Readit News logoReadit News
amluto · 8 years ago
I'm not optimistic. I believe that the underlying crypto protocol is this:

https://ieeexplore.ieee.org/document/4622764/

It's "secure authentication of equals", which is a protocol that kind of looks like it's trying to be a PAKE (Password Authenticated Key Exchange), but the paper does not mention PAKE anywhere in its abstract, and I'm not at all confident that SAE's design or analysis takes into account the properties that PAKE protocols should have.

I think that the original WPA key exchange was supposed to use the SRP protocol, which is a PAKE, but that was dropped due to patent issues. Since then, as I understand it, quite a few very nice PAKE protocols have had their patents expire, so I don't see what the problem is now.

So color me extremely skeptical.

tptacek · 8 years ago
That's a Dan Harkins protocol; Harkins is a little notorious for Dragonfly, a PAKE he tried to get "approved" by IETF CFRG before being slagged by Trevor Perrin†, who wrote up a particularly simple and nasty side channel attack on the elliptic curve point generation technique Dragonfly used. SAE includes what looks like the same "hunt-and-peck" point generator.

https://www.ietf.org/mail-archive/web/tls/current/msg10922.h...

Later:

All I ever read about the Dragonfly PAKE was trevp taking it apart on CFRG, but from a quick skim of this paper and the IETF draft Harkins wrote for Dragonfly, this looks like it's just an instantiation of Dragonfly.

That would be pretty funny.

What is it about WiFi security that makes it such a backwater?

gsnedders · 8 years ago
> What is it about WiFi security that makes it such a backwater?

The fact that the specs are developed behind closed doors in pay-to-play venues? At least, IME, there's a pretty strong correlation between specs developed behind closed doors and bad specs.

zokier · 8 years ago
I'd note that the circumstances surrounding Dragonfly have been controversial, and it did end up being RFC 7664

https://www.ietf.org/mail-archive/web/tls/current/msg10962.h...

https://www.ietf.org/mail-archive/web/cfrg/current/msg03554....

https://www.ietf.org/mail-archive/web/cfrg/current/msg03736....

There is plenty of more discussion on IETF mailing lists (and probably elsewhere too). Ultimately on a glance I can't say how trustworthy Dragonfly is because of the controversy. Perrin has obvious strong dislike for it, but that alone is not yet the end of the world.

AlyssaRowan · 8 years ago
It does indeed seem to be DRAGONFLY (I'd heard rumours indicating such in advance): a surprising choice for an interactive protocol with attacker-observable timings, I felt, given its already chequered reputation?

I couldn't possibly speculate as to why, but one does feel inclined to agree that the people behind wireless LAN security haven't always generally chosen high quality methods in the past, and this feels to me like it could well be a continuation of that pattern.

acqq · 8 years ago
It seems Dan Harkins (as Daniel) is also in the group of inventors applying for some possibly relevant patents:

https://patents.justia.com/inventor/daniel-harkins

This one is granted:

https://patents.google.com/patent/US20170013449

"Original Assignee Aruba Networks Inc"

"Current Assignee Hewlett-Packard Enterprise Development LP"

He co-authored a blog post about the WPA3(TM):

http://community.arubanetworks.com/t5/Technology-Blog/WPA3-T...

ergothus · 8 years ago
I don't think I've ever heard cryptosecurity disputes being described in such a...visceral manner.
tialaramex · 8 years ago
"such a backwater"

After some years staring at this I've decided everything looks this way if you're used to the Web PKI. I tried very hard at first to assume that the PCI SSC, the EMV group, Wi-Fi Alliance and suchlike are doing great work but it's behind closed doors and so invisible to me. That theory has been challenged so thoroughly that I feel compelled to reject it.

Four things that stick in my mind in no particular order in relation to this realisation:

1. Peter Gutmann's out of the blue attack on ACME when it was relatively young. Gutmann's SCEP doesn't solve the problem, and at first my assumption was that he just needed to have that explained. After a while I realised that SCEP's success depends up not understanding what the real problem is, and SCEP is widely deployed outside the Web PKI largely _because_ choosing not to understand the problem suits those applications perfectly well. ACME can't displace SCEP in such applications but its existence might cause people to ask uncomfortable questions and perhaps Peter would (unconsciously?) rather that didn't happen.

2. Eric Rescorla's explanation of what a great environment HTTP (and particularly web browsers) is for a cryptographic adversary. In the literature imaginary bad guys often get to watch one party do a million message/reply back and forths, time them accurately and then send a million bytes of nonsense data to the target as setup for their attack, and in many applications this would be ludicrous in practice, the target would obviously react, how could you do cause anyone to send so many messages without attracting notice, let alone time them? So the attacks seem just theoretical. But on the web you can just write some Javascript and victims will happily run it for you on their computers.

