Download as pdf or txt
Download as pdf or txt
You are on page 1of 11

Wireless Netw (2008) 14:159–169

DOI 10.1007/s11276-006-8870-6

Access points vulnerabilities to DoS attacks in 802.11 networks


M. Bernaschi · F. Ferreri · L. Valcamonici

Published online: 9 October 2006


C Springer Science + Business Media, LLC 2006

Abstract We describe possible denial of service attacks to be carried out. In particular we identified some simple attack
access points in infrastructure wireless networks using the schemes that might lead to a DoS effect and then observed
802.11b protocol. To carry out such attacks, only commod- the reaction of various types of infrastructured networks to
ity hardware and software components are required. The ex- these attacks. In the following section we describe the ba-
perimental results obtained on a large set of different ac- sic principles we followed in order to find possible attack
cess points show that serious vulnerabilities exist in any de- schemes; in Section 3 we describe the test-bed framework
vice we tested and that a single malicious station can easily in which we carried out our experiments and finally, in Sec-
hinder any legitimate communication within a basic service tion 4, we report the results obtained for different types of
set. networks.

Keywords Access points . Firmware . Denial of service


2 Working guidelines

1 Introduction The design of the attack schemes started with the following
considerations:
The use of 802.11 wireless networks is steadily increasing
– The 802.11 protocol is based on the exchange of re-
despite of many studies that report security problems, mainly
quest/response messages: each request sent by a station
related to authentication, privacy and confidentiality issues.
(STA) in the network triggers a corresponding response on
Besides that, the peculiar features of the wireless medium
its counterpart, which can be, in turn, another station or an
suggest a greater exposure to Denial of Service (DoS) attacks
Access Point (AP);
than wired networks. Since the wireless networks do not have
– infrastructured networks rely on an access point (or a set of
well defined physical boundaries, a malicious station can ap-
them) as a central node through which every communica-
pear in the range of such a network and launch an attack in
tion is routed, thus an AP can easily become a bottleneck
order to stop any legitimate communication. The aim of the
for the entire network (or, at least, for the Basic Service Set
present work is to investigate how this kind of attacks can
it defines1 ). An AP failure causes the block of the entire
network or a part of it;
M. Bernaschi () – attack patterns should be as simple as possible, in order to
IAC – CNR, Viale del Policlinico, 137, 00161 - Rome, Italy apply both to open systems and WEP-protected networks.
e-mail: massimo@iac.cnr.it From this viewpoint, a malicious station should be able to
F. Ferreri . L. Valcamonici
launch an attack even if it is neither associated nor authen-
CASPUR, Via dei Tizii, 6b, 00185 - Rome, Italy ticated to the target network.
e-mail: f.ferreri@caspur.it
1
L. Valcamonici A Basic Service Set is made of an AP and the client stations connected
e-mail: l.valcamonici@caspur.it to that AP.

Springer
160 Wireless Netw (2008) 14:159–169

2.1 Probe request flood (PRF)

Probe Request frames are used by stations to actively scan


an area in order to discover existing wireless networks. Any
AP receiving a Probe Request frame must respond with
a proper Probe Response frame that contains information
about the network, to allow the station to associate. By send-
ing a burst of Probe Request frames very quickly, each
with a different MAC address (MAC spoofing) to simulate
the presence of a large number of scanning stations in the
area, we can induce a heavy workload on the AP, resulting
in a wasting of computing and memory resources which can
not be used for normal operations.

2.2 Authentication request flood (ARF)

AP response to an Authentication Request frame de-


pends on the authentication settings of the network:

Fig. 1 Finite state machine (FSM) representing the AP/STA interac- open system networks: no cryptography is involved, the AP
tion. State 1 represents any client neither associated nor authenticated
to the AP yet (such as an external attacker station) processes each request, possibly comparing the MAC ad-
dress with an access control list, then it responds with a
frame containing the authentication process result;
Following these guidelines, we started to identify mes- shared key networks: after receiving an Authentication
sage sequences that could lead to an attack towards the AP. Request by a station, the AP generates a random chal-
The management frames of the 802.11 protocol look like lenge text and sends it to the station in a second authenti-
the most suitable to this purpose, because any management cation frame; the challenge text has to be encrypted with
frame sent to an AP triggers an elaboration with consequent a proper WEP key by the station to gain access to the
consumption of computational resources. Figure 1 shows network.
a Finite State Machine (FSM) representing the interaction
between an AP and any station in a 802.11 infrastructured In both cases the AP must allocate memory to keep informa-
network. State 1 in the FSM represents stations that have tion about each new station that successfully authenticates.
not gained any privilege yet (they are neither associated nor As in the previous case, by sending a burst of Authentica-
authenticated to the AP), thus this is a common situation tion Request frames, using MAC spoofing, it should be
for a malicious station willing to launch an attack. 802.11 possible to bring AP’s resources close to the saturation level.
management frames are divided into three classes, in each
state of the FSM only certain classes of frames can be ex- 2.3 Association request flood (ASRF)
changed (see Table 1). Starting from this classification, we
identified three simple attack schemes. They are essentially According to the protocol FSM, Association Request
flooding attacks that aim at gaining predominant access to frames should not be sent by stations in unauthenti-
the wireless medium and wasting computational resources cated/unassociated state, so such requests should never re-
of the AP. We describe these schemes in the next three ceive an answer by the AP. Actually, we discovered that many
paragraphs. APs respond to “illegal” Association Request frames by
sending a Disassociation or Deauthentication frame.
As a consequence, even a burst of Association Request
Table 1 802.11 management frame classes frames is able to consume computational resources on an
AP.
Class Frame types

