming from roaming federation the attributes are passed to the Wi-Fi network equipment as they are 4) If VO uses VLAN assignment in its Wi-Fi network, the Wi-Fi network equipment drops attacker’s device to the VLAN defined by attacker’s RADIUS server.
  • 19. VLAN penetration attack mitigation ● Strip standard and vendor specific VLAN assignment RADIUS attributes in the own organisation RADIUS server ● Strip attributes in the other federation RADIUS servers ● Take care what organisations can join the roaming federation and in identifying them
  • 21. You may have seen this in the Internet …
  • 22. It’s funny, because it’s true... (at least with these adjustments) MAC ADDRESS TRACKING YOUR DEVICE
  • 23. MAC addresses, we all got them... ● Most of the network interfaces on your device have a unique address called a MAC address ● Wi-Fi and Bluetooth interfaces may “broadcast” the address even if the interface is not in active use
  • 24. MAC addresses are used ... ● to identify devices and users ● to control access to network ● to limit use of network resources ● to keep track of sessions ● to assign and track IP addresses ● to track devices => to track persons
  • 25. Wi-Fi devices send so called probe requests to find out what Wi-Fi networks are available and they may do this even if Wi-Fi is turned off. Bluetooth devices respond to queries and may do own probing as well. This makes it possible to track for example people and their movements in shopping malls. => nice tracking business. 7 people hanging near certain store person’ s path recurring visitor
  • 26. MAC address randomisation ● first done only in the probe requests ● has been extended to network connections ● is currently per Wi-Fi network (profile) ● is expected in the future to be time-based as well ● is enabled by default in Android 10,11, iOS/iPadOS 14+
  • 27. Check also globalreachtech.com WWW pages for more analysis of MAC address randomisation by Dr Chris Spencer
  • 28. Randomised MAC address does not stop tracking ● In most devices randomised MAC address only changes when a network or profile is deleted and create again => recurring visitors can be identified at least within same network ● In authenticated and roaming networks MAC address does not really matter, User-Name and Chargeable-User-Identity can be used if these are not protected ● User-Name and Chargeable-User-Identity are sent in clear text ○ EAP-TLS with TLS<1.3, PEAP/EAP-TTLS, EAP-SIM / EAP-AKA / EAP-AKA’ without IMSI Privacy ● While WPA2/3 authentication protects RADIUS authentication with TLS, RADIUS accounting is sent in clear text
  • 29. EAP-SIM/EAP-AKA/EAP-AKA’ privacy EAP-SIM, EAP-AKA and EAP-AKA’ are SIM-based WiFi authentication methods used to achieve seamless offloading to carrier and partner WiFi. International Mobile Subscriber Identifier (IMSI) derived from the SIM card is the unique identifier for each user. On the first connection to a WiFi network, the mobile device communicates its permanent subscriber identity information (IMSI), which is then sent to the home operator for authentication. Without IMSI Privacy features, this identity is sent in the clear. A potential 3rd party adversary installing a WiFi sniffer in the vicinity of such networks can harvest permanent identities and track users. This tracking can also be done by the venue or network owner when connecting to the WiFi network. Example: warning in iOS when joining WiFi without IMSI privacy in place
  • 30. RADIUS Accounting Start message e86bff00 Thu Feb 23 14:50:10 2023 594131: DEBUG: Packet dump: e86bff00 *** Received from 10.255.255.245 port 61503 .... e86bff00 Code: Accounting-Request e86bff00 Identifier: 1 e86bff00 Authentic: <167>[<8>i+<250><208><242><12>A<179><226>d<183><183>S e86bff00 Attributes: e86bff00 Acct-Status-Type = Start e86bff00 NAS-IP-Address = 10.255.255.245 e86bff00 User-Name = "0001012014020013@wlan.mnc001.mcc001.3gppnetwork.org" e86bff00 NAS-Port = 0 e86bff00 NAS-Port-Type = Wireless-IEEE-802-11 e86bff00 Calling-Station-Id = "aa2b0b553528" e86bff00 Called-Station-Id = "6026efcdcdc4" e86bff00 Framed-IP-Address = 172.16.145.111 e86bff00 Acct-Multi-Session-Id = "AA2B0B553528-1677156607" e86bff00 Acct-Session-Id = "6026EF5CDC55-AA2B0B553528-63F76102-8F448" e86bff00 Acct-Delay-Time = 0 e86bff00 Aruba-Essid-Name = "RS-TEST" e86bff00 Aruba-Location-Id = "rs-aruba-ap-1" e86bff00 Aruba-User-Vlan = 145 e86bff00 Aruba-User-Role = "RS-TEST" e86bff00 Aruba-Device-Type = "NOFP" e86bff00 Acct-Authentic = RADIUS e86bff00 Service-Type = Login-User e86bff00 NAS-Identifier = "rs-aruba-ap-1" e86bff00 Note IMSI in the User-Name, MAC addresses, IP addresses, Session-Ids, Aruba vendor specific RADIUS attributes.
