Bug 848754
Summary: | Defeating PPTP VPNs and WPA2 Enterprise with MS-CHAPv2 (DEF CON 20) | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Jan Lieskovsky <jlieskov> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED WONTFIX | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | dcbw, dpal, jdennis, jrusnack, jsynacek, lemenkov, msekleta |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2012-09-06 15:44:24 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | |||
Bug Blocks: | 848796 |
Description
Jan Lieskovsky
2012-08-16 11:10:35 UTC
(In reply to comment #0) > They described how to reduce complexity of the attack to the complexity of > cracking single DES - 2^56, and demonstrated this can be done in less that > 24 hours using a specialized hardware. Additional internet sources point out that this reduction to 2^57 / 2^56 was previously known and documented, such as in Bruce Schneier analysis of MS-CHAPv2 security: http://www.schneier.com/blog/archives/2012/08/breaking_micros.html#c841247 http://www.schneier.com/paper-pptpv2.pdf http://www.mail-archive.com/bugtraq@securityfocus.com/msg00023.html > Presentation points out two common uses of MS-CHAPv2 - PPTP (Point-to-Point > Tunneling Protocol) VPNs and WPA2 Enterprise network/wifi authentication. This presentation demonstrates that with current hardware, it's possible to extract passwords from MS-CHAPv2 handshakes quickly regardless of the actual user password length. Authors point out that this renders the use of PPTP VPNs completely insecure, as extracted password allows decryption of the whole VPN communication. In Red Hat Enterprise Linux and Fedora, this would affect uses of pptp client packages (along with ppp), and NetworkManager-pptp. There's currently no known mitigation for this issue for this use case, presentation authors recommend migration to different VPN solutions. Following blog post discusses WPA2 Enterprise use case. It points out that MS-CHAPv2 is used as EAP tunneled authentication protocol, such as with PEAPv0/EAP-MSCHAPv2 and EAP-TTLS. MS-CHAPv2 handshake packets are exchanged over previously established TLS connection. The use of TLS prevents passive eavesdroppers from being able to easily sniff MS-CHAPv2 handshake, while wifi client configuration requiring verification of the SSL certificate of the Radius authentication server is required to prevent attacks from active MITM attackers trying to impersonate authentication server to obtain MS-CHAPv2 response form the client. The post concludes the impact of this on WPA2 use cases is minimal compared to the previous previous knowledge of the security of used protocols. http://revolutionwifi.blogspot.com/2012/07/is-wpa2-security-broken-due-to-defcon.html In Red Hat Enterprise Linux and Fedora, FreeRadius is available as open source implementation of the Radius server that includes MS-CHAPv2 support. On the client side, wpa_supplicant and NetworkManager are used. http://www.h-online.com/security/news/item/Microsoft-says-don-t-use-PPTP-and-MS-CHAP-1672257.html http://technet.microsoft.com/en-us/security/advisory/2743314 Closing this. MS-CHAPv2 is broken and should only be used in protected / tunneled connections, or alternatives considered. |