NSA Approves First 802.11b Product for Secret Data 254
joehoya writes "I realize this is a couple of days old, but the National Security Agency recently certified the Harris Corp's Secnet-11 as the first 802.11b system permitted to carry US SECRET level data. See press release. The system integrates NSA crypto with commercial chipset based 802.11b PCMCIA cards and access points to create a secure wireless LAN. Unfortunately, you and I won't be able to buy them, as they are only available to organizations with an NSA COMSEC account."
Yeah but (Score:2, Funny)
link may need changed? (Score:2, Informative)
How is this unfortunate? (Score:4, Interesting)
Or, in English (and not marketdroidspeak) you can have perfectly secure communications over existing 802.11 as long as you encrypt at the protocol level rather than the hardware (link? I need to study my OSI seven layer network burrito) level. So why do we care about this anyway?
Re:How is this unfortunate? (Score:5, Funny)
Re:How is this unfortunate? (Score:2)
Oh, wait a minute.
Dang.
Re:How is this unfortunate? (Score:2)
You might say they enjoy a reverse proportion.
(you may now throw tomatoes)
Re:How is this unfortunate? (Score:2)
Physical (wires and stuff)
Link (Ethernet protocols, mac addresses, clever wires etc)
Network (IP)
Transport (TCP)
Session
Protocol
Application
WAP would fit in the bottom 2 layers, with encryption in layer 2 I believe. You personally encrypt in Session, so your encrypted packets get sent over a non encrypted network (routers have to be able to read the destination IP address, dont they!)
Re:How is this unfortunate? (Score:2, Informative)
First you could start by "securing" the net using the "security" available today in 802.11, something all too few companies does.
Then instead of connecting it to your network, you could connect it to the outside of a VPN box, so that you would need to run VPN over it.
If setup right it would work well for those on notebooks, since use the same method to connect to the company network when you are on site or remote using the internet. The difference is that on site, you would use your 802.11 card and remote you would use a ethernet/modem connection to the internet to connect.
I have tried this and it can work, you can even make it work so that the people in the sales dept. can understand it.
With that said, I am still amazed by amount of companies who install a 802.11 net without securing it at all. I have tried it many times, I open my notebook connect to the network and ask them for a account so I can login. Then they ask me how I got connected to their network and I tell them that I am just using their wireless net.
After that I normally can sell a few hours extra to secure their wireless net. And recommend that if they want that extra security, they sould do something like I mentioned above.
And so I end the day with selling a few extra hours and maybe some VPN boxes.
Re:How is this unfortunate? (Score:2)
How would you accomplish that with protocol-level encryption?
Re:How is this unfortunate? (Score:2, Interesting)
Haveing "hardware" only encryption is not and will never be a solution.
I look on the current encryption scheme that 802.11b uses as a simple mesure to make recording or watching communication harder. It in NO WAY is a means of totel security. That is always better left to higher level protocals then the link layer in 802.11b, or any networking protocal for that matter.
Yes I only use/allow encrypted connections to all of my wired, and wireless systems.
Re:How is this unfortunate? (Score:2, Informative)
You can establish an SSH session to a Linux system rather easily, but maybe the six-year-old AS/400 sitting on the internal corporate network doesn't. Upgrading the AS/400 is an expensive proposition. Implementing a VPN solution, perhaps at the border router or with another internal system, is probably the best method with current 802.11 hardware. But if the hardware supports encryption, everything is transparent.
Hardware-level encryption certainly doesn't absolve the end user of the responsibility of encrypting Internet communications. However, on an internal network, I think you should be able to trust your wireless connections to the same degree you can trust your wired ones. At worst, hardware-level encryption is a wasted step, but it would give some protection to the average user who expects the internal network to be protected.
Re:How is this unfortunate? (Score:3, Insightful)
IPsec [google.com]
Re:How is this unfortunate? (Score:2, Informative)
Make NSA crypto Open Source! (Score:4, Funny)
Only when we harness the power available in the Open Source developer community can be achieve fully secure e-mail communications.
dnetc (Score:2)
Re:dnetc (Score:4, Funny)
Re:dnetc (Score:5, Funny)
Hey! that would be a great way to keep them from drifting off into space.
