skip to main content
10.1145/3230833.3230838acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaresConference Proceedingsconference-collections
short-paper

(In)Secure Configuration Practices of WPA2 Enterprise Supplicants

Published:27 August 2018Publication History

ABSTRACT

WPA2 Enterprise is a fundamental technology for secure communication in enterprise wireless networks. A key requirement of this technology is that WiFi-enabled devices (i.e., supplicants) be correctly configured before connecting to the enterprise wireless network. Supplicants that are not configured correctly may fall prey of attacks aimed at stealing the network credentials very easily. Such credentials have an enormous value because they usually unlock access to all enterprise services.

In this work we investigate whether users and technicians are aware of these important and widespread risks. We conducted two extensive analyses: a survey among approximately 1000 users about how they configured their WiFi devices for enterprise network access; and, a review of approximately 310 network configuration guides made available by enterprise network administrators. The results provide strong indications that the key requirement of WPA2 Enterprise is violated systematically and thus can no longer be considered realistic.

References

  1. 2012. Weaknesses in MS-CHAPv2 authentication. Microsoft Technet (Aug. 2012).Google ScholarGoogle Scholar
  2. 2013. Wireless PEAP-MS-CHAPv2 Authentication Could Allow Information Disclosure. Microsoft Security Advisory 2876146 (Aug. 2013).Google ScholarGoogle Scholar
  3. 2016. 2016 Employee Survey: BYOD Habits and Attitudes. Technical Report. Syntonic.Google ScholarGoogle Scholar
  4. 2016. Enterprise Mobility Survey Results: Strategic Imperatives. Technical Report. IDC.Google ScholarGoogle Scholar
  5. 2018. Wi-Fi Alliance® introduces security enhancements. https://www.wi-fi.org/news-events/newsroom/wi-fi-alliance-introduces-security-enhancements. (Jan. 2018). Accessed: NA-NA-NA.Google ScholarGoogle Scholar
  6. Alberto Bartoli, Eric Medvet, and Filippo Onesti. 2018. Evil twins and WPA2 Enterprise: A coming security disaster? Computers and Security 74 (May 2018), 1--11. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Sebastian Brenza, Andre Pawlowski, and Christina Popper. 2015. A Practical Investigation of Identity Theft Vulnerabilities in Eduroam. In Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec '15). ACM, New York, NY, USA, 14:1--14:11. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Aldo Cassola, William Robertson, Engin Kirda, and Guevara Noubir. 2013. A Practical, Targeted, and Stealthy Attack Against WPA Enterprise Authentication. In NDSS - Network and Distributed Security Symposium.Google ScholarGoogle Scholar
  9. Jeff Jones. 2012. BYOD--is it Good, Bad or Ugly from the User Viewpoint? https://cloudblogs.microsoft.com/microsoftsecure/2012/07/26/byod-is-it-good-bad-or-ugly-from-the-user-viewpoint/. (July 2012). Accessed: NA-NA-NA.Google ScholarGoogle Scholar
  10. Sheila Frankel Bernard Eydt Les Owens Karen Scarfone. 2007. Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i. Technical Report SP-800-97. NIST Google ScholarGoogle Scholar
  11. Hoover J Snoodgrass J. 2013. BYO-Disaster and Why Corporate Wireless Security Still Sucks. In DEFCON 21.Google ScholarGoogle Scholar
  12. Murugiah Souppaya and Karen Scarfone. 2012. Guidelines for securing wireless local area networks (WLANs). NIST Special Publication 800 (2012), 153. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Mathy Vanhoef and Frank Piessens. 2017. Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS '17). ACM, New York, NY, USA, 1313--1328. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Klaas Wierenga, Stefan Winter, and Tomasz Wolniewicz. 2015. The eduroam architecture for network roaming. Technical Report RFC 7593.Google ScholarGoogle Scholar
  15. K Yanson. 2016. Results of implementing WPA2-enterprise in educational institution. In 2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT). ieeexplore.ieee.org, 1--4.Google ScholarGoogle ScholarCross RefCross Ref
  16. Josh Yavor. 2013. BYOD PEAP show. In DEFCON 21.Google ScholarGoogle Scholar

Index Terms

  1. (In)Secure Configuration Practices of WPA2 Enterprise Supplicants

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            ARES '18: Proceedings of the 13th International Conference on Availability, Reliability and Security
            August 2018
            603 pages
            ISBN:9781450364485
            DOI:10.1145/3230833

            Copyright © 2018 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 27 August 2018

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • short-paper
            • Research
            • Refereed limited

            Acceptance Rates

            ARES '18 Paper Acceptance Rate128of260submissions,49%Overall Acceptance Rate228of451submissions,51%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader