Eduroam, which stands for education roaming, is a world-wide Wi-Fi access and roaming service largely exploited by the international research and education community. Eduroam's authentication relies on the same long-term credentials used by students and professors to access critical education/research services. To assess the real-world security of Eduroam, we i) implemented a credential stealing attack based on a rogue Eduroam setup, ii) ran a controlled experiment with 37 relatively skilled real world users (mainly electrical or computer engineering students), and iii) for four heterogeneous selected devices, we investigated their more detailed dependence on different WPA-enterprise configurations and certificate settings. The aftermath is that, even with a completely passive attack (users were keeping devices in their pocket), we stole credentials from more than one third of the participants. While most of the Eduroam vulnerabilities employed in this work should be considered somewhat known (being disclosed in former technical papers), our work appears to raise a threefold concern: i) most pragmatic Eduroam configurations appear to be grossly insecure; ii) no Apple's iPhone felt in our attack, owing to its reduced possibility for an user to misconfigure the terminal; and iii) there is a limited awareness of Wi-Fi authentication threats even in relatively skilled end users.

'Careful with that Roam, Edu': experimental analysis of Eduroam credential stealing attacks

Gringoli F.;
2022-01-01

Abstract

Eduroam, which stands for education roaming, is a world-wide Wi-Fi access and roaming service largely exploited by the international research and education community. Eduroam's authentication relies on the same long-term credentials used by students and professors to access critical education/research services. To assess the real-world security of Eduroam, we i) implemented a credential stealing attack based on a rogue Eduroam setup, ii) ran a controlled experiment with 37 relatively skilled real world users (mainly electrical or computer engineering students), and iii) for four heterogeneous selected devices, we investigated their more detailed dependence on different WPA-enterprise configurations and certificate settings. The aftermath is that, even with a completely passive attack (users were keeping devices in their pocket), we stole credentials from more than one third of the participants. While most of the Eduroam vulnerabilities employed in this work should be considered somewhat known (being disclosed in former technical papers), our work appears to raise a threefold concern: i) most pragmatic Eduroam configurations appear to be grossly insecure; ii) no Apple's iPhone felt in our attack, owing to its reduced possibility for an user to misconfigure the terminal; and iii) there is a limited awareness of Wi-Fi authentication threats even in relatively skilled end users.
2022
978-3-903176-46-1
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11379/576084
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 0
  • ???jsp.display-item.citation.isi??? 0
social impact