1 probe request/response, 2.4 Related work


authentication, deauthentication
2 association request/response, Despite the large number of works related to wireless se-
reassociation, disassociation
curity, DoS attacks have not been deeply investigated yet.
3 deauthentication
Among the few works focused on these peculiar attacks, we

Springer
Wireless Netw (2008) 14:159–169 161

recall [6] which appears to be the most closely related to our


work.
The authors focused on three types of attacks: deauthen-
tication and disassociation attacks rely on the repeated in-
jection of fake deauthentication or disassociation
frames (both from the AP to STAs and from a STA to the
AP) in order to cause legitimate clients to be disconnected
from the AP in use. A third kind of attack is based on a mali-
cious manipulation of the Network Allocation Vector (NAV)2
information contained in 802.11 frames, in order to prevent
legitimate stations from gaining access to the medium.
Actually, deauthentication and disassociation attacks were
already known in the developers community, and proved to
be really effective. The virtual carrier-sense attack (i.e., the Fig. 2 Testing environment
malicious manipulation of the NAV) is more original and,
in principle, harder to defend against in practice. The au-
thors tested the NAV attack both by means of simulations Finally, there are a few public domain tools, like
(based on ns-2) and in real test-bed networks. Although the those available from http://home.jwu.edu/jwright or
attacks proved to be effective in the simulation environment, http://www.wlsec.net/void11/, but it looks like they
they didn’t lead to relevant results when applied to real-world have been tested only on a very limited base.
networks. According to the authors, this, somehow surpris-
ing, result, is due to wrong implementations of CSMA/CA
mechanisms by card vendors: basically many wireless de- 3 Testbed environment
vices seem to ignore information provided by the virtual NAV
mechanism. As a testing platform we used two identical laptops each
The attacks presented in [6] differ from the ones we de- equipped with a Netgear MA401 PCMCIA card, both run-
vised in terms of target localization and easiness of use. In ning Linux 2.4.20 and the HostAP device driver [11]. These
[6], deauthentication and disassociation attacks are directed two laptops were used as legitimate clients of the wireless
to single or multiple end-stations, whereas our attacks focus network, whereas a third machine was used to launch at-
on the AP as central node and possible single point-of-failure tacks against the wireless networks. We tested the behavior
for an entire wireless network. As to NAV attacks, they fo- of managed wireless networks, using different types of ac-
cus on overall medium availability, trying to prevent clients cess point. Legitimate clients authenticate and associate to
from gaining access to the shared medium, whereas our at- APs, and then run the netperf benchmark [12], or other
tacks aim to waste computational and memory resources of simple commands.
the AP. Besides that, NAV attacks rely on complex manip-
ulations carried out at firmware level (such as forging and
modifying frames stored in firmware memory), whereas our 3.1 Attacker station
attacks are carried out through simple software modules.
A DoS attack may also occur if an attacker exploits the Ex- As attacker station we used a third laptop, running the same
tensible Authentication Protocol (EAP) to flood the authen- version of Linux (2.4.20) and equipped with the same Net-
tication server with fake requests, thereby preventing valid gear MA401 PCMCIA card. To carry out the attack schemes
users from authenticating to the wireless network. From a dif- previously described, we needed a mechanism to forge ar-
ferent viewpoint, since EAP is, by definitiom, extensible, it bitrary 802.11 management frames and injecting them in
is possible to think of an authentication method that is robust the medium, regardless of protocol rules and constraints.
against this class of attacks. However, in the EAP Method To this purpose, we developed a simple application, named
Requirements for Wireless LANs document [13] there is no wfit (wireless frame injection tool), based on the Radiate
mention of such possibility. library [10]. The Radiate library is built on top of an
old version of the HostAP driver, which uses a netlink
socket to receive “loose” frames from user-space applications
2
Each frame contains a duration field which indicates how long the (it seems that such feature has been discarded in more recent
current transmission will keep the medium busy; other STAs should versions of the driver). The library enables us to build all
wait for this amount of time before starting a new transmission; thus,
sending fake frames with a high duration value, should prevent other
types of 802.11 management and data frames passing them
STAs from transmitting. to the card firmware through the socket for transmission.

