Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Wireless Networking Encryption Security Hardware

Cisco's LEAP Authentication Cracked 162

mtrisk writes "Just a day after Cisco released a security warning about its WLSE access point management tool, a tool to crack wi-fi networks using LEAP authentication has been released, reports Wi-Fi Networking News. The tool, called Asleap and developed by Beyond-Security, actively de-authenticates users, sniffs the network when the user re-auntheticates, and performs an offline dictionary attack upon the password."
This discussion has been archived. No new comments can be posted.

Cisco's LEAP Authentication Cracked

Comments Filter:
  • Insight appreciated? (Score:5, Interesting)

    by monstroyer ( 748389 ) * <devnull@slashdot.org> on Saturday April 10, 2004 @11:47AM (#8824772) Homepage Journal
    As a small business, i use a Linksys wireless router. Cisco now owns Linksys. Can anyone alleviate my "phears" and tell me that this vulnerability is more for the hardware found in big companies like Bell Canada, and not my WEP 64 wireless? I'd really appreciate a summary of what all the fuss is about and how it affects people who don't run mega corps. Thanks.
  • dictionary attack? (Score:5, Interesting)

    by Njovich ( 553857 ) on Saturday April 10, 2004 @11:51AM (#8824796)
    Sure, this is a well done cracking tool, but isn't "cracked" a bit sensationalistic considering it still requires brute forcing the password? The weakness remains the password here, hardly the authentication scheme... good luck dictionary attacking a good password!
  • by Moderation abuser ( 184013 ) on Saturday April 10, 2004 @11:52AM (#8824798)
    Cos the very very large corporation which I very recently used to work for has just rolled out Cisco based wireless across *all* of it's sites worldwide.

  • by Svartalf ( 2997 ) on Saturday April 10, 2004 @11:57AM (#8824836) Homepage
    It's WHY you really, really ought to have a cryptologist design your subsystems if at all possible. If it's not possible, you need to have them AUDIT it at the very least. Suffice it to say, each and every one of the wireless designs so far seem to be fairly flawed- and I don't believe that a single one was designed by or audited by a competent cryptographer (Someone like Schneier comes immediately to mind- never mind how expensive this sort of person will be for you with the design work or an audit, the embarassment and increased liability for exploits on the system make it far, far more expensive to NOT hire them...).

    I'm a fairly competant amateur- I know better than to assume anything I or anyone else that's not an SME produces in this arena is anything but vulnerable until proven otherwise.
  • Not quite a crack (Score:5, Interesting)

    by russotto ( 537200 ) on Saturday April 10, 2004 @12:02PM (#8824866) Journal
    This is an offline dictionary attack, not a cryptographic break as has been done to WEP. If you use a strong password (one not in the dictionary), this won't break it. I don't know if preventing offline attacks was a goal of LEAP; if it was, it's fair to describe this as a crack, but if not, this is really just a tool to automate what was already known to be possible.
  • Re:Not Cisco's week (Score:5, Interesting)

    by Shakrai ( 717556 ) on Saturday April 10, 2004 @12:09PM (#8824891) Journal
    Man to say this isn't Cisco's week would be an understatement. It can also read saved libpcap and airopeek captures

    Yeah it's been a bad week for Cisco but they aren't Microsoft. They won't ignore these problems. You'll see firmware updates to fix the password problem in a week tops (if it isn't already out). I suspect you'll also see an update to address the LEAP issues.

    The only reason to buy Cisco after all (in my experience -- I'm sure the detractors will speak up the minute I click post) is for the support.

    I recall a strange off the wall problem I had using an ISDN line card in a 2600 series router a couple of years back. The line card wouldn't co-exist nicely with the 56k DSU/CSU line card in the other slot. After a few days the ISDN interface would choke and die and the router would need to be rebooted.

    After working with our vendor's (Ingram Micro) Cisco support group and trying about a million different IOS upgrades they referenced us to Cisco -- the Cisco that we didn't even have a support contract with. They actually flew somebody out (we are on the East Coast) to look at the problem and released a specific IOS upgrade to address that issue once they confirmed it.

    Do you think Microsoft would do that for the small time Insurance Agency with one large router (and a couple of smaller ones in our remote offices)? A lousy $6,000 router at that (money for us -- pocket change for Cisco). That's support and that's the reason why I will continue to buy Cisco products even if they are insanely overpriced.

  • by ph4s3 ( 634087 ) on Saturday April 10, 2004 @12:10PM (#8824898)
    First of all, don't use WEP. Many many articles about it being broken have been written. At a minimum you should be running a linksys with at least v1.41 (1.42?) of the firmware and be using the WPA security.

    If you're doing anything that needs real encryption, such as administering anything requiring strong passwords or doing financial transactions, you should be researching a VPN layer or something along those lines.

