{"id":13188,"date":"2017-10-21T18:18:28","date_gmt":"2017-10-22T01:18:28","guid":{"rendered":"https:\/\/www.podfeet.com\/blog\/?p=13188"},"modified":"2017-10-22T07:34:17","modified_gmt":"2017-10-22T14:34:17","slug":"sb-22-10-17","status":"publish","type":"post","link":"https:\/\/www.podfeet.com\/blog\/2017\/10\/sb-22-10-17\/","title":{"rendered":"Security Bits \u2013 22 October 2017"},"content":{"rendered":"<h3>Security Medium 1 &#8211; WPA WiFi Encryption Develops KRACKs<\/h3>\n<p>This week started with a big security news announcement (responsibly disclosed, which is nice). Security researchers at the Belgian university <em>KU Leuven<\/em> revealed a collection of related attacks against the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Wi-Fi_Protected_Access\">WPA2 protocol<\/a> (<em>WiFi Protected Access<\/em> version 2). The problem at the root of these attacks was not related to any specific implementation of the spec, but with the spec itself, so every manufacturer who implemented the spec correctly would have introduced these vulnerabilities into their WiFi drivers. Because you have to give a bug a fancy name to get any media attention these days, it was given the somewhat strained pseudo-acronym KRACKs, from <em>key reinstallation attacks<\/em>.<\/p>\n<p>We\u2019re not going to go into the technical minutia here, but I have included links to some good explanations below. I do want to give a high-level overview of the problem though.<\/p>\n<p><!--more-->The first technical point to note is that WPA2 doesn\u2019t use your actual wireless network password to encrypt your wifi traffic. Your WiFi password (AKA your <em>pre-shared key<\/em>, or PSK) is only used to authenticate you to the access point (and it\u2019s only of the authentication mechanisms supported by WPA) \u2013 once the access point has determined that you should be allowed to join the network it negotiates a short-lived device-specific encryption key with your device. This negotiation is known as the <em>WPA 4-way handshake<\/em>, and the problem discovered is in step three of that negotiation. This means that it affects both variants of WPA2 \u2013 the kind used in home routers (<em>WPA-Personal<\/em> AKA <em>WPA-PSK<\/em>), and the kind used in larger organisations (<em>WPA-Enterprise<\/em>) where users authenticate to wifi using some kind of centralised user account (often from AD). It also means that what gets exposed is not your actual WiFi password, but, the temporary encryption key. So, attackers do get to decrypt all the packets flowing between your device and your wireless access point, but they don\u2019t get your WiFi password.<\/p>\n<p>The problem discovered with the third step of the three-way handshake is that it\u2019s possible for an attacker to cause a so-called <a href=\"https:\/\/en.wikipedia.org\/wiki\/Cryptographic_nonce\">cryptographic nonce<\/a> (a pseudo-acronym from <em>number used once<\/em>) to be re-used. This is a massive security no-no. Literally, the entire point of a nonce is that it should never ever ever be re-used, ever. To quote Wikipedia:<\/p>\n<blockquote><p>In cryptography, a nonce is an arbitrary number that may only be used once \u2026 it is often a random or pseudo-random number issued in an authentication protocol to ensure that old communications cannot be reused in replay attacks.<\/p><\/blockquote>\n<p>The effect of this bug is to allow an attacker to decrypt a bunch of the packets flowing between a wireless access point and a single client for a short period of time. The attack can, of course, be repeated over and over again, so that <em>short time<\/em> isn\u2019t much of a silver lining. Each device on a WPA2 network negotiates its own temporary encryption key with the AP, and they are all different, so an attacker does not get to see all the traffic on the entire network, just the traffic flowing to the single client they exploit. It\u2019s vital to note that this is not a remote attack \u2013 attackers needs to be within WiFi range of their victims.<\/p>\n<p>A good way to think about this bug is that until you patch your devices, every Wifi network has just become like hotel or coffee shop WiFi \u2013 everything that\u2019s not run through a VPN or otherwise encrypted (e.g. with properly configured HTTPS or TLS) can be seen by attackers.<\/p>\n<p>Finally, the fix for this problem is a small tweak in the WPA2 protocol for WiFi <strong>clients<\/strong> (or <em>WiFi supplicants<\/em> to use the official WPA jargon). This means that OS and device vendors need to tweak their Wifi client code to follow the new spec.<\/p>\n<p>Because the bug involves WiFi, initial media attention fixated on WiFi routers, and how it would be impossible get firmware updates rolled out to all routers. This coverage completely missed the key point \u2013 what\u2019s needed are client patches! As the hours went by this reality slowly began to sink in, and media coverage shifted to the real issue \u2013 getting updates onto all our computers, tablets, phones, and most troublesome of all, all those other devices that now live on our networks like our smart TVs, our games consoles, and our IoT devices.