From Wikipedia, the free encyclopedia - View original article
|This article needs additional citations for verification. (January 2012)|
|This article may require copy editing for grammar, style, cohesion, tone, or spelling. (August 2014)|
Wi-Fi Protected Setup (WPS; originally Wi-Fi Simple Config) is a network security standard that attempts to allow users to easily secure a wireless home network but could fall to brute-force attacks if one or more of the network's access points do not guard against the attack.
Created by the Wi-Fi Alliance and introduced in 2006, the goal of the protocol is to allow home users who know little of wireless security and may be intimidated by the available security options to set up Wi-Fi Protected Access, as well as making it easy to add new devices to an existing network without entering long passphrases. Prior to the standard, several competing solutions were developed by different vendors to address the same need.
A major security flaw was revealed in December 2011 that affects wireless routers with the WPS PIN feature, which most recent models have enabled by default. The flaw allows a remote attacker to recover the WPS PIN in a few hours with a brute-force attack and, with the WPS PIN, the network's WPA/WPA2 pre-shared key. Users have been urged to turn off the WPS PIN feature, although this may not be possible on some router models.
The last two modes are usually referred as out-of-band methods as there is a transfer of information by a channel other than the Wi-Fi channel itself. Only the first two modes are currently covered by the Wi-Fi Protected Setup certification. The USB method has been deprecated and is not part of the Alliance's certification testing.
A few wireless access points have a dual-function Wi-Fi Protected Setup button (which can also perform a factory reset); pressing this button for too long can initiate a factory reset of the wireless access point.
The WPS protocol defines three types of devices in a network:
The WPS standard defines three basic scenarios that involve these components:
The WPS protocol consists as a series of EAP message exchanges that are triggered by a user action and relies on an exchange of descriptive information that should precede that user's action.
The descriptive information is transferred through a new Information Element (IE) that is added to the beacon, probe response and optionally to the probe request and association request/response messages. Other than purely informative type-length-values, those IEs will also hold the possible, and the currently deployed, configuration methods of the device.
After the identification of the device's capabilities on both ends, user is used to initiate the actual session of the protocol. The session consists of 8 messages that are followed, in the case of a successful session, by a message to indicate the protocol is done. The exact stream of messages may change when configuring different kinds of devices (AP or STA) or using different physical media (wired or wireless).
When the pushbutton method is supported by the wireless access point SSID and the wireless client (and its drivers) when selected under Windows Vista onwards, a prompt appears to press the Wi-Fi Protected Setup button which has its standardized symbol, of which allows flexibility and ease of connection with respect to band or radio selection, since a number of dual-band wireless routers only have video optimization options for the 5 GHz band. A number of non-PC devices with dual band wireless network connectivity do not allow the user to select the 2.4 GHz or 5 GHz band (or even a particular radio or SSID) when using Wi-Fi Protected Setup unless the wireless access point has separate Wi-Fi Protected Setup buttons for each band or radio.
Some manufacturers of wireless access points which support Wi-Fi Protected Setup use a symbol and/or other than the symbol standardized by the Wi-Fi Alliance. Notable examples are Push ‘N’ Connect from Netgear and QSS (Quick Secure Setup) from TP-Link.
In December 2011, researcher Stefan Viehböck reported a design and implementation flaw that makes brute-force attacks against PIN-based WPS feasible to perform on WPS-enabled Wi-Fi networks. A successful attack on WPS allows unauthorized parties to gain access to the network. The only effective workaround is to disable WPS.
The vulnerability centers around the acknowledgement messages sent between the registrar and enrollee when attempting to validate a PIN. The PIN is an eight-digit number used to add new WPA enrollees to the network. Since the last digit is a checksum of the previous digits, there are seven unknown digits in each PIN, yielding 107 = 10,000,000 possible combinations.
When an enrollee attempts to gain access using a PIN, the registrar reports the validity of the first and second halves of the PIN separately. Since the first half of the pin consists of four digits (10,000 possibilities) and the second half has only three active digits (1000 possibilities), at most 11,000 guesses are needed before the PIN is recovered. This is a reduction by three orders of magnitude from the number of PINs that would have to be tested. As a result, an attack can be completed in under four hours (183 minutes to be precise). The ease or difficulty of exploiting this flaw is implementation-dependent, as Wi-Fi router manufacturers could defend against such attacks by slowing or disabling the WPS feature after several failed PIN validation attempts.
A tool has been developed in order to show that the attack is practical. The firm that released the tool, Tactical Network Solutions in Maryland, says that it has known about the vulnerability since early 2011 and has been using it.
In some devices, disabling WPS in the user interface does not result in the feature actually being disabled. The device remains vulnerable to attack. Firmware updates have been released for some of these devices so that WPS can be disabled completely.
Vendors could patch the vulnerability by adding a lock-down period if the Wi-Fi access point detects a brute-force attack in progress, which disables the PIN method for long enough to make the attack impractical.
All forms of Wi-Fi Protected setup are vulnerable to usage by an unauthorized user if the wireless access point is not kept in a secure area, and many wireless access points have security information (if factory secured) and the Wi-Fi Protected Setup PIN printed on them. This PIN is often found in the configuration menus of the wireless access point. If this PIN cannot be changed or disabled, the only remedy is to get a firmware update to enable the PIN to be changed or to replace the wireless access point. Intruders who physically find a wireless access point which is factory secured and/or supporting Wi-Fi Protected Setup can use such information printed on the unit to commit unauthorized and/or unlawful activities. It is possible to extract a wireless passphrase with the following methods using no special tools:
It is highly recommended that wireless access points which are factory secured and/or supporting Wi-Fi Protected Setup be kept in a physically secure area, preferably under video surveillance.