...it is... (Score:3, Informative)
Re:Make NSA crypto Open Source! (Score:3, Informative)
is this kind of like what you were asking for?
Re:Make NSA crypto Open Source! (Score:5, Informative)
Let's say that the quality of the code is roughly proportional to QN, where N is the number of developers and Q is the quality of each developer.
The alleged value of Open Source is that it allows you to increase the value of N by a dramatic number. Even if the developers are merely average, you can get a higher QN with Open Source than with closed source for many projects.
Of course, if the number of half-finished projects on Sourceforge is any indicator, simply opening up is not enough. You have to have some appeal to developers or you aren't going to raise your N much.
Then of course there is the other factor, Q. Even if you have something really cool, there is no gaurantee that those interested will be any better than average, and you will also have to expend some effort "managing" those who are below average or who are just plain crackpots.
Something tells me that the NSA has no trouble attracting developers with a very high "Q" and in sufficient "N" to do an excellent job.
Yes, I know about the "mythical man month" and that you can't just add up developers as I've suggested. That's why this is just an approximation.
Frankly, I think your post borders on Trollish because you've got "only" and "fully secure" in there; but there are probably plenty of people on /. who will eat up your post, just as there are plenty of people who think that obscurity==security. Of course neither side is right; Open Source isn't a panacea, but giving up obsccurity isn't always such a bright idea either.
Re:Make NSA crypto Open Source! (Score:4, Informative)
hum.... (Score:2, Interesting)
preview and submit too close (Score:2, Funny)
Re:hum.... (Score:3, Insightful)
Excellent Question, especially given the well publicized trouble government employees have in holding on to their laptops. Just cause it's technically secure doesn't mean the laptop itself can't just get picked from an unnattentive employee.
Public or private key? (Score:4, Interesting)
Re:Public or private key? (Score:2)
If you mean DES, not DEC, don't hold your breath. Evi Nemeth at the University of Colorado had effectively reversed DES in 1991, and the NSA has her work.
--
Re:Public or private key? (Score:2)
Evi did an analysis of the algorithm. The point on which she concentrated her efforts was the pairs of large factors(? primes? Pairs of numbers, but I don't recall why they were paired)
Normally, one of these numbers is present in the key, the other in the cyphertext. By making use of large numbers of cycles (ran her code on the "burn-in" floor for Prime supercomputers for several months) she developed a large set of these pairs.
Given this large list, one can take one number from the cyphertext and simply look up the key. No, she doesn't have all possible values. No, she technically hasn't broken the algorithm. Practically speaking, her presentation consisted of taking a 5000+
The NSA has her code. The NSA has her database of numbers, and certainly knows how to run her code to increase the size of the database.
Do I know that this is true? Of course not. I believe these things because Evi told me how she did her work, and that she gave her data and source to the NSA.
--
Re:Public or private key? (Score:3, Informative)
Baton is a symmetric key cypher, by the way. I read somewhere it's a 160 or 320-bit key and of course it has various chaining modes. So it's definitely strong. It uses the SHA-1 hash in the protocol too.
Correction: (Score:5, Informative)
Re:Correction: (Score:2)
/me hopes this will make it out to the market (Score:3, Interesting)
But until then, there's always VPN or SSH tunnels. And as an added bonus, you can impliment SSH tunnels for free. (even for web and other traffic... not just SSH data)
Proprietary crypto is lame (Score:4, Insightful)
Re:Proprietary crypto is lame (Score:5, Funny)
Re:Proprietary crypto is lame (Score:2, Interesting)
Pst... it's sooo secret... (Score:2)
Hmm... most crackers use Netcraft [netcraft.com] to see what sites like the NSA website [nsa.gov] uses [netcraft.com]...
Re:Pst... it's sooo secret... (Score:2)
Sounds like... (Score:2, Insightful)
Re:Proprietary crypto is lame (Score:5, Insightful)
Re:Proprietary crypto is lame (Score:2)
Re:Proprietary crypto is lame (Score:2, Insightful)
The NSA is the largest employer of mathematicians and cryptographers in the world. World-class peer review is possible within the NSA. How many people peer review crypto? Honestly? This is the same argument used for Open Source software, and the same thing applies, plenty of people use it, and a few actually look over the source, if they break it, or find something they don't like. I would bet that more people look over NSA internal crypto than have looked over most public source crypto. In addition, the people looking at NSA source are all qualified individuals, people who know an S-Box from their asshole.
