Staying Secure and Unprepared: Understanding and Mitigating the Security Risks of Apple ZeroConf

Similar documents
All Your Payment Tokens Are Mine: Vulnerabilities of Mobile Payment Systems

It Just (Net)works. The Truth About ios' Multipeer Connectivity Framework. Alban

AirDrop Cheat Sheet. AirDrop files between your devices In OS X Yosemite, AirDrop helps you quickly transfer files between your Mac and nearby Mac

Security+ SY0-501 Study Guide Table of Contents

THE NEW LANDSCAPE OF AIRBORNE CYBERATTACKS

SIP and VoIP What is SIP? What s a Control Channel? History of Signaling Channels

PROTECTING THE ENTERPRISE FROM BLUEBORNE

MASHaBLE: Mobile Applications of Secret Handshakes over Bluetooth Low-Energy. Yan Michalevsky, Suman Nath, Jie Liu

Security Philosophy. Humans have difficulty understanding risk

Certificates, Certification Authorities and Public-Key Infrastructures

Introduction to SSL. Copyright 2005 by Sericon Technology Inc.

Man In The Middle Project completed by: John Ouimet and Kyle Newman

Authentication Methods

ANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS

SECURITY ON PUBLIC WI-FI New Zealand. A guide to help you stay safe online while using public Wi-Fi

Security Using Digital Signatures & Encryption

Iphone Bluetooth Setup 4s How To Use Push. Notifications >>>CLICK HERE<<<

Information Security CS 526

Software Version 3.3 Version 1.0 October Xerox Print Portal. Information Assurance Disclosure

CPSC 467b: Cryptography and Computer Security

CERTIFIED SECURE COMPUTER USER COURSE OUTLINE

Developing an End-to-End Secure Chat Application

Manual Iphone 5 Bluetooth Not Working With Macbook Via

Trend Micro Guide and solution to help embrace Consumerization and BYOD. James Walker EMEA Product Marketing Manager 26 September 2012

Authentication Part IV NOTE: Part IV includes all of Part III!

A Survey of BGP Security Review

Enabling Apple AirPrint with Your Xerox AltaLink Multifunction Printer. White Paper

Exam : Title : Security Solutions for Systems Engineers(SSSE) Version : Demo

Mobile Experience and Security - A Delicate Balance. Jeff Keller, CISA, CIA, CFSA SVP/Senior Audit Director, Technology, Projects, Due Diligence

Manually Connecting To Wireless Network Macbook Pro Will Not Automatically

CYBER ATTACKS EXPLAINED: PACKET SPOOFING

Course Outline (version 2)

Frequently Asked Questions

Chapter 10: Security. 2. What are the two types of general threats to computer security? Give examples of each.

Frequently Asked Questions WPA2 Vulnerability (KRACK)

CIP Security Pull Model from the Implementation Standpoint

CS530 Authentication

Network Access Control and VoIP. Ben Hostetler Senior Information Security Advisor

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.

Public-key Cryptography: Theory and Practice

Ch 1: The Mobile Risk Ecosystem. CNIT 128: Hacking Mobile Devices. Updated

BYOD: BRING YOUR OWN DEVICE.

Ethical Hacking and Prevention

The Internet of Things. Steven M. Bellovin November 24,

Digital Entertainment. Networking Made Easy

Cryptographic Concepts

SSL/TLS & 3D Secure. CS 470 Introduction to Applied Cryptography. Ali Aydın Selçuk. CS470, A.A.Selçuk SSL/TLS & 3DSec 1

Symantec Endpoint Protection Family Feature Comparison

AUTHENTICATION AND LOOKUP FOR NETWORK SERVICES

CPSC 467: Cryptography and Computer Security

Enabling Apple AirPrint with Your Xerox ConnectKey Device

0/41. Alice Who? Authentication Protocols. Andreas Zeller/Stephan Neuhaus. Lehrstuhl Softwaretechnik Universität des Saarlandes, Saarbrücken

Distributed Systems 26. Mobile Ad Hoc Mesh Networks

Key Management and Distribution

MU2a Authentication, Authorization & Accounting Questions and Answers with Explainations

Tap BLE API Documentation

Attacking Networks. Joshua Wright LightReading LIVE! October 1, 2003

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

Hacking challenge: steal a car!

The Attacker s POV Hacking Mobile Apps. in Your Enterprise to Reveal Real Vulns and Protect the Business. Tony Ramirez

A network is two or more computers, or other electronic devices, connected together so that they can exchange data.