<\/p>\n<p>What does muddy the water a little bit is that there are some scenarios in which WiFi access points behave as WiFi clients. In those scenarios, a firmware update is required. The two most common such scenarios are where one AP is used as an extender for another, and where multiple Apps are connected together into a mesh network. If either of those scenarios applies to you, then you absolutely need to get updates onto your access points. If you just have a single wireless router then it\u2019s very unlikely it ever acts as a WiFi client, so fixating on getting your router patched is a waste of time an energy you should be devoting to the mammoth task of getting all your other devices patched!<\/p>\n<p>Another subtlety is that some versions of Android misimplement the old spec in a spectacularly bad way \u2013 they re-set the encryption key to all zeros when part of the handshake is repeated, effectively removing the encryption completely! This \u00fcber-bug only affects Android 6 and up, so <em>Marshmallow<\/em>, <em>Nougat<\/em> &amp; <em>Oreo<\/em>.<\/p>\n<p>Each device manufacturer will need to release an update to address this, and I can\u2019t even begin to draw up a list of all the devices and whether or not there is a patch for them. What I can do is share what I know about the major OSes:<\/p>\n<ul>\n<li>Windows \u2013 a fix was included in the October <em>Patch Tuesday<\/em> updates<\/li>\n<li>macOS, iOS, watchOS &amp; tvOS \u2013 not vulnerable because Apple didn\u2019t completely\/correctly implement the original buggy spec. Apple are working on an update that will implement the new non-buggy spec properly, and that\u2019s already in beta.<\/li>\n<li>Android \u2013 the bug was fixed as part of the October security update from Google, but the usual problems apply getting that fix out to all Android devices.<\/li>\n<li>Linux \u2013 patches were available at the time the announcement was made<\/li>\n<\/ul>\n<h3>Links<\/h3>\n<ul>\n<li>The official site for the bug \u2014 <a href=\"https:\/\/www.krackattacks.com\/\">www.krackattacks.com\/\u2026<\/a><\/li>\n<li>US-CERT\u2019s page tracking this vulnerability \u2014 <a href=\"https:\/\/www.kb.cert.org\/vuls\/id\/228519\/\">www.kb.cert.org\/\u2026<\/a><\/li>\n<li>A nice explanation of the problem, and some sound advice \u2014 <a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/10\/16\/wi-fi-at-risk-from-krack-attacks-heres-what-to-do\/\">nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li><a href=\"http:\/\/tidbits.com\/article\/17572\">Wi-Fi Security Flaw Not As Bad As It\u2019s KRACKed Up To Be &#8211; tidbits.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/www.windowscentral.com\/microsoft-releases-statement-krack-wi-fi-vulnerability?_ga=2.139415792.237872566.1508456904-1778078088.1391873170\">Microsoft releases statement on KRACK Wi-Fi vulnerability &#8211; www.windowscentral.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/www.macrumors.com\/2017\/10\/16\/krack-wifi-vulnerabilities-patched-apple-ios-macos\/\">Apple Says \u2018KRACK\u2019 Wi-Fi Vulnerabilities Are Already Patched in iOS, macOS, watchOS, and tvOS Betas \u2014 www.macrumors.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/www.imore.com\/amazon-says-patch-wpa2-exploit-krack-works\">Amazon says a patch for WPA2 exploit KRACK is in the works \u2014 www.imore.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wi-fi-krack-vulnerabilities-faq-for-mac-iphone-and-ipad-users\/\">Wi-Fi KRACK Vulnerabilities: FAQ for Mac, iPhone and iPad Users \u2014 www.intego.com\/\u2026<\/a><\/li>\n<\/ul>\n<h3>Security Medium 2 &#8211; ROCA<\/h3>\n<p>Security researchers have found a catastrophic bug in the firmware used by Infineon-made <a href=\"https:\/\/en.wikipedia.org\/wiki\/Trusted_Platform_Module\">Trusted Platform Module (TPM)<\/a> chips. These chips are used both on PC motherboards and, in smart cards. TPM is an international standard for dedicated cryptographic micro-controllers. They can securely generate and store cryptographic keys, and perform encryption and decryption on behalf of the devices they\u2019re incorporated into. Basically, these are similar devices to Apple\u2019s <em>Secure Enclave<\/em>, but more generic.<\/p>\n<p>There are lots of uses for TPMs, but I want to draw particular attention to two common use-cases:<\/p>\n<ol>\n<li>Some nations have national ID cards with the ability to digitally sign documents. These smart cards obviously need to securely store cryptographic keys, so, they use TPMs.<\/li>\n<li>Disk encryption relies on the secure storage of cryptographic keys, so, Microsoft\u2019s BitLocker uses TPMs to store disk encryption keys.