The NSA is consistantly 10-20 years ahead of the private and scholastic sector. The NSA for example was involved in the creation of the S-boxes for DES. While many people argued that the NSA would weaken the algorithm in an attempt to make it more easily crackable, only later was it discovered that the original boxes were vulnerable to an attack that had not even been discovered by the non-government sector.
You may not trust the NSA, but their in-house review is as good and better than anything you will find elsewhere, even in the much-vaunted open-source community.
Re:Proprietary crypto is lame (Score:2)
The academic community today would have had a hard time breaking Enigma (assuming the wirings were not known) even with the computing power available to us.
Uh, the Enigma had a few billion keys, tops. You could brute force it in minutes.
Let's start the pool now.... (Score:5, Funny)
--
Re:Let's start the pool now.... (Score:2)
D*mn, I thought the Kennedy conspiracy theorists had finally gone dormant....;>
If it isn't a Pringles can, it'll be some other low-tech, widely available object slightly modified by a bright teenage kid showing off for his buddies.
Re:Let's start the pool now.... (Score:2)
Re:Let's start the pool now.... (Score:2)
Hey CowboyNeal, Taco, Anyone -- when you select "Freaks" from your homepage here, the cute message misspells "too"
--
Re:Let's start the pool now.... (Score:2)
Ok, you caught me. <grins>
Guess who's smarter than you. Yup, the NSA.
I have no doubt of that. And I'd wager huge sums that the person to crack the new encryption won't be me. (Mess with the NSA? That's the last thing I'd do! Yes, there are two ways to interpret that statement. Yes, both are true.)
But I also expect it will take about a week after the first network goes live before it's broken.
--
But it only works with Windows.......... (Score:5, Interesting)
who is fooling who here? None of the OSes (only Windows versions) it works with are certified for TOP SECRET data.... guess its pretty useless till someone does the linux port eh?
Re:But it only works with Windows.......... (Score:2)
Re:But it only works with Windows.......... (Score:2, Informative)
Re:But it only works with Windows.......... (Score:5, Informative)
Yeah, and Trusted Solaris, and Trusted Irix, and a bunch of other OSs you've probably never head of. Look at this [sgi.com] if you don't believe me.
Re:But it only works with Windows.......... (Score:2, Informative)
That particular drive is not used for any other processing, nor is it removed for the secure COMSEC vault. It is coded and numbered, and is not used in any other computer. The computer itself has an encryption algorithm that I've never seen (not GOSH, BLOWFISH, or PGP algorithms) based upon a 1024-bit rotating key that not even the user knows. It is completly random (insofar as a computer can be random) and based upon a random seed. The user's login and password is also encrypted, and typically the computer is not connected to an ethernet network, but rather a dial-up connection through STU-3 or -4 secure modems.
And yes, the government uses Windows because of a licencing deal with the ever-pervasive MS.
Just something to think about....
Re:But it only works with Windows.......... (Score:2)
Actually truth be told it never seemed that secure to me. Pro Force would actually let you into the buildings at night unaccompanied to do work. You then left on your own. Admittedly we were just doing analysis of nuclear explosions and weren't working on the main models or anything. Those were up the road. But it always freaked me out how little real security there was.
It always seemed odd that we had these rules about no non-optical cable beyond a certain length but the staff (including summer interns) was given free reign.
As most security lectures point out, the typical way a hacker will crack your network isn't a direct brute force way. Yet those more "primitive" approaches are what are typically left unguarded. (Although of course with recent WiFi networks not putting security on at all was always silly - but the government was much smarter than that)
Re:But it only works with Windows.......... (Score:2)
Isloted DOES NOT mean behind a firewall. All classified networks (networks processing SECRET, TS, etc.) are isloted in the sense that they're not, in any way, connected to the internet. And... if the computer is processing TOP SECRET information, it's more than likely in a bombshelter... well... not REALLY a bombshelter, but something similar, like a secure basement office or something.
speak for yourself (Score:5, Insightful)
While you're correct that most citizens (including Slashdot editors, I'd guess!) won't be able to buy these babies, please remember that a large portion of Slashdot's readership is in IT, some of us in positions where we may, in fact, purchase equipment through an NSA COMSEC account. Industries and corporations deemed "essential to the National Security" under conditions set forth in the NPHG Protection Act have been given this priveledge since its passage in 1973, in response to the Viet-nam War. I work at a major corn distributor (food being an essential supply during potential siege or embargo, and breakfast being the most important meal of the day), and I can tell you that I hope to have my hands on these sometime this month, before Christmas or President's Day at the very most. It should speed up our processes considerably to not have to be tied to "wired" networks. It's a fun time to be in IT, and this cloak-and-dagger stuff just makes it better.