Port Mirroring in CounterACT. CounterACT Technical Note

A Framework for Optimizing IP over Ethernet Naming System

تاثیرفناوری اطالعات برسازمان ومدیریت جلسه هشتم و نهم

Overview of SSL/TLS. Luke Anderson. 12 th May University Of Sydney.

CS 161 Computer Security

Elementary Computing CSC 100. M. Cheng, Computer Science

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Printopia Pro Multicast DNS (mdns) Deployment and Troubleshooting Guide

Chapter 9 Public Key Cryptography. WANG YANG

Wireless LAN Security. Gabriel Clothier

PCI Compliance Updates

PrecisionAccess Trusted Access Control

Mobile Security Threats

Wireless Security and Monitoring. Training materials for wireless trainers

User Authentication. Modified By: Dr. Ramzi Saifan

Privacy, Discovery, and Authentication for the Internet of Things

Security Considerations for IPv6 Networks. Yannis Nikolopoulos

Homework 5: Exam Review

Getting ready to set up. Step 1. Note:

AIRPLAY AND AIRPRINT ON CAMPUS NETWORKS AN ARUBA AIRGROUP SOLUTION GUIDE

L13. Reviews. Rocky K. C. Chang, April 10, 2015

Cryptography and Network Security Chapter 10. Fourth Edition by William Stallings

What s New for Enterprise and Education ios 11, macos High Sierra 10.13, tvos 11, and deployment tools and services

St. Augustine Macintosh User s Group (SAMUG) March 19, 2019

IPv6 Traffic Hijack Test System and Defense Tools Using DNSSEC

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

June Using Apple AirPrint with Xerox ConnectKey Devices User Guide

Privacy, Discovery, and Authentication for the Internet of Things

McAfee MVISION Mobile Threat Detection Android App Product Guide

A. The portal will function as an identity provider and issue an authentication assertion

Configuring OpenVPN on pfsense

Defeating All Man-in-the-Middle Attacks

Printopia 3 ENTERPRISE ADMINISTRATION GUIDE. Revision 10 October 9,

Mobile IP Overview. Based on IP so any media that can support IP can also support Mobile IP

CS 161 Computer Security

Quick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft.

Once all of the features of Intel Active Management Technology (Intel

Exam : JK Title : CompTIA E2C Security+ (2008 Edition) Exam. Version : Demo

Transcription:

Staying Secure and Unprepared: Understanding and Mitigating the Security Risks of Apple ZeroConf (Xiaolong Bai, Luyi Xing) (co-first authors), Nan Zhang, XiaoFeng Wang, Xiaojing Liao, Tongxin Li, Shi-Min Hu TNList, Tsinghua University, Indiana University Bloomington Georgia Institute of Technology, Peking University 1

Staying Secure and Unprepared: Understanding and Mitigating the Security Risks of Apple ZeroConf 2

Zero Configuration Networking (ZeroConf) 3

ZeroConf Bonjour 4

ZeroConf Bonjour protocol zero-configuration networking over IP that Apple has submitted to the IETF. Goals: With little or no configuration to add devices/services to a local network Existing devices can automatically find and connect to those new devices/services 5

Bonjour Administrators no need to assign IP, host names, service names to network services (e.g., printer) When first use a service, users simply ask to see what network services are automatically available and choose from the list. 6

How about traditional configured network? 7

Traditionally Must Configure: IP Printer name, e.g., lh135-soic.ads.iu.edu DNS server 8

Traditionally Must Configure: IP Printer name, e.g., lh135-soic.ads.iu.edu DNS server 9

Features of Bonjour 1. Service configures itself IP, hostname, service instance name 2. Clients automatically discover available services No pre-knowledge of the service s name, hostname or IP 10

1. ZeroConf Concept 2. So, how? 11

Add a new printer to a network 12

A printer configures itself Is anybody using IP fe80::abcd:1234...? 13

A printer configures itself IP fe80::abcd:1234 No? Great, I ll take it. 14

A printer configures itself IP fe80::abcd:1234 Anybody using hostname NPI9fe5.host.local? 15

A printer configures itself IP fe80::abcd:1234 Hostname HP9FE5.host.local No? Wonderful, I ll take it. 16

A printer configures itself IP Anybody having a printing service named HP-Service9FE5? fe80::abcd:1234 Hostname HP9FE5.host.local Service Instance Name HP-Service-9FE5 17

A printer finishes configuring itself IP fe80::abcd:1234 Hostname HP9FE5.host.local Service Instance Name HP-Service-9FE5 18

Features of Bonjour 1. Service configures itself IP, hostname, service instance name 2. Clients automatically discover available services No pre-knowledge of the service s name, hostname or IP 19