<\/li>\n<\/ol>\n<p>In theory, public\/private key pairs generated by TPMs for asymmetric encryption should be very robust, and very secure. After all, we are talking about dedicated crypto hardware here! The whole point of asymmetric encryption is that it should be effectively impossible to derive the private key from the public key (i.e. it should take longer than the age of the universe to do).<\/p>\n<p>And that\u2019s where the ROCA vulnerability comes in. BTW, in case you\u2019re wondering about the name, it stands for <em>Return Of Coppersmith\u2019s Attack<\/em>.<\/p>\n<p>It\u2019s been discovered that due to a bug introduced into the firmware for Infineon TPM chips in 2012, many of the key pairs generated by the devices are millions of times easier to crack than they should be. Rather than taking multiples of the age of the universe to crack, a single CPU can do the job in a few months. Throw some cloud computing at the problem or a bank of high-end graphics cards, and you\u2019ll get there even quicker! If you want to think of computing power in terms of dollars, then it would cost you $76 to break an affected 1024-bit key pair and $40,000 for a 2048-bit key pair using Amazon\u2019s AWS cloud services.<\/p>\n<p>Not all key pairs generated by the affected Infineon TPMs are vulnerable, but, given a public key, it\u2019s possible to determine if it belongs to a vulnerable key pair in a matter of milliseconds. This means attackers can know up-front whether or not any key is worth the investment to crack.<\/p>\n<p>Recovering from this bug is a two-step process. Firstly, the firmware in the TPM needs to be updated, and secondly, all the weak key-pairs need to be replaced with newly generated secure key pairs. You\u2019ll see this second step referred to as <em>re-keying<\/em>.<\/p>\n<p>Dealing with patching and re-keying national ID cards is a government problem, but dealing with weak BitLocker encryption is a problem regular old Windows users will need to tackle.<\/p>\n<p>If you\u2019re a Windows user who uses BitLocker you\u2019ll need to start by trying to figure out if your computer contains a vulnerable Infineon TPM, and if it does, you\u2019ll ideally need to get a firmware update form your computer\u2019s hardware manufacturer. Once your firmware is patched, you\u2019ll need to re-key BitLocker. If there\u2019s not firmware patch available for your computer for whatever reason, all is not lost. IT\u2019s possible to use software to generate your own BitLocker key pair, and use that instead of one generated by your TPM.<\/p>\n<p>Many PC manufacturers including HP, Fujitsu, Lenovo, Acer, Asus, LG, Samsung, and Toshiba have released firmware updates, and Microsoft included related updates in this month\u2019s Patch Tuesday updates.<\/p>\n<p>I couldn\u2019t possibly give detailed instructions in a situation like this \u2013 there are just too many permutations of hardware and OSes and configurations, so the best I can do is list some potentially helpful links that I\u2019ve come across during my research.<\/p>\n<h3>Links<\/h3>\n<ul>\n<li>The home page for the vulnerability (includes a section with links to testers) \u2014 <a href=\"https:\/\/roca.crocs.fi.muni.cz\/\">roca.crocs.fi.muni.cz\/\u2026<\/a><\/li>\n<li>Infineon\u2019s support page on the vulnerability \u2014 <a href=\"https:\/\/www.infineon.com\/TPM-update\">www.infineon.com\/\u2026<\/a><\/li>\n<li>Microsoft\u2019s advisory on the vulnerability \u2014 <a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV170012\">portal.msrc.microsoft.com\/\u2026<\/a><\/li>\n<li>Google\u2019s advisory on the vulnerability (many Chromebooks appear to be affected) \u2014 <a href=\"https:\/\/sites.google.com\/a\/chromium.org\/dev\/chromium-os\/tpm_firmware_update\">sites.google.com\/\u2026<\/a><\/li>\n<li>Yubico\u2019s advisory on the vulnerability (some YubiKeys are affected) \u2014 https:\/\/www.yubico.com\/2017\/10\/infineon-rsa-key-generation-issue\/<\/li>\n<li><a href=\"https:\/\/arstechnica.co.uk\/information-technology\/2017\/10\/crypto-failure-cripples-millions-of-high-security-keys-750k-estonian-ids\/\">Millions of high-security crypto keys crippled by newly discovered flaw \u2014 arstechnica.co.uk\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/10\/18\/encryption-chip-flaw-afflicts-huge-number-of-computers\/\">Encryption chip flaw afflicts huge number of computers &#8211; nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<\/ul>\n<h3>Notable Security Updates<\/h3>\n<ul>\n<li>Adobe released an out-of-band Flash update that patches a zero-day that\u2019s under active exploitation in the wild \u2014 <a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/10\/17\/flash-0-day-in-the-wild-patch-now\/\">nakedsecurity.sophos.com\/\u2026<\/a> &amp; <a href=\"https:\/\/www.macobserver.com\/news\/kaspersky-lab-finds-adobe-flash-bug-from-blackoasis-group\/\">www.macobserver.com\/\u2026<\/a><\/li>\n<\/ul>\n<h3>Notable