Re:speak for yourself (Score:5, Insightful)
Then why didn't you just run ipsec over conventional 802.11? It will be just as secure as this, and can be done on commodity hardware and with free software.
Re:speak for yourself (Score:2)
Do you really believe that his corn processing is DOD classified?
Re:speak for yourself (Score:2)
I challenge you to produce evidence that the US federal government imposes information security requirements on food production plants.
Sure! (Score:2)
GSA-1132-4
GOV-3321-11-23
MI-33241-A
FL-31-S
Then provide your security classification and reason for needing the information and it will be provided via secure channels if approved.
I can say that I know people that work for several organisations that produce and grow huge amounts of food and the larger companies do keep different government departments informed about production and supply chain problems. That said, I really assume if you needed to know the information you challenged the AC to provide for you, then you would already have it.
Re:speak for yourself (Score:2, Funny)
you use an algorithm designed by some freak at the NSA and suddenly you are cloak-and-dagger?
cloak-and-dagger is snowboarding down a mountain in front of an avalanche while helicopters fire rockets at you. get with the program here.
Re:speak for yourself (Score:2)
Relax, my man (Score:4, Funny)
Hey, this is Slashdot, my friend! We post things two or even three times just to ensure that our faithful geek readership doesn't miss a beat on the latest and greatest technology news of the past 48 hours^H^H^H^H^H^H^H^Hweek^H^H^H^Hmonth^H^H^H^H^H year!
Re:Relax, my man (Score:2)
Possible Use for detecting detecting software? (Score:3, Interesting)
Re:Possible Use for detecting detecting software? (Score:3, Interesting)
Stratum8 Networks [stratum8.com] , perhaps? (Disclaimer -- I work there, so I'm not unbiased.) :)
why not in software? (Score:5, Interesting)
Do it at higher level anyway (Score:3, Insightful)
Re:why not in software? (Score:2, Insightful)
Eventually, yes, a smart person will make a software version of this (that's the outcome of it all). But the reason they use hardware is to make life harder. Maybe even impossible (if enough effort were to go into the hw design).
In other news (Score:5, Funny)
"ClipperNet 11 is an innovative new product that allows us to provide our civilian customers with the advantages of secure wireless communications," said an NSA spokesperson. "With Type 1 Encryption, NSANet 11 meets the Department of Defense's stringent requirements for wireless transmission of both classified and unclassified information."
When asked whether the product had any relationship with the Clipper chip proposal of the mid 1990's, the NSA declined to comment. "Er, emm ... we don't have any comment on that", said one NSA spokesperson, who was last seen leaving hastily.
"Don't worry", a Harris spokesperson said. "We would never even think of embedding any technology into our products that would make it possible for secret government agencies to read the encrypted data stream, and we would certainly never use any information gained in that way for marketing purposes. Trust us!"
Harris shares were up 2 3/4 points today.
Re:In other news (Score:2, Informative)
Anyone want to guess? (Score:3, Funny)
Anyone want to guess what the WarChacking Symbol for this would end up being? Mabye a secure network symbol a barbed wire? Condom? gun? Handcuffs?
Re:Anyone want to guess? (Score:2)
Secrecy (Score:5, Funny)
So even their spokespeople are unidentified?
Warfighter? (Score:2, Funny)
Warfighter? Holy Doubleplusgood Newspeak, Batman!
Because, you know, it's important to distinguish between the warfighters and the warsitontheirassesbitchingaboutcivillibertyers.
Or maybe this is some sort of subtle dig at wardrivers. "Those bandwidth-thievin' pinkos DRIVE around with their wireless rigs! Real men use new technology for FIGHTING!"