3. Dean Coclin of Symantec and eventually the various banks/ payment providers etcetera that had hidden behind Symantec explaining that such institutions really _needed_ security, unlike mere cat blogs and search engines, but of course they couldn't be expected to react to notice of serious issues with an obsolete hash algorithm in a timely fashion, and so surely they ought to get an extra year or five to upgrade from SHA-1, and if they didn't there'd be dire consequences.

4. ETSI's work on the "Middlebox Security Protocol" aka ETSI TS 103 523. Obviously most of this happens out of view, so we have no idea if there's something productive being discussed - but they kindly (?) shared their work in progress documents with outsiders including the TLS Working Group and er... yuck. I mean... see for yourself:

https://docbox.etsi.org/CYBER/CYBER/Open/Latest_Drafts

yuhong · 8 years ago
Looks like 802.11s dates before that post.
mrb · 8 years ago
Agreed. I'm worried SAE hasn't received as much peer review as other PAKE protocols.

IMHO they should have gone with J-PAKE (https://en.wikipedia.org/wiki/Password_Authenticated_Key_Exc...) which is one of the few PAKE protocols that is not patent encumbered and decently peer-reviewed. In fact, that's why Thread (https://www.threadgroup.org/) selected J-PAKE as their authentication protocol.

aidenn0 · 8 years ago
That paper does cite a number of other PAKE papers, including SRP.
bcaa7f3a8bbc · 8 years ago
> the SRP protocol, which is a PAKE, but that was dropped due to patent issues.

What about (EC)DHE_PSK, is it also patented? If so, the software patent is fricking insane...

yuhong · 8 years ago
Another patent that will probably expire soon is the patents on OCB, which was also tried for 802.11i.
amluto · 8 years ago
IIRC OCB is now available for free under a reasonable license. I could be remembering wrong, though.
excalibur · 8 years ago
> Wi-Fi Alliance is also introducing Wi-Fi CERTIFIED Easy Connect™, a new program that reduces the complexity of onboarding Wi-Fi devices with limited or no display interface – such as devices coming to market for Internet of Things (IoT) – while still maintaining high security standards. Wi-Fi Easy Connect™ enables users to securely add any device to a Wi-Fi network using another device with a more robust interface, such as a smartphone, by simply scanning a product quick response (QR) code. Wi-Fi Easy Connect and WPA3 represent the latest evolution in Wi-Fi Alliance programs to ensure users receive a positive experience while remaining securely connected as the security landscape evolves.

This is highly reminiscent of WPS. The language indicates that they've learned their lesson and focused on making the standard secure, at least in theory. Time will tell how well it's implemented, but history says to be skeptical and disable it for the time being.

sandworm101 · 8 years ago
It is allowing any device already on the network to vouch for new devices. What could possibly go wrong? WPS had flaws in its implementation, but was reasonable on a theoretical level. This seems foolhardy at best.

WPA2, when properly implemented, is very secure. I'm not sure of WPA3's real purpose. Is strong encryption of wifi signals of any benefit? The days of banking passwords being send in html gets should be behind us. Anything important will be protected by other encryption layers than wifi. Is WPA3 meant to protect unauthorized network access? WPA2 isn't exactly easy to crack. Do we really need a new scheme, and the inevitable new flaws that come with it? Or is this really about streamlining the user experience, about making wifi that little bit less complicated, so that people can attached their smart toasters to the home network without having to actually remember the password.

To clarify for those who obviously do not understand the difference between protocol and concept implementation: Errors in the protocol would have been inconsequential if WPS was implemented properly. Had it not been left on 24/7, the temporary use of shorter keys would have been a good thing. It would have allowed home networks to adopt much more complex keys without having to type them into every new device (a big deal on things like printers which didn't have keyboards). WPS could have contributed to greater WPA2 security. But instead the concept was improperly implemented, allowing the inevitable errors discovered in the adopted protocol to be leveraged.

Ajedi32 · 8 years ago
It doesn't say _any_ device. On the contrary, it sounds like the network admin has to explicitly delegate that authority to the configurator device:

> With Wi-Fi Easy Connect, a network owner chooses one device as the central point of configuration.

https://www.wi-fi.org/discover-wi-fi/wi-fi-easy-connect

Though with WPA2 (personal, at least), isn't it already possible for "any permitted device" to "vouch for new devices" by simply giving those new devices the Wi-Fi password?

mtgx · 8 years ago
No, that's factually wrong. KRACK showed the protocol itself is vulnerable, not the implementations, and it affects all devices.

https://www.krackattacks.com/

This is really why they went with WPA3, but I've noticed the Wi-Fi Alliance goes to great lengths to avoid any mentions of KRACK. So now, many, like you, are scratching their heads wondering what's the point of WPA3.

