exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Wippien Flawed Key Negotiation

Wippien Flawed Key Negotiation
Posted Feb 6, 2010
Authored by Michael Rossberg

Wippien suffers from a flawed key negotiation vulnerability.

tags | advisory
SHA-256 | 1fea0eab05d989b17d3a4de24b417422ef10def3d47b9dfcb7daba641c1851b8

Wippien Flawed Key Negotiation

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Security Advisory

Advisory: Multiple Security Issues in Wippien
Release Date: February 4th, 2010
Last Updated: February 4th, 2010
Author: Michael Rossberg [michael dot rossberg at tu-ilmenau
dot de]
Application: Wippien (for Windows and Linux)
MiniVPN
Severity: Flawed key negotiation protocol allows for easy man-in-
the-middle
attacks
Predictable key materials
Risk: Critical
Vendor Status: Contacted
References: http://wcms1.rz.tu-ilmenau.de/fakia/fileadmin/template/startIA/telematik/Mitarbeiter/rossberg/wippien-advisory.txt


SUMMARY

Wippien is a software that can automatically establish a VPN between
jabber
contacts. In order to derive a session key for the encryption routines
Wippien
uses a cryptographic key exchange, which is in the open source part of
the
software. As we analyzed some of its components, it emerged that the RSA
fingerprints are not validated and the freshness of the exchange is
not assured.
Each of both issues allows simple man-in-the-middle attacks.

The Windows version of Wippien and MiniVPN use an insecure random number
generator to derive key material.

The Linux version of Wippien does not initialize keying material. This
results
in uninitialized memory being used to derive the symmetric encryption
key.

AFFECTED SOFTWARE VERSIONS

All recent versions of Wippen for Windows and Linux, including 2.3.2,
are
affected.

SEVERITY RATING

Being a VPN component, confidentiality is the essential property to be
assured
and given the simplicity of potential attacks, the potential risk is
high.

DETAILS

1.) Wippien creates a new private/public key pair with every startup.
This and
the fact that the fingerprint of the peers public key is not
shown to the
user, makes it impossible for users to even become aware of man-
in-the-
middle attacks.
2.) During the key exchange, Wippien peers exchange nonces that are
protected
by RSA PKCS#1. These nonces are later on used to derive a session
key by an
XOR operation:

// and XOR with ours
for (int i = 0; i < 16; i++)
user->m_SharedKey[i] = user->m_MyKey[i] ^ dst[i + 24];

Thus, if the key exchange is simply replayed to the connecting
victim, it
will simply XOR its own key part with itself, resulting in a zero
key and an
attacker without valid key is able to obtain a correct key.
3.) The Windows version of Wippien and MiniVPN will initialize the key
by using
rand():
for (int i = 0; i < 16; i++) m_MyKey[i] = rand();
This is neither a secure source for keying material, nor is
srand() called
to supply a seed. This makes key generation highly predictable.
4.) The Linux version works similar:
for (i=0;i<16;i++)
u->SharedKey[i] = u->MyKey[i] ^ dst[i+24];
Only that MyKey is never initialized, and thus random value will
be used and
the derived key is highly insecure.

DISCLOSURE TIMELINE

28th January, 2010 - Contact with Wippien developer by email

RECOMMENDATION

We recommend to migrate from Wippien or use an additional form of
cryptographic
protection, e.g., SSH and SSL, immediately.

GPG KEY

pub 4096R/B105F0C3 Michael Rossberg
Key fingerprint = 8448 88F0 C803 14FD 01AF A819 D2BF 817D B105 F0C3

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (Darwin)
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=meNb
-----END PGP SIGNATURE-----

-----------------------

From the Wippien forum (http://www.wippien.com/forum.php?action=view&topic=1191281119
):
User: [...] I was wondering what the level of security is in Wippien.
[...]
Developer: [...] You shouldn't worry about security since we had it in
mind when implementing Wippien. [...]
User: Thanks, [...] that puts my mind at ease.

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close