Springer
162 Wireless Netw (2008) 14:159–169

Table 2 Frame injection rates


(frames/sec). Values refer to a Scheme Frames/sec
situation in which no other
PRF  810
station is accessing the medium
through CSMA/CA mechanisms ARF 260 ÷ 280
ASRF 260 ÷ 280

3.1.1 Frame injection rates

In preliminary test sessions, we checked that the physical


distance of the attacker station from the AP did not influ-
ence significantly the results. However, we found few limi-
tations on the maximum number of frames per second that
can be injected. These limits are not influenced by the ma-
chine speed, but mainly depend on the rate at which frames
are passed by the application layer to the netlink socket. This Fig. 3 PRF attack on the Enterasys RoamAbout managed network.
is probably due to the configuration of the kernel, PCM- Note how Ethereal parses fake MAC addresses and “matches” them
CIA subsystem and card but we did not try to address such against a list of known vendors
issue. Maximum injection rates are listed in Table 2. As
we can see, ARF and ASRF rates are much lower than 4.1.1 MAC spoofing and retransmission issues
the PRF one. These values are measured in the absence
of any other station or AP. In a managed network, they In Fig. 3 we report a PRF attack pattern, with the MAC
tend to decrease to an unpredictable value due to the pres- spoofing mechanism enabled, as recorded by the Ethereal
ence of many stations trying to gain access to the wireless sniffer: Probe Response frames with spoofed addresses are
medium. not acknowledged by the attacker station because they have
a destination MAC address different from the real MAC ad-
dress of the card. As a consequence, the AP has to send each
4 Experimental results response 4 times, until the retry limit is reached and the frame
is discarded. This is, likely, the cause of the DoS effect: the
Hereafter, we present and discuss the results collected for AP needs a relevant amount of memory and computing time
each network configuration we tested. to store and re-transmit frames until the limit is reached.
When MAC spoofing is disabled, the attacker’s card injects
frames with its real MAC address and then acknowledges im-
4.1 Enterasys RoamAbout R2 managed network mediately responses from the AP that are directed to its own
address. In this case, the AP receives the acknowledgment
The PRF attack, performed at maximum rate, blocks com- of each frame and thus does not need to buffer frames for re-
pletely the test bed network. The AP seems to be 100% busy transmission. As a consequence, the DoS effect disappears.
in managing Probe Request frames and normal communi- Note that there is no way to set, via software, retry limits of
cation among legitimate clients in the infrastructured network this AP.
is interrupted. This result does not depend on the protocol or In order to collect statistics about the attack schemes, we
application used by legitimate clients (ping messages, telnet ran the attacks for a period of 10 sec. while sniffing frames
sessions, HTTP sessions, and so on). Interestingly, a different with Ethereal for a period of 20 sec. The idea is to capture
outcome is obtained if we disable the MAC spoofing mech- all delayed response frames sent by the AP. From the resulting
anism, thus sending each frame with the same MAC address data, we computed some values of interest, in particular:
(i.e., the real MAC address of the card): any DoS effect van-
ishes even though we are injecting frames at the same rate. – unique requests sent by the attacker station (Nreq);
We provide a possible explanation of this result in the next – duplicate requests sent by the attacker station (Ndup);3
paragraph. – number of requests responded by the AP (Nresp);
Beside that, we did not observe any significant result while – number of requests not responded by the AP (Nlost);
executing ARF and ASRF attacks, if we exclude an obvious – number of response frames for each request frame (Nrr);
performance degradation, which the netperf benchmark in-
dicates to be about 30% for a raw TCP stream between the 3
In some cases the card firmware repeats the transmission of a frame
two legitimate clients in the network. received from a user-space application.