Automatically find the printer Q1: Anyone has a printer service? A1: I have HP-Service-9FE5 20

Automatically find the printer Q1: Anyone has a printer service? A1: I have service instance HP-Service-9FE5 Q2: So on which host is this HP-Service- 9FE5? A2: It s on host NPI9fe5.host.local 21

Added/Saved the printer to your list IP fe80::abcd:1234 Hostname HP9FE5.host.local Service Instance Name HP-Service-9FE5 22

Added/Saved the printer to your list Apple: Applications store service instance names, so if the IP, port, or host name changed, the application can still connect. IP fe80::abcd:1234 Hostname HP9FE5.host.local Service Instance Name HP-Service-9FE5 23

Service instance name HP-Service-9FE5 is saved IP fe80::abcd:1234 Hostname HP9FE5.host.local Service Instance Name HP-Service-9FE5 Saved printer = A printer who owns service name HP-Service-9FE5 24

Adversary On a device (malware infected) in your local network Aims to intercept secrets/files transferred between uninfected devices 25

Adversary Your Mac/printer are un-infected Steal your printing documents? 26

1. ZeroConf Concept 2. ZeroConf How 3. ZeroConf Breaking Printer 27

1. ZeroConf Concept 2. ZeroConf How 3. ZeroConf Breaking Case 1: Printer 28

A device infected by malware IP Hostname Service Instance Name HP-Service-9FE5 29

A device infected by malware IP Hostname Service Instance Name HP-Service-9FE5 I have a printing service instance named HP-Service-9FE5 Service Instance Name HP-Service-9FE5 30

A device infected by malware IP Hostname Service Instance Name HP-Service-9FE5 I have a printing service instance named HP-Service-9FE5 xf Service Instance Name HP-Service-9FE5 31

Saved printer = xf A printer who owns service name HP-Service-9FE5 New Service Name HP-Service-9FE5 (2) x Service Instance Name HP-Service-9FE5 32

Why it happens? Three Changing Attributs: IP Hostname Service Instance Name Apple: Applications store service instance names, so if the IP, port, or host name changed, the application can still connect. 33

Lack of authentication Three Changing Attributs: IP Hostname Service Instance Name Anyone can claim any value of the three attributes The protocol only guarantees no duplicates. 34

1. ZeroConf Concept 2. ZeroConf How 3. ZeroConf Breaking Case 2: Airdrop 35

Airdrop between Apple devices 36

37

Attack Airdrop Jeff s Macbook: Q1: Anyone has an airdrop service? Alice s iphone: I have a service named abcd.airdrop.service 38

Attack Airdrop Jeff s Macbook: Q2: So on which host is Alice s service? Alice s iphone: I have a service named abcd.airdrop.service 39

Attack Airdrop Jeff s Macbook: Q2: So on which host is Alice s service? Alice s iphone: A2: It s on host Alices.iphone.local Bob s imac: A2: It s on host Bobs.imac.local 40

Alice s iphone has service named abcd.airdrop.tcp, which is on host Bobs.imac.local Jeff s Macbook: Q2: So on which host is Alice s service? Alice s iphone: A2: It s on host Alices.iphone.local Bob s imac: A2: It s on host Bobs.imac.local 41

Attack Airdrop Jeff s Macbook: Connect https://bobs.imac.local Alice s iphone: A2: It s on host Alices.iphone.local Bob s imac: A2: It s on host Bobs.imac.local 42

Does TLS help? Jeff s Macbook: Connect https://bobs.imac.local Alice s iphone: A2: It s on host Alices.iphone.local Bob s imac: A2: It s on host Bobs.imac.local 43

TLS in Airdrop https://bobs.imac.local Server certificate issued to appleid. CDEF Bob s imac Jeff s Macbook https://alices.iphone.local Server certificate issued to appleid.abcd Alice s iphone 44

So the certificate in airdrop can hardly be used for authentication. https://bobs.imac.local Server certificate issued to appleid.cdef Bob s imac Jeff s Macbook https://alices.iphone.local Server certificate issued to appleid.abcd Alice s iphone 45

Domain should match the certificate https://bobs.imac.local Server certificate issued to appleid.cdef Bob s imac Jeff s Macbook https://google.com xf Certificate issued to google.com xf 46

Domain should match the certificate https://bobs.imac.local xf Server certificate issued to appleid.cdef xf Jeff s Macbook Bob s imac https://alices.iphone.local xf Server certificate issued to appleid.abcd xf Alice s iphone 47