    Along the same lines, this seems to open up a new service category... VPN service authentication... Allow you to get a secure link from wherever you are physically at back to the VPN point. Protect your packets from being sniffed (and usable) by wire or wireless. Anyone seen this type of thing? I've only seen server+client side implementation, never an auth service.
  • by iamwahoo2 ( 594922 ) on Saturday April 10, 2004 @12:13PM (#8824904)
    How much damage can be done if somebody cracks your WEP? I am not particularly worried if someone is using my connection as much as I am worried that someone will get my private information like credit card numbers. If I only use machines on the wired LAN to keep and transmit private data, does that protect me?
  • by stienman ( 51024 ) <adavis&ubasics,com> on Saturday April 10, 2004 @12:18PM (#8824920) Homepage Journal
    Since large businesses use secure VPN over any insecure channel (wireless, internet, dialup, even inside their own wired network) then it will only affect small businesses or those with poor security specialists who try to save money by putting the security into the network infrastructure.

    Unfortunately while the firmware may be upgradeable, the cryptographic functions are usually implemented in hardware (better performance) and it may be hard, if not impossible, to secure the authentication so this kind of attack is harder.

    What they really should do is have a public/private key for each access point, with the SSID set to the public key. Then any client can transmit to the access point without possibility of eavesdropping. This would be used to set up the secure LEAP session. Since the password is never sent back to the client then it's not going to be breakable by offline brute force attacks.

    Of course, in the end anything is breakable given enough time and/or money.

    -Adam
  • Offline attack (Score:5, Interesting)

    by Knightmare ( 12112 ) on Saturday April 10, 2004 @12:20PM (#8824931) Homepage
    Many people here are talking about the length of time it takes to brute the password. I saw a demonstration of the asleap tool about 1/2 a year ago and it took 15 seconds to reveal the password. Something you need to keep in mind is the fact that there is no salt involved in the password hash for LEAP. So a precached hash of the possible passwords is very easy. All you need is lots of disk space and a well written index of the hashes.

    There are quite a few others that are saying well thats only if you let your users pick bad passwords... Come on guys, have you actually worked in the real world? Normal users can't remember crazy passwords, they are going to pick their dog and their favorite football player's number put together. Or their aniversary and the current food they are eating.

    Keeping a dictionary of enough passwords to get into the network would be trivial. All you need is one user with a weak password to get in, after that who cares how strong the rest are.
  • by throwaway18 ( 521472 ) on Saturday April 10, 2004 @12:22PM (#8824939) Journal
    A conspiracy theory.

    WEP is broken by design. A few engineers who don't know anything about cryptanalysis making their own encryption system that turns out to be broken is quite plausable however wifi standards are set by the IEEE. The IEEE is not stupid.

    Was WEP deliberatly broken to make government snooping easier?
    That may seem ludicrus now but what if the likes of consume [consume.net] suceed in their goal of building mesh networks across citys? Securing wireless connections at VPN or application level is so much hassle that only 0.01% of users bother.

    The reaction of the American government to the new Chinese wifi encryption standard lends weight to this theory. Supporting WAPI just means hardware manufacturers have to write a bit more software. Once it's in the software it will no doubt be supplied as standard worldwide. It may actuall be secure with little work. Why else would the American government threaten retailation over somthing so obscure?
  • by acz ( 120227 ) <{z} {at} {hert.org}> on Saturday April 10, 2004 @12:23PM (#8824948) Homepage
    Slashdot's always a bit late on interesting security issues. This news [hert.org] was on the Hacker Emergency Response team beta new website [hert.org] a few days ago.


    The site which accidently looks a lot like slashdot, focuses on quality security news; no vuln reports people don't care about... all the latest news and white papers.


    A cool white paper on utf-8 shellcodes was released [hert.org] on it too.

  • by hta ( 7593 ) on Saturday April 10, 2004 @12:38PM (#8825008) Homepage Journal
    So NOW I know why everyone's telling me that LEAP is not the end-game, and we need to move to systems based on PEAP (which is supposed to be an open standard, as opposed to LEAP which is proprietary) or some other, even newer variant.
    Security protocols are like windows (the physical kind). Once they're broken, duct tape is not the answer.
  • by Anonymous Coward on Saturday April 10, 2004 @12:40PM (#8825016)
    "The reaction of the American government to the new Chinese wifi encryption standard lends weight to this theory. Supporting WAPI just means hardware manufacturers have to write a bit more software. Once it's in the software it will no doubt be supplied as standard worldwide. It may actuall be secure with little work. Why else would the American government threaten retailation over somthing so obscure?"

    easy because of the other side of it....