Springer
Wireless Netw (2008) 14:159–169 163

Table 3 Attacks statistics for the Enterasys RoamAbout managed net- ture. From this viewpoint, the next section presents a pretty
work different situation.
Nreq Ndup Nresp Nlost Nrr Trr

PRF 4553 0 2089 2464 3.69 0.24 4.2 Netgear ME102 managed network
ASRF 886 886 886 0 3.88 0.0007
ARF 765 754 756 0 7.813 0.0008 For the Netgear ME102 AP, we started the tests with WEP
(128 bit) cryptography enabled. The results can be summa-
rized as follows:
– average elapsed time (in seconds) since a request frame
and correspondent first AP response frame (Trr). – The PRF attack has no effect on network performance;
– The ARF attack causes the AP to crash and stop working.
Collected values are reported in Table 3: from the value of The AP needs to be restarted after each attack;
Nrr, we extrapolate that the retry limit for an Authenti- – The ASRF attack causes the exhaustion of the AP re-
cation Response frame is set equal to 8, whereas it is set sources. The communication among legitimate clients be-
equal to 4 for an Association Response frame (that is, comes impossible.
actually, a Deauthentication frame). Nonetheless, these
Actually, this network showed, in general, a worse perfor-
two attacks do not have a serious impact on the network. The
mance with respect to the previous one, even running under
reason is probably the lower frame injection rate as compared
normal conditions. This probably accounts for its higher sen-
to the PRF case. If it were possible to send authentication and
sibility to flooding attacks executed at a lower frame injection
association frames at higher rates we could probably cause a
rate.
DoS effect as well.
Looking at the results shown in Table 3, the difference
between the PRF scheme and the other two (the ASRF and 4.2.1 Detailed results
the ARF) is readily apparent. In the PRF case more than half
of the requests are not fulfilled by the AP. Moreover, the Looking at the Nrr values in Table 5, we see that the Netgear
average response time is almost three orders of magnitude AP has a retry limit set equal to 1 for Probe Response
larger than in the other cases. This is probably due to a lack frames. This can explain why the attack does not have a
of buffer space and a heavy consumption of resources on the serious impact: no frame is stored for retransmission and no
AP. Unfortunately, AP’s built-in counters give no valuable buffer space is required for deferred transmissions. However,
information about internal resources usage. As an additional there is still a high number of frames that receive no response
result, it looks like the introduction of WEP cryptography by the AP. This could be due to a lack of buffers for the
(128 bit) does not modify significantly the picture. reception but it looks like there are no bad side effects (normal
communications among clients are not hindered).
In both the ARF and the ASRF case, the retry limits are
4.1.2 Firmware upgrade set equal to 11. We can see that, under the ASRF and the
initial phase of the ARF attack, the response time is about
Recently, we upgraded the firmware of this AP to the latest 60–80 times higher than in the PRF case. While the DoS ef-
version (v6.02.07) in order to check whether its vulnerabili- fect caused by the ASRF attack can still be justified by high
ties had been eliminated or, at least, mitigated. Actually, the retry limits, the most interesting effect is the crash caused by
overall result has been even worse compared to the version the ARF attack. Since WEP is enabled, the AP reacts to an
we tested earlier. The Enterasys AP equipped with the lat- authentication request generating a challenge text and send-
est firmware is vulnerable to all of the three attacks. Each ing it to the station that originates the request. It is possible
attack hinders any kind of communication among associated that back-to-back challenge text generation may lead the AP
clients. Detailed results are reported in Table 4. Even in this to a crash. Another possible explanation is that the AP pre-
case, the introduction of WEP does not change the global pic- encrypts each challenge text before receiving the encrypted

Table 4 Attacks statistics for Enterasys AP with the latest Table 5 Attacks statistics for Netgear ME102 managed network (WEP
(v6.02.07) firmware enabled)

Nreq Ndup Nresp Nlost Nrr Trr Nreq Ndup Nresp Nlost Nrr Trr

PRF 5542 1 3017 2525 2.45 0.189 PRF 6621 0 4048 2573 1.009 0.002
ASRF 5920 0 3587 2333 2.4 0.164 ASRF 537 536 391 146 11.189 0.126
ARF 6003 0 3644 2359 2.392 0.163 ARF 617 616 72 545 10.708 0.167

Springer
164 Wireless Netw (2008) 14:159–169

version by the station. The anomalous sequence of crypto- Table 7 Attacks statistics for 3Com access point 8000 managed net-
graphic operations could induce a fatal workload on the AP work (no WEP)
or produce illegal operations that cause the crash. Unfortu- Nreq Ndup Nresp Nlost Nrr Trr
nately, no details are available to us about the internals of this
PRF 10288 1 724 9504 1 0.588
AP.
ASRF 1040 1039 875 165 1 0.399
ARF 1021 1020 146 875 7.938 3.064
4.2.2 Disabling WEP

