The Year 2003 in Wireless Network Security 66
OenMarK writes "I ran into an article that is basically an overview of events, software releases, and happenings related to wireless security. There's also a Q&A with some wireless security experts, one of which is from IBM.
What's your take on wireless security? Are we there yet?" This is the same site that also hosts the look back at Linux security we posted earlier. They complement each other well.
Re:THINK ABOUT YOUR BREATHING! (Score:1)
At the very least, wireless security... (Score:3, Funny)
Not a very informative article. (Score:5, Insightful)
A study of honeypot projects that showed most wi-fi abuse was "bandwidth stealing" doesn't exactly fill me with a sense of dread. More useful would have been a list of attempts hackers sitting outside of unsecured businesses trying to get at the corporate data.
Or are they trying to lull potential customers into a false sense of security?
Re:Not a very informative article. (Score:2)
A study of honeypot projects that showed most wi-fi abuse was "bandwidth stealing" doesn't exactly fill me with a sense of dread.
Maybe it should. With the current state of "Internet crime" paranoia, having a wide-open anonymous access point, while not yet comparable to lending your gun to strangers on the street, might well be compared with leaving the keys to the ignition of your car with the exception that you know whoever takes it will bring it back.
Wireless? security? (Score:1)
Wireless and security seem to be two words that are mutually exclusive these days, it would seem: between cocky administrators not securing their wireless networks, that few networks seem to be using WEP and huge bugs in phone's implementations of bluetooth...
Know anyone who trusts WiFi? I don't. Even my university doesn't (and it isn't well known for good security practise). Useful, but slightly untrustworthy.
VPN... (Score:5, Informative)
Re:VPN... (Score:4, Informative)
Jon.
Re:VPN... (Score:3, Informative)
Anyone who has done any significant work with large-scale wifi infrastructure knows this, any form of VPN will eat 20-30% of your bandwidth away just for itself. This is very bad for networks with hundreds (thousands) of users, like large corporations and universities.
In cases like those, WPA/Radius is a better implementation, or you can use CISCO proprietary LEAP (i think..). They wont eat your bandwidth for breakfast, but they will provide s
Re:VPN... (Score:2, Informative)
You forgot a few things (Score:2)
Always use backend security (Score:3, Informative)
Wireless security is an oxymoron (Score:3, Insightful)
Wireless has no such limits. This is even skript kiddie level stuff.
This is my report on it. [punkwalrus.com]
Re:Wireless security is an oxymoron (Score:2)
Re:Wireless security is an oxymoron (Score:2)
I envy your faith.
Re:Wireless security is an oxymoron (Score:2)
Easy Setup and Mantainance of Security is Key! (Score:5, Insightful)
1. Change the default SSID.
2. Disable SSID Broadcasts.
3. Change the default password for the Administrator account.
4. Enable MAC Address Filtering.
5. Change the SSID periodically.
6. Enable WEP 128-bit Encryption. Please note that this will reduce your network performance.
7. Change the WEP encryption keys periodically.
Now your telling me average joe (or administrator) is going to preform all these tasks, and remember to regularly change the WEP encryption keys. This is a problem, and until security setup and mantainance is automated and/or easy enough for the everyday folk, there is going to be a continual growth of attacks on these type of networks.
------------
Re:Easy Setup and Mantainance of Security is Key! (Score:2)
But we live in this universe, with these laws of physics.
Yes, a compute
Re:Easy Setup and Mantainance of Security is Key! (Score:2)
As I just demonstrated, it just takes a little effort to come up with a solution or workaround to a problem.
Engineering takes those laws of physics and makes practical things h
Re:Easy Setup and Mantainance of Security is Key! (Score:1)
KFG
Re:Easy Setup and Mantainance of Security is Key! (Score:1)
Some Physical Step should be required (Score:2)
Networking devices should create and change their own WEP keys automatically. I know my mother certainly isn't going to change it frequently if at all, and if so it will be her kids names or something.
The device would have MAC Address filt
Are we there yet? (Score:5, Interesting)
1) 802.11i is still not yet approved as a standard
2) WPA (the impetuously released TKIP variant) is not widely available and like 802.11i relies on 802.1X.
3) 802.1X has been withdrawn by the IEEE pending a re-write. Its broken for wireless. Don't expect to see the revision any time soon.
4) No semblance of a seamless, inter operator, inter hotspot, non web-pagey user authentication scheme for mobile devices is widely deployed for 802.11.
5) Other wireless networks that are deployed are insecure (E.G. GSM)
I think maybe there's a way to go yet.
2003 was the start, and 2004 will be the explosion (Score:3, Insightful)
I see a couple of trends on the horizon:
1. Just as you can no longer buy a 10mbit hub, because a 10/100 switch costs pennies more to make, soon all home cable/DSL routers will come with 802.11b at the very least. The "premium" models will include g for $5-10 more, to keep some price differentiation happening.
2. Back when it was us geeks and businesses, the WEP/non-WEP ratio seemed to hover around 50-75%, depending on area. Driving around last night, it's below 10%. This could be an indication of new xmas presents that the owner hasn't had time to configure, but really: how many people actually change from the default settings? (On that note, thank you SMC for having a blank default password and an SSID of "SMC"
Just the changes in the past 12 months have convinced me that 2004 will be the year wireless really takes off everywhere up here, and as long as it's still being shipped unsecured to the consumer, we're soon going to have a LOT more opportunity for this [canoe.ca] sort of thing.
WEP has its uses (Score:3, Insightful)
I've checked out the range on my AP using some nice high-gain antennas, and seeing as it's in the basement, someone would have to be within 3
Re:WEP has its uses (Score:2)
My wireless network is now totally secure (Score:3, Insightful)
No more worries about wireless security alerts, finicky configurations, key management, weird drivers, setting up VPNs within my own house, strange network freezeups or having to read articles to keep on top of it all.
To me, keeping my mind uncluttered and free from all that minutia is worth the ugliness of a few network cables.
Re:My wireless network is now totally secure (Score:2)
I can keep up with the minutia. I don't want to. I've got better things to do with my time.
You must not be running linux huh? ....
OS is irrelevant. Linux, Windows, OpenBSD... I've used wireless adapters on all of them and they all have configuration and security problems to worry about.
Physical perimeter security on 802.11 (Score:2, Interesting)
Most people assume that wireless security cannot be coupled to physical security. If you can keep
Re:Physical perimeter security on 802.11 (Score:1)
a) It's not triangulation, because as you might guess, triangulation on 802.11 is extremely problematic because of occlusion, reflection and multi-path issues. That said, thinking of it in terms of triangulation isn't way off. It is definitely reliable enough to use as a layer of authentication. Depending on the deployment, the accuracy and precision can be quite high (sub-meter). Of course, even in those cases, we always recommend the use of other authentication mechanisms as well. Sec
China to Split Wi-Fi Security Standards (Score:3, Informative)
In any case, it is a dramatic development.
Access control (Score:1)
The most common solution to this for now seems to be to do some magic with DHCP, iptables, etc. to force the user to a web page where they authenticate themselves before giving them normal network access. I'd prefer we could
Confused (Score:2)
Rely on software not the hardware: always use VPN. (Score:1)
So yes I have WEP and MAC filters turned on my Home Wireless but the Access Point (infrastructure mode) is on its own DMZ LAN and plugged i