    "China's WLAN standard has provoked concern among U.S. companies and industry groups for fear that it could fracture the market for WLAN equipment. Also creating some apprehension is a requirement that foreign WLAN equipment vendors must license the technology through coproduction agreements with Chinese companies. The U.S. Information Technology Office (USITO), a U.S. industry group, has said this provision unfairly requires U.S. companies to share proprietary technology with Chinese companies that may also be competitors. "

    So there in a nutshell are the other reasons why WAPI is not being embraced by the US government or US businesses. On the other hand I like your tinfoil hat angle because it is so shiny ;-)
  • by FauxPasIII ( 75900 ) on Saturday April 10, 2004 @12:47PM (#8825050)
    > How much damage can be done if somebody cracks your WEP?

    If somebody breaks into your WEP, they can do anything that any machine on your LAN can do. That is, they can sniff your traffic, they can access any internal servers that use only IP address checking for security (NFS is commonly set up this way) and they can use your connection to the net. The latter is more serious than you might think; for instance, what if they launch a DDoS, port-scan a bank, or serve child pornography from your IP address?
  • Re:Not Cisco's week (Score:5, Interesting)

    by JackAsh ( 80274 ) on Saturday April 10, 2004 @01:00PM (#8825152)
    Yeah it's been a bad week for Cisco but they aren't Microsoft. They won't ignore these problems. You'll see firmware updates to fix the password problem in a week tops (if it isn't already out). I suspect you'll also see an update to address the LEAP issues.

    Read the article - the LEAP problem was reported to them in AUGUST 2003.

    I agree they are not a Microsoft, and they are generally much more responsive, but how would you feel if you had over the past six months implemented a major, wonderful, well protected Cisco LEAP wireless network? Only to receive the news that "yeah, we kinda knew since August our security sucked" (for the record, I am NOT in that situation, but LEAP was a contender for our upcoming wi-fi implementation).

    Honestly, Bruce Schneier was recently saying that it's no longer about the crypto, as anyone can do strong crypto these days. It's about the factors around it, like usernames and passwords, physical security, but most of all, implementation. You'd think that something which was hailed at the time as the solution to the broken WEP protocol would be partially secure... Ugh. Now I'm just ranting.

    -Jack Ash

  • by kbonin ( 58917 ) on Saturday April 10, 2004 @01:29PM (#8825363)
    This is yet another example of why you need to hire security programmers with actual experience in the field, not just outsource it to a cheap Indian programming group with no real experience writing robust protocols.

    I'm an ex Cisco security programmer, and thats exactally what was happening before I quit. I wish I could say more...
  • Re:Offline attack (Score:3, Interesting)

    by Anime_Fan ( 636798 ) <slashdot@sjoe[ ]d.net ['lun' in gap]> on Saturday April 10, 2004 @01:46PM (#8825482) Homepage
    Come on guys, have you actually worked in the real world? Normal users can't remember crazy passwords, they are going to pick their dog and their favorite football player's number put together. Or their aniversary and the current food they are eating.

    At least we force hard passwords for administrators.
    I've got some 7 complex passwords for admin accounts at work.
    Add 2 for my regular accounts there.
    Add 1 for Lotus Notes there.
    Add 1 for my user at my home server.
    Add 1 for root at the server.
    Add 5 for the encrypted partitions on the server (one of which is 20 characters long).
    Add 2 for my laptop.
    Add 1 for my university logon.

    It's easy to remember passwords once you learn how to create _good_ ones (that aren't based on dogs name + 3-digit number that you raise by 1 every 90 days).

    But yes, most of my users tend to forget their passwords and need me to reset them once a month.
    And the rest of the bunch use as weak passwords as they can.

    The good thing is, their accounts don't matter to me. It's only some files they're going to find.
    The admin accounts, OTOH can access any users' files in an instant (saved locally on the computer or on Novell doesn't matter). This is the account that needs protection.
    That, and keeping the company off the internet, wireless networks et al.
  • OUTSOURCING (Score:4, Interesting)

    by ShadowRage ( 678728 ) on Saturday April 10, 2004 @02:43PM (#8825815) Homepage Journal
    anyone think this is due to outsourcing besides me?

    just after cisco started utsourcing, their products have become faulty, sure, the programmers in india are pretty smart, but most are quickly trained amatuers who are usually new to coding secure applications. anyone else think this may be the case?
  • Re:OUTSOURCING (Score:3, Interesting)

    by kbonin ( 58917 ) on Saturday April 10, 2004 @02:55PM (#8825870)
    I was there. It is due to outsourcing. Period.
  • dictionary attack ? (Score:2, Interesting)

    by Anonymous Coward on Saturday April 10, 2004 @04:11PM (#8826274)
    Maybe people should stop using dictionary words for passwords?

    I think of a phrase and take first letter of each word, like

    Top of the morning to you ==> totmty

    etc..

"No matter where you go, there you are..." -- Buckaroo Banzai

Working...