After disabling WEP, no attack leads to DoS situations, even latter is not susceptible to the attack. Under the PRF attack,
though retry limits are unchanged: Table 6 reports the results the Netgear AP keeps sending responses at an almost con-
for this case. Response times and lost frames values (except stant rate (about a response every 2–4 requests) whereas the
for the PRF and the ARF cases) are similar to the previous 3Com AP seems to be completely subverted by the requests
ones, but there is no interruption of normal communications flow. By looking at the data of the entire test period (20-sec).
between the legitimate clients. These results led us to revise we found very long sequences of Probe Request frames
our statement that frame retransmission is the origin of the without any response from the AP. It is as if the 3Com AP
DoS effect. Actually, it looks like the efficiency of our flood- were not able to gain access to the wireless medium in case
ing attacks strongly depends on the overall AP performance. of flooding attacks regardless of retry mechanisms. Data re-
When WEP is enabled, the Netgear AP has to manage a ported in Table 7 show that the attacker station is able to
heavier workload even in normal conditions, so it is easy to send out up to 10000 frames in 10 sec. In other words, it has
cause a DoS through a flooding attack regardless of the (low) an almost exclusive access to the wireless medium. The re-
injection rate. Disabling WEP probably frees memory and sponse time also denotes a very high latency (half a second)
computational resources that allow the AP to withstand to when compared to other APs.
the same attack. In case of an ARF attack, the 3Com AP shows a better
promptness (indeed, the ARF attack has a lower injection
4.3 3Com access point 8000 managed network rate) but a high retry limit (nearly 8) still causes a DoS ef-
fect: the number of lost frames (Table 7) is very high and
Testing the 3Com AP we noted a somehow different behavior: the response time reaches 3 sec. We could expect a simi-
lar behavior in the ASRF case, but the retry limit set equal
– The PRF attack completely blocks the testbed network, to one prevents any DoS effect. It is worth noting that a
even though the retry limit for probe response frames vulnerability to a low-rate attack, such our ARF, suggests a
is set equal to one; serious weakness of the implementation. The activation of
– The ARF attack blocks the testbed network, but it doesn’t WEP cryptography does not modify significantly the overall
cause a crash of the AP. After the attack stops, communi- results.
cations among legitimate clients are restored;
– The ASRF attack does not show relevant effects on the 4.4 HostAP, PC-based managed network
network.
A minimal AP can be set up by using a laptop computer
4.3.1 Detailed results equipped with a Prism2 card (such as the Netgear MA401
we use in our testbed) and the HostAP driver [11]. Clearly,
Interestingly, although the retry limit is set equal to one, this kind of infrastructured network does not have the same
the PRF attack still causes a DoS effect. This result seems range of action of a specialized AP (unless an additional
to be somehow in contrast with the previous ones, so a more antenna is used) but we used it to gain further information
detailed analysis is required. To this purpose, it is useful to about the DoS attacks we devised. When exposed to flood-
compare the 3Com pattern with that produced by the Net- ing attacks, the HostAP network reacts in a way which is
gear. Both APs have the retry limit set equal to one, but the quite similar to the Enterasys AP: a PRF attack causes

Table 6 Attacks statistics for Netgear ME102 managed network


(WEP disabled) Table 8 Attacks statistics for HostAP managed network

Nreq Ndup Nresp Nlost Nrr Trr Nreq Ndup Nresp Nlost Nrr Trr

PRF 849 1 790 59 1 0.0015 PRF 9629 1 860 8769 2.98 0.44
ASR 550 549 396 154 11.247 0.115 ASRF 788 786 787 1 2.998 0.004
AR 619 618 449 170 10.797 0.123 ARF 736 736 736 0 2.997 0.0024

Springer
Wireless Netw (2008) 14:159–169 165

DoS (all communications are hindered), whereas ARF and Table 9 Attacks statistics for the D-Link DWL-1000AP+ managed
ASRF attacks do not cause major troubles to the network. In network (no WEP)
Table 8 we report some results: the AP has a retry limit equal Nreq Ndup Nresp Nlost Nrr Trr
to 3 for all kinds of frames. Under the PRF attack, there is a
PRF 10227 0 785 9442 1.89 0.004
high loss of frames and a response time which is about two
ASRF 609 608 536 73 19.68 0.279
orders of magnitude higher than in the ARF and ASRF cases. ARF (40s) 2491 2490 908 1583 19.46 0.299
The HostAP driver provides further information about the
PRF attack. By looking at the /proc filesystem (Fig. 4), we
Table 10 Attacks statistics for the Linksys WRT54G managed net-
found a large number of work (no WEP, f/w v1.41.2)
TxDeferredTransmissions that indicates that the AP is
under heavy load and a lot of frames are in queue for Nreq Ndup Nresp Nlost Nrr Trr
transmission. The TxRetryLimitExceeded counter cor- PRF 10196 0 263 9933 6.81 0.298
rectly reported the number of frames that have been retrans- ASRF 938 937 162 776 19.135 9.386
mitted until the retry limit. Interestingly, the RxDiscard- ARF 941 940 175 766 18.228 10.142
sNoBuffer parameter had a high value, an indication that
a lot of frames were discarded (neither elaborated nor re-
sponded) due to the lack of buffer space for reception. 4.6 Linksys WRT54G

This AP proved to be vulnerable to “any” attack. It is


4.5 D-Link DWL-1000AP+
quite simple to hinder any communication by executing a
PRF, ARF or ASRF attack with MAC spoofing enabled. In
This AP proved to be vulnerable only to the ARF attack.
Table 10 we report the data collected during these attacks.
Moreover, it had a particular behaviour: the DoS effect was
If the MAC spoofing is disabled, any DoS effect vanishes.
not instantaneous, as for the other APs, but it appeared only
This suggests that, once again, the DoS is a consequence
after running the attack for (about) 20–25 sec. It seems like,
of the buffer exhaustion which, in turn, is due to the patho-
the AP had, in the beginning, enough resources (mainly
logical number of retransmissions (that is the same situation
buffer space) to handle the flood of fake requests but, since
we found in the Enterasys and HostAP tests). It is worth
the attack lasted for a while, it ran out of resources and nor-
noting that the number of frame retransmissions is very high
mal communications could not be managed any more. We
in the ARF and ASRF cases, with response times up to 10
report some data in Table 9: since the DoS effect appears
seconds. Results are quite similar when WEP is enabled.
only after about 25 sec. we ran ARF attacks for 40 sec. and
monitored the AP for a period of 60 sec. in order to catch all
delayed responses. We can see that, in the ARF and ASRF 4.6.1 Upgrading the firmware
cases, each request triggers nearly 20 response frames. The
introduction of WEP had no impact on the experimental We decided to upgrade the firmware from version 1.02.1 to
results. version 1.41.2 since the latter enabled us to arbitrarily change
the retry limits. We found a quite different behaviour after
the upgrade, suggesting that changes at the firmware level
may lead to completely different reactions to DoS attacks.
In particular, Linksys AP with firmware 1.41.2 proved to
be vulnerable only to ARF and ASRF attacks (regardless of
retry limits we set). The disabling of MAC spoofing did not
modify these results.

4.7 Netgear WG602

With this AP we didn’t manage to hinder communications,


despite of our attacks. Only in the ARF and ASRF cases we
noticed a sudden DoS effect in the beginning of the attack
that disappeared in less than a second. After that the AP
began to ignore our fake requests. We got a step further by
looking into the AP setup utility: we realized that the AP has
an internal limit on the number of authentication/association
Fig. 4 HostAP driver statistics requests that can be handled. When the limit (that seems to be

Springer
166 Wireless Netw (2008) 14:159–169

Table 11 Attacks statistics for the Netgear WG602 managed network to 1 (the minimum value accepted): DoS effects are always
(no WEP) present and the only notable difference is a reduction in the
Nreq Ndup Nresp Nlost Nrr Trr value of Trr that decreases to (about) 17 sec. On the basis
of these observations, we can not relate the vulnerabilities
PRF 5415 0 5397 18 1 0.001
simply to the retransmission of unacknowledged frames. The
ASRF 3394 3393 49 3345 7.795 0.114
ARF 2987 2986 29 2958 7.482 0.232 behaviour showed by this AP, under the ARF or ASRF attack,
is quite similar to the behaviour of the 3Com Access Point
8000 under the PRF attack: during the requests flooding, the
close to 60) is reached, the AP ignores any further request AP is unable to gain access to the medium to send out a re-
(that is, it does not respond at all). Unfortunately, the list sponse or to transmit the data frames belonging to legitimate
of accepted authentications/associations is never refreshed. communications. This is probably due to the implementation
Then, if an ARF or ASRF attack fills it with fake stations choices with respect to transmit/receive queues and memory
requests, the AP doesn’t allow any other client, even legit- management, but a definitive analysis requires support from
imate, to authenticate/associate to it. From this viewpoint, the vendor.
our attacks prevent new legitimate clients from getting ac-
cess to the network, that is a different, but still annoying, 4.9 Compaq/HP WL520
form of Denial of Service. As for the other APs, results are
reported in Table 11. As a final investigation, we tested our attacks against a “real-
world” wireless network located in the Bio-Medical Cam-
pus in Rome. The BSSID we targeted was managed by a
4.8 Cisco AP 350
Compaq/HP WL520 access point. For this experiment, we
resorted to a new attack tool we developed, which is essen-
This AP proved to be vulnerable to both ARF and ASRF
tially a modified version of the HostAP driver that “embeds”
attacks, with all communications blocked by the flood of
the attack schemes at kernel level. By means of this tool, we
requests even if the attack is executed at a low injection
are able to execute the attacks at a rate that exceeds 900
rate. Although all the DoS effects disappear when the MAC
frames/sec, regardless of the attack scheme (i.e., the ARF
spoofing mechanism is disabled, it is quite difficult to ex-
and ASRF attacks are more powerful). In such a way, we
plain such severe vulnerability only as a consequence of the,
managed to hinder the network with all of the three attack
already cited, retransmission problems. Actually, the analy-
schemes. However, we noticed an unconventional behaviour:
sis of the logs captured by Ethereal revealed the existence
after being flooded for a while, the AP decided to switch
in the attack process of two different phases: firstly, when the
channel, thus eluding the attacks. Obviously, it is easy to by-
attack is in progress, the AP is completely subverted by the
pass such defense mechanism by switching channel on the
flood of requests, and it is not able to send out any response
attacking machine. Moreover, it is not clear if the channel
frame (we saw a similar behaviour with the 3Com Access
switching is a true defense mechanism or a side-effect of
Point 8000); in a second phase, when the attack is over,
some different feature of the AP.
the AP starts to send out the responses related to the initial
flood of requests. By looking at the values reported in Ta-
ble 12, we can see that the AP sends out only 13 responses,
whereas the number of requests is two orders of magnitude 5 Concluding remarks
larger than that (1600−1900).
The delay between a request frame and the correspond- We showed how some simple flooding attacks, based on
ing response frame reaches the astonishing value of 35 − 37 the injection of forged frames, may cause, under certain cir-
sec. The retry limit is set equal to 32 by default, but it can be cumstances, a serious service degradation in 802.11 wireless
changed through the configuration interface. However, there networks. Figure 5 compares the packet loss experienced by
is no significant change even if the retry limit is set equal all the APs we tested under the three different attack tech-
niques we devised. It is apparent how no AP is fully immune
although some APs are much more vulnerable than others.
Table 12 Attacks statistics for the Cisco AP 350 managed network Figure 6 shows a similar comparison for the response times
(no WEP)
of the APs under attack.
Nreq Ndup Nresp Nlost Nrr Trr The key points we discovered can be summarized as fol-
PRF 4576 0 2127 2449 1.94 0.002
lows:
ASRF 1633 0 13 1620 32 37.705
– PRF, ARF and ASRF flooding attacks can be exe-
ARF 1951 0 13 1938 32 35.847
cuted by any malicious station in the area of a wireless

Springer
Wireless Netw (2008) 14:159–169 167

Fig. 5 Packet loss (%): this


graph compares the results of all
APs we tested

Fig. 6 Response times (in


seconds): this graph compares
the response times during DoS
attacks (log scale)

infrastructured network, without being neither associated Netgear ME102 case), or to prevent other legitimate sta-
nor authenticated to the access point; tions from associating to the AP.
– the minimum frame injection rate required to cause a DoS
depends on the AP in use. For some of the devices we tested It is worth to note how the attacks we devised require only
( e.g., the 3Com Access Point 8000), it is surprisingly very simple hardware and software components (basically
low. a laptop with a Prism card and the HostAP driver plus the
– AP’s main vulnerability to these flooding attacks seems Radiate library) and thus they can be easily executed with a
to reside in unacknowledged frame retransmission, which very limited effort.
causes memory buffers exhaustion and freezes AP func- Our experiments showed that the extent of vulnerability
tionalities; to DoS attacks strongly depends on the firmware used by
– weak implementations of the 802.11 protocol in the ac- the APs. As a matter of fact, by running different versions
cess points can determine further vulnerabilities, which of firmware on the same AP, the results may change sig-
allow malicious stations to crash an AP (as shown in the nificantly. This is apparent in the case of the Enterasys