News<\/h3>\n<ul>\n<li>Recent tests by security firm NSS labs found that Microsoft\u2019s Edge browser protects users from more phishing attacks than Chrome or FireFox \u2014 <a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/10\/16\/chrome-smoked-by-edge-in-browser-phishing-test\/\">nakedsecurity.sophos.com\/\u2026<\/a> &amp; <a href=\"https:\/\/globenewswire.com\/news-release\/2017\/10\/12\/1144984\/0\/en\/NSS-Labs-Conducts-First-Cross-Platform-Test-of-Leading-Web-Browsers.html\">globenewswire.com\/\u2026<\/a><\/li>\n<li>Google have announced the new <em>Advanced Protection Program<\/em> \u2013 optional extra protection aimed at those at high risk of cyber attack. The price? Significant inconvenience and the cost of two hardware tokens \u2014 <a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/10\/20\/googles-advanced-protection-program-extra-security-at-a-cost\/\">nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li>Google have announced that they are making changes to their AdWords product so it meets Apple\u2019s guidelines for not being blocked by Safari\u2019s Intelligent Tracking prevention. The end-result should be a better balance between measurement of ad effectiveness and user privacy \u2014 <a href=\"https:\/\/www.macobserver.com\/news\/google-finds-workaround-apples-intelligent-tracking-prevention\/\">www.macobserver.com\/\u2026<\/a><\/li>\n<\/ul>\n<h3>Suggested Reading<\/h3>\n<ul>\n<li>PSAs, Tips &amp; Advice\n<ul>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/understanding-user-accounts-in-macos\/\">Understanding User Accounts in macOS \u2014 www.intego.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/www.imore.com\/how-equifax-breach-affects-your-enrollment-iphone-upgrade-program\">How the Equifax breach affects your enrollment in the iPhone Upgrade Program \u2014 www.imore.com\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<li>Opinion &amp; Analysis\n<ul>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/10\/17\/the-fix-is-in-for-hackable-voting-machines-use-paper\/\">The fix is in for hackable voting machines: use paper \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/10\/18\/internet-of-ships-falling-down-on-security-basics\/\">Internet of Ships falling down on security basics \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<li>Propellor Beanie Territory\n<ul>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/10\/18\/six-cybersecurity-predictions-that-might-actually-come-true\/\">6 cybersecurity predictions (that might actually come true) \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/10\/18\/is-security-on-the-verge-of-a-fuzzing-breakthrough\/\">Is security on the verge of a fuzzing breakthrough? \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>Palate Cleansers<\/h3>\n<ul>\n<li><a href=\"https:\/\/www.imore.com\/how-try-out-linux-aging-mac\">How to try out Linux on an aging Mac \u2014 www.imore.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/www.photographytalk.com\/beginner-photography-tips\/7954-as-a-photographer-these-are-13-free-apps-i-wouldn-t-leave-the-house-without\">As a Photographer, These are 13 Free Apps I Wouldn\u2019t Leave the House Without \u2014 www.photographytalk.com\/\u2026<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Security Medium 1 &#8211; WPA WiFi Encryption Develops KRACKs This week started with a big security news announcement (responsibly disclosed, which is nice). Security researchers at the Belgian university KU Leuven revealed a collection of related attacks against the WPA2 protocol (WiFi Protected Access version 2). The problem at the root of these attacks was [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":13191,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[147,214],"tags":[1941,1942,50,569,780,1939,1940],"class_list":["post-13188","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-posts","category-security-bits","tag-krack","tag-roca","tag-security","tag-security-bits","tag-wifi","tag-wpa","tag-wpa2"],"jetpack_featured_media_url":"https:\/\/www.podfeet.com\/blog\/wp-content\/uploads\/2017\/10\/security_bits_logo_300px.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/13188","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/comments?post=13188"}],"version-history":[{"count":4,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/13188\/revisions"}],"predecessor-version":[{"id":13193,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/13188\/revisions\/13193"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/media\/13191"}],"wp:attachment":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/media?parent=13188"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/categories?post=13188"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/tags?post=13188"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}