110 likes | 229 Vues
This study focuses on the security issues inherent in Wireless Application Protocol (WAP) implementations, particularly using Kannel. We analyze existing vulnerabilities and propose two key enhancements: establishing an SSL connection between WAP gateways and content servers and enforcing WAP client authentication. Our findings reveal the inadequacies in WTLS support and highlight several potential security threats including impersonation and man-in-the-middle attacks. We advocate for stronger cryptographic measures and stronger compliance with security specifications to ensure a more secure WAP infrastructure.
E N D
Security in WAP Sanket Naik, Ameya Varde CS590F Fall 2000
Motivation and Goals • To study the security issues in WAP • To analyze an existing implementation and implement enhancements • To investigate security holes in the implementation and WAP in general • To suggest improvements for both
Implementation • WAP stack from Kannel (www.kannel.org) • An on-going open source project implementing the WAP stack • No WTLS support • WTLS layer from 3ui.com (www.3ui.com) • We identified 2 security enhancements: • SSL connection between WAP gateway and Content (HTML) server • Authentication of the WAP gateway by the WAP client • Both missing in WTLS patch from 3ui
Development tools • Platform – Linux • OpenSSL crypto library (http://www.openssl.org) • NOKIA WAP Toolkit (http://www.forum.nokia.com) • Simulates a web-enabled NOKIA 7110 phone
WTLS optimizations • Why optimize? • Low bandwidth • Less processing power • Less memory • Weaker power supply • The optimizations • Abbreviated handshake – using pre-master secret from previous session • Optional steps – Client can send NULL reply to Certificate request, Anonymous key exchange etc.
The flaws • Encryption not truly end-to-end • Abbreviated handshake susceptible to replay attack • Chosen plain-text attack: IV for each packet = Sequence number XOR Original IV • DOS attack: Alerts are unauthenticated • Man-in-the-middle attack: 40 bit XOR MAC allows even bit changes • Impersonation: Anonymous key exchange methods allow key generation w/o Authentication (Kannel WTLS has only anonymous key exchange methods!) • Weaker encryption mechanisms due to export regulations
Suggestions • WAP specifications • Enforce Client authentication rather than keep it optional • Make WTLS layer mandatory whether people use it or not. • Implementation • Provide Gateway authentication in WAP clients • Add stronger algorithms, keys and key exchange methods to the cipher suites
Conclusions • WTLS Specs propose weak security • Developers and Manufacturers are deploying WAP stacks which do not meet even these weak security requirements • Mostly due to lack of security expertise • Open source exposing these weaknesses • Yet additional code review required • Our 2 bits should be checked in soon…