Wireless Security

Notes from the tutorial at Usenix Security 2002

A good general security aphorism: When your system depends on everyone adhering to the rules in order for it to work, it is open to attack.

Wireless policy

We should have a clearly stated policy, findable on the security site and the policy page, about not putting up rogue wireless access points, and why it's a bad idea to do so. Also we should give information about wireless security issues and the need for end-to-end encryption.

Exposures to consider with wireless

WEP

Purpose is to provide Wired Equivalent Privacy -- i.e., (only) the level of privacy you'd get if using a wired connection. However, it fails to achieve this. RC4 encryption would work fine but not implemented correctly. Note again that WEP only protects transmissions in the air.

One thing that stops people from using WEP is that there is no mechanism for sharing keys between Access Points. Each Access Point must be contacted separately to manage keys. This contributes to either not using WEP at all, or never changing the keys once established.

WEP is flawed even if it worked well encryption-wise. For performance reasons, it doesn't encrypt the SSID and in general doesn't encrypt management packets. SSID=Service Set Identifier, an identifier attached to packets sent over the WLAN that functions as a password for joining a particular radio network (BSS, "basic service set"). All radios and access points within the same BSS must use the same SSID or their packets will be ignored. Note that wireless configuration information, including WEP key, is either stored on the card itself (and therefore stealable by stealing the card) or stored locally on the system -- and again stealable by either breaking in or by stealing the laptop. Cisco stores information on the card; Lucent stores it locally on the system -- under Windows it's stored in a world-readable registry key!

Most implementations use the default SSID anyway, so sniffing it or locating it on the system or card isn't necessary. See www.wi2600.org/mediawhore/nf0/wireless/ssid_defaults for a list.


Lots of problems with WEP

So, you don't need to steal the card or look at the WEP key on the local hard drive, registry, wherever - you can trivially derive it.

Current 802.11b authentication options

Current 802.11b Authorization
MAC layer. Can configure the AP to talk only to specific MAC addresses. This controls access to the wired network, note, not the wireless portion.

WEP keys are totally insecure because it's easy to obtain the key. However, for knob-rattlers and other casual intruders (script kiddies), WEP is substantially better than nothing, since it makes the difference between some (small) effort and no effort. It is currently so unused that no one bothers to exploit it - there are too many totally unsecured wireless networks around to make even the trivial effort involved worthwhile. It can still help protect against casual snoopers and bandwidth theft.

Note about security model with wireless in general: in the wireless phone/pager service world, security meant prevention of fraud - protection of provider's ability to bill users and get money. NOT protection of user privacy, or user anything, particularly data.

Terminology
An access point typically connects wireless with wired networks. If it connects two wireless nets, it's technically an "extension point".

Things to watch out for with implementation

Access Point placement - because channels are spaced at 5Mhz, while bandwidth itself is 22Mhz (FCC specification), you can get interference if you have 2 channels right next to each other. Roaming can be achieved by having slightly overlapping AP areas, using *different* channels.
Can increase capacity and bandwidth by:

Note that you can really have only three AP's in the latter setup, because only three channels can be used in the same space without some overlap & interference.

Two most common mistakes made: not changing the default SNMP community strings and the default SSID.

Best practices

Differences between the 802.11x's

802.11a is closer to completion now than 802.11g (still 2.4Ghz range, but more efficient data transmission), but probably will never completely replace 802.11g or b. For one thing, in some countries the 5Ghz spectrum is licensed, sometimes by the military. It also uses more power than the other two. However, new plasma light bulb technology, 75% more efficient, operate in 2.4Ghz range, so may help drive adoption of 802.11a in some areas, since operation of these lights would crater an 802.11g or b WLAN. Note that neither 802.11g *nor* 802.11a is likely to be usable as a simple firmware upgrade for wireless equipment. Simply too different from 802.11b.

The Future

Planned improvements to WEP

Robust Security Network (RSN)/ Enhanced Security network (ESN) = same thing, two names.

Defined in 802.11 Security Baseline. RSN security consists of two basic subsystems, TKIP or AES for data privacy (note that the AES-based wireless encryption protocol hasn't been defined yet); and security association management for improved security negotiation procedures, authentication, and key management.

Roaming

Questions to ask vendors regarding support for 802.1X

Resources

Netstumbler = utility for finding wireless networks and access points (and SSIDs), doesn't sniff data traffic: www.netstumbler.com
Note: you can configure an AP not to respond to probe packets such as those used by netstumbler. By default they do respond. Users will need to know the SSID prior to using the wireless net, then, since the AP won't tell it to them.

NAI has a commercial wireless sniffer that records everything.

Cellular: I am ignoring this for my notes. Good places for technical information about cellular: www.privateline.com/Cellbasics/Cellbasics.html and www.howstuffworks.com/cell-phone.htm
One note about WAP, though: "gap in WAP" is that WAP handset to WAP server is WTLS, WAP server to Internet is SSL, but locally on WAP server, once data is decrypted it is exposed until re-encrypted with SSL. So, whoever controls WAP server has access to everything.

Cisco VPN (but not our 5000 series) will ultimately support mobile PDA clients.

Here is a good list of 10 things to do to make your wireless network more secure.

* A note about MAC authentication - try looking in card properties under Advanced. MAC address has a handy field you can fill in to set it to whatever you want!