ABSTRACT
WPA2 Enterprise is a fundamental technology for secure communication in enterprise wireless networks. A key requirement of this technology is that WiFi-enabled devices (i.e., supplicants) be correctly configured before connecting to the enterprise wireless network. Supplicants that are not configured correctly may fall prey of attacks aimed at stealing the network credentials very easily. Such credentials have an enormous value because they usually unlock access to all enterprise services.
In this work we investigate whether users and technicians are aware of these important and widespread risks. We conducted two extensive analyses: a survey among approximately 1000 users about how they configured their WiFi devices for enterprise network access; and, a review of approximately 310 network configuration guides made available by enterprise network administrators. The results provide strong indications that the key requirement of WPA2 Enterprise is violated systematically and thus can no longer be considered realistic.
- 2012. Weaknesses in MS-CHAPv2 authentication. Microsoft Technet (Aug. 2012).Google Scholar
- 2013. Wireless PEAP-MS-CHAPv2 Authentication Could Allow Information Disclosure. Microsoft Security Advisory 2876146 (Aug. 2013).Google Scholar
- 2016. 2016 Employee Survey: BYOD Habits and Attitudes. Technical Report. Syntonic.Google Scholar
- 2016. Enterprise Mobility Survey Results: Strategic Imperatives. Technical Report. IDC.Google Scholar
- 2018. Wi-Fi Alliance® introduces security enhancements. https://www.wi-fi.org/news-events/newsroom/wi-fi-alliance-introduces-security-enhancements. (Jan. 2018). Accessed: NA-NA-NA.Google Scholar
- Alberto Bartoli, Eric Medvet, and Filippo Onesti. 2018. Evil twins and WPA2 Enterprise: A coming security disaster? Computers and Security 74 (May 2018), 1--11. Google ScholarDigital Library
- Sebastian Brenza, Andre Pawlowski, and Christina Popper. 2015. A Practical Investigation of Identity Theft Vulnerabilities in Eduroam. In Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec '15). ACM, New York, NY, USA, 14:1--14:11. Google ScholarDigital Library
- Aldo Cassola, William Robertson, Engin Kirda, and Guevara Noubir. 2013. A Practical, Targeted, and Stealthy Attack Against WPA Enterprise Authentication. In NDSS - Network and Distributed Security Symposium.Google Scholar
- Jeff Jones. 2012. BYOD--is it Good, Bad or Ugly from the User Viewpoint? https://cloudblogs.microsoft.com/microsoftsecure/2012/07/26/byod-is-it-good-bad-or-ugly-from-the-user-viewpoint/. (July 2012). Accessed: NA-NA-NA.Google Scholar
- Sheila Frankel Bernard Eydt Les Owens Karen Scarfone. 2007. Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i. Technical Report SP-800-97. NIST Google Scholar
- Hoover J Snoodgrass J. 2013. BYO-Disaster and Why Corporate Wireless Security Still Sucks. In DEFCON 21.Google Scholar
- Murugiah Souppaya and Karen Scarfone. 2012. Guidelines for securing wireless local area networks (WLANs). NIST Special Publication 800 (2012), 153. Google ScholarDigital Library
- Mathy Vanhoef and Frank Piessens. 2017. Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS '17). ACM, New York, NY, USA, 1313--1328. Google ScholarDigital Library
- Klaas Wierenga, Stefan Winter, and Tomasz Wolniewicz. 2015. The eduroam architecture for network roaming. Technical Report RFC 7593.Google Scholar
- K Yanson. 2016. Results of implementing WPA2-enterprise in educational institution. In 2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT). ieeexplore.ieee.org, 1--4.Google ScholarCross Ref
- Josh Yavor. 2013. BYOD PEAP show. In DEFCON 21.Google Scholar
Index Terms
- (In)Secure Configuration Practices of WPA2 Enterprise Supplicants
Recommendations
Fast and Secure Handover Authentication Scheme Based on Ticket for WiMAX and WiFi Heterogeneous Networks
Integrated WiMAX and WiFi networks is of great potential for the future due to the wider coverage of WiMAX and the high data transport capacity of WiFi. However, seamless and secure handover (HO) is one of the most challenging issues in the WiMAX and ...
Evil twins and WPA2 Enterprise
WPA2 Enterprise is a suite of protocols for secure communication in a wireless local network and has become an essential component of virtually every enterprise. In many practical deployments of this technology, a device that authenticates with username ...
An authentication mechanism for the UMTS-WiFi networks
Mobility '09: Proceedings of the 6th International Conference on Mobile Technology, Application & SystemsUMTS (Universal Mobile Telecommunications System) network will permit to give support to the subscribers for performing any kind of communication without restriction in the service area. In view of mutual complementary feature of wide coverage and high ...
Comments