  • 31. RADIUS Accounting Stop message d5b39070 Thu Feb 23 14:53:52 2023 182291: DEBUG: Packet dump: d5b39070 *** Received from 10.255.255.245 port 61503 .... d5b39070 Code: Accounting-Request d5b39070 Identifier: 1 d5b39070 Authentic: <188>9>g[<186><157>U|`<244><143>"<171><183><127> d5b39070 Attributes: d5b39070 Acct-Status-Type = Stop d5b39070 NAS-IP-Address = 10.255.255.245 d5b39070 User-Name = "0001012014020013@wlan.mnc001.mcc001.3gppnetwork.org" d5b39070 NAS-Port = 0 d5b39070 NAS-Port-Type = Wireless-IEEE-802-11 d5b39070 Calling-Station-Id = "aa2b0b553528" d5b39070 Called-Station-Id = "6026efcdcdc4" d5b39070 Framed-IP-Address = 172.16.145.111 d5b39070 Acct-Multi-Session-Id = "AA2B0B553528-1677156607" d5b39070 Acct-Session-Id = "6026EF5CDC55-AA2B0B553528-63F76102-8F448" d5b39070 Acct-Delay-Time = 0 d5b39070 Aruba-Essid-Name = "RS-TEST" d5b39070 Aruba-Location-Id = "rs-aruba-ap-1" d5b39070 Aruba-User-Vlan = 145 d5b39070 Aruba-User-Role = "RS-TEST" d5b39070 Aruba-Device-Type = "NOFP" d5b39070 Acct-Input-Octets = 35954 d5b39070 Acct-Output-Octets = 855517 d5b39070 Acct-Input-Packets = 549 d5b39070 Acct-Output-Packets = 453 d5b39070 Acct-Input-Gigawords = 0 Note also one Location attribute. There are a lot more related attributes in the standardisation process and under development is also a technology called Wi-Fi sensing, which probably also brings new attributes to RADIUS requests.
  • 32. How to protect privacy? ● Use MAC address randomisation ● Use anonymous outer identity in Wi-Fi configurations ● Don’t send RADIUS accounting if it is not required (eduroam recommendation) ● Use RadSec (RADIUS over TLS, RFC 6614) to protect both authentication and accounting (OpenRoaming requirement) ● Use EAP-TLS with TLSv1.3 support for client certificate authentication ● Use IMSI Privacy Protection supporting clients, server software and operator
  • 33. Radiator Auth.Fi Enterprise Wi-Fi as a service Redundant roam.fi RADIUS service in public cloud Adding RadSec to roam.fi roaming federation Tampere University RADIUS Other customers connecting via RADIUS, e.g. City of Seinäjoki, Seinäjoki education etc. RADIUS RADIUS RADIUS RADIUS Two more instances added for inbound RadSec for roam.fi organisations outbound OpenRoaming outbound OpenRoaming inbound OpenRoaming inbound OpenRoaming inbound RadSec for roam.fi organisations inbound RadSec for roam.fi organisations
  • 34. Thank you, any questions? Slideshare (personal): slideshare.net/khuhtanen/ Radiator Software webinars: radiatorsoftware.com/webinars/ Mastodon (personal): @khuhtanen@infosec.exchange Twitter (personal): @khuhtanen Twitter (company): @RadiatorAAA Radiator Software: radiatorsoftware.com