Interesting (Score:2, Troll)
One would hope so, but you never know.
not inevitable (Score:2)
expensive network kit (Score:4, Informative)
The pc card's are $2500.
Wap's are $1000.
I think I'll stick to VPN over 802.11
Source of pricing is www.govcomm.harris.com/secure-comm/support/pricel
Ok, so what can WE use.... (Score:2)
Re:Ok, so what can WE use.... (Score:2)
Re:Ok, so what can WE use.... (Score:2)
Newsflash (Score:4, Funny)
Re:Newsflash (Score:3, Funny)
I would be *extremely* surprised (Score:2)
There's that secure wireless oxymoron again (Score:4, Interesting)
If they have good reason at all to be that paranoid about a wired LAN, I think it won't take long for this "secure" wireless thing to come back and bite the NSA.
PCMCIA still good?? (Score:3, Insightful)
(I imagine it wont be long before you won't be able to buy a MB with PCI; VLB started out as a purely graphics bus (VESA local bus) and it wasn't long before it was used for SCSI, Multi IO and probably others. Were there ever VLB NICs?
With this history it is a little surprising that manufacturers arn't producing multi-AGP boards and SCSI cards etc on AGP, eventually replacing PCI.
I know its not an exact match, and maybe theres something about the AGP standard that makes this impossible, but you get the picture;
Market saturation requires forced obsolescence and upgrade fever to achieve constant economic growth. Any stability spells doom for the market for some reason; its a self destabilising system. Any trends of economic stability as opposed to economic growth causes instability and either growth or shrinkage, thereby producing instability again.
I dunno about the commas in those sentences. Feel free to rearrange them to taste.
Re:PCMCIA still good?? (Score:2)
Re:PCMCIA still good?? (Score:2)
We're talking gigabits/sec of "push" bandwidth (textures, etc. to the graphics card) and sometimes as few as megabytes or even kilobytes of "pull" data, reading back from the AGP card. It wasn't designed with sending data back, it was designed to take data as fast as the host system can throw it off and process it.
Additionally, a dual-AGP controller wouldn't work because it is connected too directly to the CPU and Northbridge. NICs branch off the PCI bus, attached to the Northbridge; AGP has its own lines on the Northbridge. More AGP slots, the Northbridge is going to run into bandwidth problems, and it is frequently already the bottleneck in the highest of performance gaming machines.
NSA Press Release (Score:5, Funny)
This is great! (Score:3, Interesting)
We're gonna get it now... (Score:2)
What about system accreditation? (Score:2, Interesting)
In my experience with security organizations, they tend to overemphasize the role of physical safeguards in designating a system as "secure," especially when it comes to COMSEC. How will they feel about accrediting a system in which multiple COMSEC units can be moved outside of a secured perimeter?
So what? Even the phone book is classified! (Score:4, Interesting)
Most readers missing the point... (Score:5, Interesting)
You can't, for example, get a Linux box approved to process SECRET information (at least, last I checked). Windows is approved, however. Yet, for the commercial user, I would say that Linux is more secure than Windows. What matters is how the system is set up. I'm kind of surprised that there's any demand for wireless networking at the SECRET level. With few exceptions, a classified box has to be physically disconnected from all other machines and operate only from hard drives with no communications software on them. There was an article [cnn.com] on cnn.com today about a hacker who got access to sensitive but not classified information on military networks. The reason he didn't get access to classified information is because of the way it's protected.
And forget about anything at the TOP SECRET level or above. We have a room at the office that does work at the TS level. If you bring a disk in there, you can't leave with it. If you bring a hard drive in there, it can't leave the room. Once a computer goes in there, it can't leave either. Well, that's not entirely true...security chops them up into little tiny pieces, waves magnets over them, and does some other magic to make them completely clean before they can leave. They're certainly never useable again. They even destroy the monitors before removing them from the room, in case an image might be burned into them.
Anyway. People who deal with SECRET information will probably be interested in this article, and I'm sure life will go on with no change for those who don't.
I hope they did their homework. (Score:2)
SECRET information might not be as dangerous a loss as the higher level stuff, still, going wireless, to me anyway, means broadcasting...and sniffing...and recording...and analyzing...lots different from copper or fiber in a shielded, isolated, locked down environment.