What s wrong with TLS in Airdrop The certificate in airdrop cannot be used for authentication E.g, certificate should be issued to Alice but indeed issued to appleid.abcd Linking a human to her certificate is complicated challenge in finding any identifiable information that are well-known no privacy implication and unique 48

49

Some customized ZeroConf protocols FileDrop TCP packets for discovery elliptical curve cryptography for security Failed in authentication challenge in linking a human to her public key 50

1. ZeroConf Concept 2. ZeroConf How 3. ZeroConf Breaking Case 3: Apple s Vulnerable framework 51

Apple s Vulnerable framework Multipeer Connectivity (MC) A framework for automatic service discovery between nearby devices across Wi-Fi and Bluetooth without configuration Object to identify each app: peerid displayname (public) & uniqueid (private) 52

Normally Automatic Service Discovery Without Configuration Servers advertise peerids peerid displayname: Alice uniqueid: 8573a Server peerid displayname: Bob uniqueid: 6c5b3 Server Client 53

Normally Automatic Service Discovery Without Configuration Servers advertise peerids, Client browse peerids (show displayname) peerid displayname: Alice uniqueid: 8573a Server Alice Bob peerid displayname: Bob uniqueid: 6c5b3 Server Client 54

Normally Even if servers have the same displayname Server peerid displayname: Alice uniqueid: abcde peerid displayname: Alice uniqueid: 54321 Server Client 55

Normally Even if servers have the same displayname uniqueids generated by MC will always be different peerid displayname: Alice uniqueid: abcde Server peerid displayname: Alice uniqueid: 54321 Server Client 56

Normally Even if servers have the same displayname uniqueids generated by MC will always be different peerid displayname: Alice uniqueid: abcde Server Alice Alice peerid displayname: Alice uniqueid: 54321 Server Client 57

What Can Go Wrong? Attacker acts as both client and server Browse and acquire peerid object from victim server peerid displayname: Alice uniqueid: abcde Server Client & Server Client 58

What Can Go Wrong? Attacker acts as both client and server Advertise using the same peerid object peerid displayname: Alice uniqueid: abcde Server Alice peerid displayname: Alice uniqueid: abcde Client & Server Client 59

What Can Go Wrong? Client can not distinguish because of same uniqueid peerid displayname: Alice uniqueid: abcde Server Alice peerid displayname: Alice uniqueid: abcde Client & Server An Update? Client 60

What Can Go Wrong? Client can not distinguish because of same uniqueid Client maps the only peer to attacker s address (MitM) peerid displayname: Alice uniqueid: abcde Server Alice peerid displayname: Alice uniqueid: abcde Client & Server Client 61

1. ZeroConf Concept 2. ZeroConf How 3. ZeroConf Breaking Case 4: Bluetooth 62

All your ios notifications belong to me ZeroConf on Bluetooth: Apple Handoff Handoff creates Bluetooth channel without configuration Malicious app on Mac can steal notifications on iphone For details, please refer to our paper Bluetooth 63

Summary of attacks Attacks on Apple ZeroConf channels Printer (Bonjour) Airdrop (Bonjour) Multipeer Connectivity (MC) Handoff Attacks on other channels (please refer to our paper) BLE Customized ZeroConf protocols All vulnerabilities were reported to vendors, acknowledged by most vendors 64

1. ZeroConf Concept 2. ZeroConf How 3. ZeroConf Breaking 4. Impact 65

Impact Measurement We analyzed 61 popular Mac and ios apps working with ZeroConf 88.5% are vulnerable to man-in-the-middle or impersonation attacks ZeroConf Channels Vulnerable/ Sampled Bonjour 18/22 Sensitive Information Leaked files, directories and clipboard synced, documents printed, instant message MC 24/24 files and photos transferred, instant message BLE 10/13 User name and password for OS X Customized protocols 2/2 remote keyboard input and files transferred 66

1. ZeroConf Concept 2. ZeroConf How 3. ZeroConf Breaking 4. Impact 5. Protecting ZeroConf 67

Protecting ZeroConf Problem: linking a human to her certificate is complicated Speaking out Your Certificate (SPYC) Voice biometrics ties certificate to identity Human Subject Study: convenient and effective For more details, please refer to our paper 68

Conclusion Apple s ZeroConf techniques are not secure as expected The usability-oriented design affects security Addressing such security risks is nontrivial Challenge in binding a human to her certificate Our Defense: SPYC Voice biometrics ties certificate to identity 69

ZeroConf The ZEROCONF Working Group s requirements and proposed solutions for zero-configuration networking over IP essentially cover three areas: addressing (allocating IP addresses to hosts) naming (using names to refer to hosts instead of IP addresses) service discovery (finding services on the network automatically) 70