UncleEntity · 8 years ago
> WPS had flaws in its implementation, but was reasonable on a theoretical level.

Not sure about that since it has a key space of 10,000.

Implementations without a timeout were super-easy to crack while those with a timeout just took time to figure out how long the timeout was and to not exceed it. I have a Netgear wifi bridge that doesn't turn of WPS (even if you click the button) with no timeout and is trivial to get the password out of while another case it took a couple weeks once I determined the timeout.

*of course I only tested on my own devices and never engaged in wifi thievery from my neighbors

d33 · 8 years ago
> WPA2, when properly implemented, is very secure

Not really:

https://github.com/d33tah/call-for-wpa3/

urda · 8 years ago
> WPA2, when properly implemented, is very secure.

Nope, WPA2 has a number of security issues. Let me introduce you to the Wi-Fi deauthentication attack [1].

  [1] https://en.wikipedia.org/wiki/Wi-Fi_deauthentication_attack

IshKebab · 8 years ago
This isn't really like WPS. It's more like... what a lot of IoT devices already do.

I'm not sure any IoT devices ever used WPS.

comboy · 8 years ago
Currently you need bluetooth between your smartphone and the IoT device just to set it up. Maybe with the help of this, bluetooth could be removed.
d33 · 8 years ago
Pardon my negative comment, but given their history of absolutely terrible crypto, I can't wait to see how they mess it up this time.

Some thoughts on WPA2: https://github.com/d33tah/call-for-wpa3/

keeperofdakeys · 8 years ago
kevingrahl · 8 years ago
If I understood everything, you have to be a Wi-Fi Alliance member in order to develop/contribute/vote on all things WiFi. The smallest membership that allows you to participate is US$7,500/year for 2018 (next year it’ll be $7,725/year). And that’s only for small businesses and they won’t have all voting rights. The actual membership is a whopping US$15,000/year ($450 more next year).

It disgusts me to see that in order to improve something that a crapton of people use daily to protect them self, that’s currently broken, you’d have to pay. I didn’t see any mention that individuals can become members on the website of the Wi-Fi Alliance seems to be only businesses can participate.

I’d be alright with some open-source implementation instead.

/rant

datamingle · 8 years ago
Seems like it would encounter same problem earlier in Wifi history

"Early 802.11 products suffered from interoperability problems because the Institute of Electrical and Electronics Engineers (IEEE) had no provision for testing equipment for compliance with its standards."

https://en.wikipedia.org/wiki/Wi-Fi_Alliance#History

Ajedi32 · 8 years ago
Wi-Fi enhanced open looks like a nice security enhancement for open networks, but unfortunately (correct me if I'm wrong) it still doesn't look like it protects users from rogue access points; it only stops eavesdropping if users have already connected to the correct network.

I'd love to see a system similar to what Wi-Fi is already doing with Easy Connect, where users can scan a public key embedded in a QR Code or NFC tag to securely connect to a Wi-Fi network. (Or does Easy Connect already allow that? It'd be great if it does.)

bjoli · 8 years ago
Why wasn't this designed in the open like TLS 1.3? The process behind isn't very confidence inspiring...
bcaa7f3a8bbc · 8 years ago
Because IETF is NOT an industrial alliance, but Wi-Fi Alliance is. See the differences?

see also: 3GPP.

bjoli · 8 years ago
That is the obvious difference, but why don't they develop crypto protocol with a more open model? They have had too many fiascos for me to trust their current model.
ReverseCold · 8 years ago
If a large company wanted to push for a wifi alternative it could probably happen.
IshKebab · 8 years ago
> WPA3 leverages Simultaneous Authentication of Equals (SAE), a secure key establishment protocol between devices, to provide stronger protections for users against password guessing attempts by third parties.

Is that their term for PAKE?

Also I hope they have finally included an actual error message for incorrect passwords, rather than just "connection failed" which is the best that seems to be possible at the moment.

bwat49 · 8 years ago
I've seen some cases where I actually do get an authentication failed error connecting to wifi, but other cases where it just gives me some generic connection failed (even when the issue turns out to be authentication). It seems quite random.
bo1024 · 8 years ago
Wow, I hadn't realized that WiFi standards were developed like this. Looking down the page, I see a bunch of TM symbols, endorsements from massive companies, and no technical details or even attempt to describe anything related to security. Not very confidence-inspiring to an outsider.