Security in WAP

10
Security in WAP Sanket Naik, Ameya Varde CS590F Fall 2000

description

Security in WAP. Sanket Naik, Ameya Varde CS590F Fall 2000. Motivation and Goals. To study the security issues in WAP To analyze an existing implementation and implement enhancements To investigate security holes in the implementation and WAP in general To suggest improvements for both. - PowerPoint PPT Presentation

Transcript of Security in WAP

Page 1: Security in WAP

Security in WAP

Sanket Naik, Ameya VardeCS590F Fall 2000

Page 2: Security in WAP

Motivation and Goals• To study the security issues in WAP• To analyze an existing implementation

and implement enhancements• To investigate security holes in the

implementation and WAP in general• To suggest improvements for both

Page 3: Security in WAP

Implementation WAP stack from Kannel (www.kannel.org)

An on-going open source project implementing the WAP stack

No WTLS support WTLS layer from 3ui.com (www.3ui.com) We identified 2 security enhancements:

SSL connection between WAP gateway and Content (HTML) server

Authentication of the WAP gateway by the WAP client

Both missing in WTLS patch from 3ui

Page 4: Security in WAP

Kannel architecture

Page 5: Security in WAP

Security Enhancements

Page 6: Security in WAP

Development tools Platform – Linux OpenSSL crypto library (

http://www.openssl.org) NOKIA WAP Toolkit (

http://www.forum.nokia.com) Simulates a web-enabled NOKIA 7110

phone

Page 7: Security in WAP

WTLS optimizations Why optimize?

Low bandwidth Less processing power Less memory Weaker power supply

The optimizations Abbreviated handshake – using pre-master

secret from previous session Optional steps – Client can send NULL reply to

Certificate request, Anonymous key exchange etc.

Page 8: Security in WAP

The flaws Encryption not truly end-to-end Abbreviated handshake susceptible to replay

attack Chosen plain-text attack: IV for each packet =

Sequence number XOR Original IV DOS attack: Alerts are unauthenticated Man-in-the-middle attack: 40 bit XOR MAC

allows even bit changes Impersonation: Anonymous key exchange

methods allow key generation w/o Authentication (Kannel WTLS has only anonymous key exchange methods!)

Weaker encryption mechanisms due to export regulations

Page 9: Security in WAP

Suggestions WAP specifications

Enforce Client authentication rather than keep it optional

Make WTLS layer mandatory whether people use it or not.

Implementation Provide Gateway authentication in WAP

clients Add stronger algorithms, keys and key

exchange methods to the cipher suites

Page 10: Security in WAP

Conclusions WTLS Specs propose weak security Developers and Manufacturers are

deploying WAP stacks which do not meet even these weak security requirements

Mostly due to lack of security expertise Open source exposing these weaknesses Yet additional code review required Our 2 bits should be checked in soon…