Thread Links Date Links
Thread Prev Thread Next Thread Index Date Prev Date Next Date Index

Re: [STDS-802-11-TGM] SSID protection



--- This message came from the IEEE 802.11 Task Group M Technical Reflector ---
I have a question - 

With respect to the vulnerability

https://www.top10vpn.com/research/wifi-vulnerability-ssid/ Is this already covered?


With Passphrase (PSK and SAE), the Hash gets computed based on SSID, so is this already covered for that case, 8021x covers ESS that is denoted by the SSID. I may be missing something


Also should we just stick to including the SSID to avoid the vulnerability or include the hash of an earlier message (like Beacon/Association Response) - Similar to PASN (1me D5.0) that includes Hash of the earlier frame (M1) in the calculation of the MIC (M3) to avoid issues like this?


image.png





On Thu, May 16, 2024 at 5:54 AM Henry Ptasinski <henry@xxxxxxxxxx> wrote:
--- This message came from the IEEE 802.11 Task Group M Technical Reflector ---
Thanks, r2 looks ok to me.

- Henry

On Thu, May 16, 2024 at 5:15 AM Jouni Malinen <jkmalinen@xxxxxxxxx> wrote:
Thanks! 938r1 addresses these. I continued to use the SSID of the BSS
language instead of the SSID element in the Beacon frame. While we do
not really support hidden SSIDs in the standard, we might as well
write this in a form that would work for that case as well.

- Jouni

On Thu, May 16, 2024 at 12:14 PM Henry Ptasinski <henry@xxxxxxxxxx> wrote:
>
> > - The RSNXE that the Authenticator sent in its Beacon or Probe Response frame, if this element is present in the Beacon or Probe Response frame that the Authenticator sent.
> > - The SSID of the BSS when both the Authenticator and the Supplicant have indicated support for SSID protection in the RSNXE.
>
> This should specify how the SSID is included, especially since 12.7.6.6 requires the Supplicant to check that "the Key Data field in message 3 contains the SSID element".  I would suggest "The SSID element that the Authenticator sent in its Beacon or Probe Response frame ..." (Do we need to deal with APs that null out the SSID in beacons here? Or is that just a problem for implementations to deal with?)
>
> I think this bit of 12.7.6.1 also need updating to include the SSID element:
>
> Message 3: AuthenticatorSupplicant:
> EAPOL-Key(1,1,1,1,P,0,(#1406)RSC,ANonce,MIC,{RSNE [, RSNXE] [, OCI].
> GTK[N]} [, IGTK(M, IPN)] [, BIGTK(Q, BIPN)] [, WIGTK(R, WIPN)]}(#6590)
>
> - Henry
>
> On Thu, May 16, 2024 at 1:23 AM Jouni Malinen <jkmalinen@xxxxxxxxx> wrote:
>>
>> --- This message came from the IEEE 802.11 Task Group M Technical Reflector ---
>>
>> There is a recently published paper that describes issues in how the
>> SSID is not authenticated in all cases and how that can be combined
>> with some upper layer actions, e.g., with VPN being disabled in a
>> trusted network, to expose a security vulnerability. Robust way of
>> mitigating this type of a vulnerability is likely to require a
>> protocol change.
>>
>> Taken into account the recent publication of the paper (or well,
>> formally it is targeting a conference in about a week's time, but the
>> paper is publicly available now), I would like to discuss this in TGme
>> today, if we have time available in the agenda.
>>
>> I posted this contribution that proposed a simple extension to allow
>> the SSID to be protected in 4-way handshake (which is one of the
>> options proposed in the paper for addressing the vulnerability):
>> https://mentor.ieee.org/802.11/dcn/24/11-24-0938-00-000m-protect-ssid-in-4-way-handshake.docx
>>
>> I would appreciate review and comments on the document. If the TG is
>> willing, I might make a motion to approve this document (or an updated
>> version of it based on comments) during the TGme PM2 slot today.
>>
>> - Jouni
>>
>> _______________________________________________________________________________
>>
>> IF YOU WISH to be Removed from this reflector, PLEASE DO NOT send your request to this
>> CLOSED reflector. We use this valuable tool to communicate on the issues at hand.
>>
>> SELF SERVICE OPTION:
>> Point your Browser to - http://listserv.ieee.org/cgi-bin/wa?SUBED1=STDS-802-11-TGM and
>> then amend your subscription on the form provided.  If you require removal from the reflector
>> press the LEAVE button.
>>
>> Further information can be found at: http://www.ieee802.org/11/Email_Subscribe.html
>> _______________________________________________________________________________
>
>
>
> --
> Henry Ptasinski
> President
> Element78 Communications LLC
> henry@xxxxxxxxxx
> +1-415-608-0637


--
Henry Ptasinski
President
Element78 Communications LLC
henry@xxxxxxxxxx
+1-415-608-0637

To unsubscribe from the STDS-802-11-TGM list, click the following link: https://listserv.ieee.org/cgi-bin/wa?SUBED1=STDS-802-11-TGM&A=1


To unsubscribe from the STDS-802-11-TGM list, click the following link: https://listserv.ieee.org/cgi-bin/wa?SUBED1=STDS-802-11-TGM&A=1

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature