PowerPoint SLIDES - Cal Poly Computer Science Department

802.11 Denial-of-Service Attacks
Real Vulnerabilities and
Practical Solutions
John Bellardo and Stefan Savage
Department of Computer Science and Engineering
University of California, San Diego
Motivation

802.11-based networks have flourished


Home, business, health care, military, etc.
Security is an obvious concern


Threats to confidentiality well understood and
being addressed [WPA, 802.11i]
Threats to availability (denial-of-service) not
widely appreciated & not being addressed
Live
802.11 DoS Demonstration
Attacker
Victim
Packets
Everyone Else
Time (1/10 second intervals)
802.11 DoS Attacks

RF Jamming


Bandwidth consumption (flooding)


802.11 has same vulnerability as wired nets; not our focus
Attacks on 802.11 protocol itself




Real threat, 802.11 highly vulnerable; not our focus
Easy to mount, low overhead, selective, hard to debug
Media access vulnerabilities
Management vulnerabilities
This talk focuses on these DoS attacks, their
practicality, their effectiveness and how to
defend against them
Media Access Vulnerabilities




802.11 includes collision avoidance mechanisms
Typically require universal cooperation between all
nodes in the network
Media access vulnerabilities arise from the
assumption of universal cooperation
Virtual carrier sense is an example of a media access
mechanism that is vulnerable to DoS attacks
NAV Vulnerability
2
2
6
6
6
6
6
0-2312
Frm Ctl Duration Addr1 Addr2 Addr3 Seq Ctl Addr4 Data
2
FCS
802.11 General Frame Format


Virtual carrier sense allows a node to reserve
the radio channel
Each frame contains a duration value




Indicates # of microseconds channel is reserved
Tracked per-node; Network Allocation Vector (NAV)
Used by RTS/CTS
Nodes only allowed to xmit if NAV reaches 0
Simple NAV Attack:
Forge packets with large Duration
Attacker
Access Point and Node 2 can’t xmit
(but Node 1 can)
Duration=32000
Access
Point
Node 1
Node 2
Extending NAV Attack w/RTS
AP and both nodes barred
from transmitting
Attacker
Access
Point
Node 1
Node 2
Conventional Wisdom

NAV attack not a practical threat


But would be highly effective if
implemented


Commodity hardware doesn’t allow
Duration field to be set
Shut down all access to 802.11 network
Both wrong…
Commodity 802.11 hardware

Firmware-driven microcontroller


Transmit path




Same code/architecture shared by most popular
vendors (Choice Microsystems)
Host provides frame to NIC and requests xmit
NIC firmware validates frame and overwrites key
fields (e.g. duration) in real-time
Frame then sent to baseband radio interface
Not possible to send arbitrary frames via
firmware interface
How to Generate Arbitrary
802.11 Frames?
Key idea:
AUX/Debug Port allows
Raw access to NIC SRAM
Host Interface to NIC
AUX Port
SRAM
1. Download frame to
NIC
2. Find frame in SRAM
3. Request transmission
4. Wait until firmware
modifies frame
5. Rewrite frame via AUX
port
Xmit Q
BAP
Xmit
process
Physical
resources
Virtualized firmware
interface
Radio Modem Interface
Why the NAV attack doesn’t work


Time (s)
Surprise: many vendors do not implement the
802.11 spec correctly
Duration field not respected by other nodes
Source
1.294020
Destination
Type
:e7:00:15:01
32.767
802.11 CTS
:93:ea:ab:df
0.258
TCP Data
:93:ea:e7:0f
0
802.11 Ack
0.258
TCP Data
1.295192
:93:ea:e7:0f
1.296540
1.2952 - 1.2940
:93:ea:ab:df
:93:ea:e7:0f
= 1.2 ms
1.297869
Duration (ms)
Excerpt from a NAV Attack Trace
Simulating the NAV attack

This bug will likely get fixed

Valuable for 802.11-based telephony, video, etc.

So how bad would the attack be?

Simulated NAV attack using NS2





18 Users
1 Access Point
1 Attacker
30 attack frames per second
32.767 ms duration per attack frame
NAV Attack Simulation
Packets
Attacker
-
Users
350
300
250
200
150
100
50
0
10 16 22 28 34 40 46 52 58 64 70 76 82 88 94
Simulated Seconds
Practical NAV Defense


Legitimate duration values are relatively
small
Determine maximum reasonable NAV
values for all frames




Each node enforces this limit
< .5 ms for all frames except ACK and CTS
~3 ms for ACK and CTS
Reran the simulation after adding
defense to the simulator
Simulated NAV Defense
Attacker
-
Users
350
Packets
300
250
200
150
100
50
0
10 16 22 28 34 40 46 52 58 64 70 76 82 88 94
Simulated Seconds
Management Vulnerabilities

802.11 Management functions



Most management operations unprotected



Authentication (validate identity)
Association (picking access point)
Easy to spoof with false identity
Source of vulnerabilities
This problem is not being fixed



Most management frames unencrypted
802.1x ports allocated after management
functions take place
802.11i has deferred addressing this problem
Deauth Attack

802.11 management requires nodes
associate before sending data
Access
Point
Authentication
Association
Authentication
Association
Response
Request
Authenticated
Associated
Attacker
Victim
Deauth Attack

Before node can transmit data, attacker
send a spoofed deauthentication frame
Deauthentication
Access
Point
Authenticated
Associated
Attacker
Victim
Deauth Attack

Node attempts to transmit data, but it
can not
Deauthentication
Data
Access
Point
Authenticated
Associated
Attacker
Victim
Deauth Attack Results
Packets
Attacker
Win XP
Linux Thinkpad
Linux iPaq
MacOS
800
700
600
500
400
300
200
100
0
1 11 21 31 41 51 61 71 81 91 101 112 122 132 141 151
Time (s)
Practical Deauth Defense


Based on the observed behavior that
legitimate nodes do not deauthenticate
themselves and then send data
Delay honoring deauthentication request




Small interval (5-10 seconds)
If no other frames received from source then
honor request
If source sends other frames then discard request
Requires no protocol changes and is
backwards compatible with existing hardware
Deauth Defense Results
Attacker
Win XP
Linux Thinkpad
Linux iPaq
17
33
MacOS
700
Packets
600
500
400
300
200
100
0
1
5
9
13
21
25
Time (s)
29
37
41
45
Conclusion

802.11 DoS attacks require more attention



Easy to mount and not addressed by existing
standards
Should not depend on restricted firmware
interfaces (can send arbitrary 802.11 pkts)
Deauthentication attack is most immediate
concern

Simple, practical defense shown to be effective
Hands-on Demonstration

Attack implemented
on an iPaq

See me for a handson demonstration
during the break