Springer
168 Wireless Netw (2008) 14:159–169

and Linksys AP. Moreover, it is interesting to note that https://courseware.vt.edu/users/marchany/


more recent versions of firmware do not necessarily behave ECE5560/Papers/lough.vulnerabilities.802.11.pdf
6. J. Bellardo and S. Savage, 802.11 Denial-of-Service Attacks. Real
better than older versions. For instance, the latest version
vulnerabilities and practical solutions, in: Proceedings of the 12th
of the firmware for the Enterasys AP does not introduce USENIX Security Symposium, Washington, D.C. (Aug. 2003).
any defense mechanism against DoS attacks and, from this 7. A. Misra, M. Shin and W. Arbaugh, An empirical analysis of the
viewpoint, it is no better than its predecessor. IEEE 802.11 MAC layer handoff process, Department of Computer
Science, University of Maryland.
We tried to embed some defenses at software driver level
8. V. Gupta, S. Krishnamurthy and M. Faloutsos, Denial of service
in the Linux HostAP PC-based access point but the attempts attacks at the mac layer in wireless ad hoc networks, in: Proceedings
revealed unsuccessful since there were no hooks in the driver of 2002 MILCOM Conference, Anaheim, CA (Oct. 2002).
to achieve the necessary fine-grain control of the Network 9. J. Wright, Detecting wireless lan mac address spoofing. (Jan.
2003). http://home.jwu.edu/jwright/ papers/wlan-
Interface Card (NIC). What would be necessary is, at least,
mac-spoof.pdf
the possibility to set retry limits and timeouts for the trans- 10. M. Schiffman, The need for an 802.11 wireless toolkit, Black Hat
mission of replies to Probe Request, Authentication Briefings (July 2002).
Request and Association Request frames. Actually, we 11. Host AP driver for Intersil Prism2/2.5/3,
http://hostap.epitest.fi/
believe that really effective defense mechanisms should re-
12. http://www.netperf.org/
side at firmware level (or below it). One of the reasons is 13. http://www.ietf.org/rfc/rfc4017.txt
that Probe Request frames are managed directly in the 14. http://www.thunkers.net/∼deft/advisories/
NIC without being passed to the upper (device driver) level. dlink udp dos.txt
15. http://www.cisco.com/warp/public/707/cisco-sa-
Thus, an effective and robust solution to the attacks we de-
20060112-wireless.shtml
scribed, should be found working directly at firmware level,
relying on vendors’ support that could either fix the prob-
lems directly or provide adequate documentation and devel-
opment tools. At this time without such information we can
only think of generic mechanisms of resources management
that prevent an access point from running out of memory.
Other solutions based, for instance, on cookies included in
the frames could be considered, but they probably would re-
quire changes in existing procedures that might cause incom-
patibilities with old equipment and interoperability issues if
not properly standardized.
As a final remark we note that very recently new seri-
ous flaws in 802.11 equipment of major vendors have been Francesco Ferreri graduated in Software Engineering in 2004 at Rome
University “Tor Vergata”. He then joined CASPUR (Italian Interuni-
reported [14, 15]. Although these vulnerabilities are due to versities Consortium for Supercomputing Applications) where he led
problems in the management of packets at upper layers (arp research activities involving wireless networks and IPv6 integration.
requests and fragmented udp packets), they confirm that He’s currently employed at NaMeX, Rome’s Internet Exchange Point,
much work remains to be done before wireless networks as a network and systems engineer.
can be safely employed in locations (e.g., hospitals) where
denial of service attacks could cause severe damage.

References

1. ANSI/IEEE Std 802.11 1999 Edition.


2. M. Gast, 802.11 Wireless Networks—The Definitive Guide,
O’Reilly (2002).
3. A.W. Arbaugh, Narendar Shankar and Y.C. Justin Wan, Your 802.11
Wireless Network Has No Clothes. Department of Computer Sci-
ence, University of Maryland (March 2001). Leonardo Valcamonici graduated in Maths in 1994 at “La Sapienza”
4. T. Karygiannis and L. Owens, Wireless network security 802.11, University in Rome. After that he joined CASPUR (Italian Interuni-
Bluetooth and handheld devices. National Institute of Standards versities Consortium for Supercomputing Applications) where, in the
and Technology, Technology Administration, U.S. Department of beginning, he was involved in research activities in the field of parallel
Commerce. and distributed computing. After that he became a network and security
5. D.L. Lough, Nathaniel J. Davis and Randy C. Marchany, engineer. He is now CASPUR’s Information Systems Security Officer
Security vulnerabilities of IEEE 802.11. Apr. (2002), and Network Applications and Services Team Leader.”

Springer
Wireless Netw (2008) 14:159–169 169

Massimo Bernaschi graduated in physics in 1987 at “Tor Vergata”


University in Rome. After that he joined the IBM European Center for
Scientific and Engineering Computing (ECSEC) in Rome. He spent
ten years with IBM working in the field of parallel and distributed
computing. Currently he is with the Italian National Research Council
(CNR) as chief technology officer of the Institute for Computing Ap-
plications. Moreover, he is an adjunct professor of Computer Science
in “La Sapienza” University in Rome.

Springer

You might also like