AES is coming to WLAN (Score:2)
Each of these methods rely on the fact that you won't be able to reverse a known packet back to its plaintext. (relying on the fact that AES is not easily reversable).
That article was complete marketing speak too. "11mbs!" the effective rate of a WLAN these days is maximally in the high 6's or 7's if you all use short preamble. With long preamble, the effective rate is in the 5's to 6's.
Hedley
Some highlights (Score:2, Interesting)
Some highlights:
Let's face it, it's a pain to set up IPSEC on all your boxes...
Clarification on military networks (Score:5, Informative)
I decided to write this because I often see misconceptions of military networks on slashdot.
I have been a network administrator in the U.S. Air Force for 5 years. I have administered classified networks in Asia, Europe, the Middle East and the U.S. I have worked on Air Force and Army networks.
(1) The basic levels of classification are:
Unclassified
Confidential
Secret
Top Secret
There's some gray areas between and above but those are the basics
(2) You can process classified information on almost any platform you want. Top Secret on DOS, no problem. Windows 95, every day. Linux, sure. The big restrictions come when a computer is connected to both classified and unclassified networks. In that case the machine must be trusted to differentiate between the classifications. It must make sure that only Unclass was writted to the disk you're going to carry over to the unclassified network.
(3) Classified information, once properly encrypted, is no longer classified and you can pretty much do you what you want with it (put it on your t-shirt, print it on a flag and wave it, blast it in to space, send it over the internet, whatever)
(4) Because of the above, wireless and classified are nothing new. Radios, wireless networks, satellite phones, all of the them are used to transmit classified information.
(5) Moving classified information over unclassified networks is old news and several devices already exist. Devices like the NES (Network Encryption System) and the TACLANE are used to plug in to a classified network, encrypt and encapsulate the data, then move that data over an unclassified network.
http://www.fas.org/irp/program/security/_work/k
(6) What this new device offers is conveniance. Previously to run a network over a wireless link the procedure went something like:
Connect computer/network to DTE/DCE device
Connect DTE/DCE device to crypto
Connect crypto to wireless transmission medium
These steps needed to be completed for both sides of each link. It is slow, complicated, and expensive.
(7) Why not use IPSEC? It's complicated and not NSA certified. You should be able to give crypto to a user and only explain three things to them; in, out, power. Nothing to misconfigure, either it works or it doesn't, no chance of classified spillage.
(8) Why doesn't someone with access just take this thing apart and figure out whatever? This product is likely a CCI (controlled cryptographic item). Opening CCI without certification/authorization is illegal. Besides, without disecting the chips, how much are you really going to learn?
(9) The NSA must have a back door built in, right? No. A back door built in for them would be vulnerable to anybody. I highly doubt we would move national security information over a wireless network with a back door. If you're using their encryption keys, they have a copy and can read the info anyway. If you're not using their encryption keys, then you don't have one of these devices.
(10) Isn't someone going to crack this in a week? No. NSA certified encryption is good and well tested. We still routinely send Top Secret information over 10 year old encryption devices. If they had been compromised, we wouldn't be using them. The information sent from this device is encrypted. Without the same encryption key, you can't communicate with the device. Period.
(11) What about sniffing packets and breaking the key? Go ahead and try. Encrypted information has been floating around in the air for years and years. Multimillion man armies have been sniffing and recording and trying to break for decades. They keys change often. Sure, someone might (if they were lucky) break one key in ten years, but many devices get a new key every day.
I'm sure I left some stuff out and there are faults in my knowledge and spelling. If you have any questions, post and I will try to answer them.
Point to Point or Multipoint-Capable (Score:2)
It's much easier to create a shared domain than it is to create a dynamic key mesh (presuming there's no pubkey stuff at work, and even then things get tricky). One shortcut is simply to provide keys to the upstream router, and let the router sniff all traffic (and experience the cost of routing traffic between endpoints). My bet is that this is what's done.
Anyone know?
--Dan
www.doxpara.com
MAIN NSA COMSEC ACCOUNT (Score:3, Interesting)
The main NSA COMSEC Account is 880099, and its address follows:
Re:it's not worth the money b/c... (Score:2)
Re:it's not worth the money b/c... (Score:2)