An Overview of Wireless Network Security Introduction

advertisement
An Overview of Wireless Network Security
ITNW 2313 – Networking Hardware
Prof. Michael P. Harris, CCNA, CCAI
Introduction
Networks carry all sorts of confidential data, so security is a highly important part of
any wireless network structure. Security ensures that the same level of data integrity
and confidentiality as a wired network are maintained. Without properly implemented
security measures, any wireless network adapter coming within range of another
network adapter or access point can join the network. The amount of non secure
wireless access points is alarming – a recent study showed how over 90% of Access
Points have little or no security enabled. I once did a little research of my own and
found that 3 out of 5 of the public access points I checked had either no security at all
or WEP - which allowed me to crack the key within 15 minutes using freely available
tools on the Internet.
So why is there such a high lack of security? Well, I would say it’s probably down to
laziness and lack of knowledge; people are not aware of these things. Especially in
small companies and at home, people tend to have the “so long as it’s up and
running” attitude which means that if after using the wireless setup wizard they are
able to browse the internet or access files remotely from a wireless device then all is
well… BIG mistake! To overlook wireless security is like leaving the front door to your
house permanently open. Without any - or little - security that’s essentially what
you’re doing; allowing anyone in range to sniff your network packets, read your emails, use your internet for free, and even gain access to your files.
With the introduction of push-button security for home user products, we can expect
to see an increase in the implementation of wireless security among wireless router
users. The main aim behind push-button security is to provide a simplified and
enhanced method of setting up and building a home network. With so many people –
particularly home users – failing to notice the importance of security as part of their
wireless network building, push-button becomes a means of enabling some form of
security with a click of the mouse or touch of a button. While one may begin to
question the strength of such security, another will remind you that something is
better than nothing at all!
If you’re reading this and still use WEP, check for a driver and/or firmware update for
your hardware and, if possible, change to WPA security now! Also, keep in mind for
the next time you purchase new hardware, make sure the product supports WPA TKIP
at the very least.
Wireless Security Threats
What are the threats that we face today with regards to wireless networks? An
informative list has been compiled by the National Institute of Standards and
Technology as part of their documentation on Wireless Security. Hereunder is an
extract from that document.
To date, the list below includes some of the more salient threats and vulnerabilities
of wireless systems:















All the vulnerabilities that exist in a conventional wired network apply
to wireless technologies.
Malicious entities may gain unauthorized access to an agency’s computer
or voice (IP telephony) network through wireless connections,
potentially bypassing any firewall protections.
Sensitive information that is not encrypted (or that is encrypted with
poor cryptographic techniques) and that is transmitted between two
wireless devices may be intercepted and disclosed.
Denial of service (DoS) attacks may be directed at wireless connections
or devices.
Malicious entities may steal the identity of legitimate users and
masquerade them on internal or external corporate networks.
Sensitive data may be corrupted during improper synchronization.
Malicious entities may be able to violate the privacy of legitimate users
and be able to track their physical movements.
Malicious entities may deploy unauthorized equipment (e.g., client
devices and access points) to surreptitiously gain access to sensitive
information.
Handheld devices are easily stolen and can reveal sensitive information.
Data may be extracted without detection from improperly configured
devices.
Viruses or other malicious code may corrupt data on a wireless device
and be subsequently introduced to a wired network connection.
Malicious entities may, through wireless connections, connect to other
agencies for the purposes of launching attacks and concealing their
activity.
Interlopers, from inside or out, may be able to gain connectivity to
network management controls and thereby disable or disrupt operations.
Malicious entities may use a third party, un-trusted wireless network
services to gain access to an agency’s network resources.
Internal attacks may be possible via ad hoc transmissions.
As with wired networks, agency officials need to be aware of liability issues for the
loss of sensitive information or for any attacks launched from a compromised
network.
~ Source: NIST, United States of America
As you can see, there are vulnerabilities on all levels, some of which wouldn’t
normally come to mind, so we must be prepared for the worst and not take anything
for granted. One prime example would be, with reference to the above point about
how handheld devices are easy stolen - we can take the simple preventative measures
to combat such a threat. Don’t carry round highly sensitive information on your
portable device; only take what is absolutely necessary. Leave other data on the
corporate or home network, or on a removable storage media. Also, if available,
enable the auto lock feature (with a password) and add a PIN number to the device;
so that when you switch it on, you will have to enter a Personal Identification Number
before it starts up.
Wireless Security Considerations
The following are a few things you need to ask yourself when implementing security
for your wireless network.






Do I have some form of logging enabled? Logging is important as it will help you
to trace who is trying to gain unauthorized access to your network. It will also
act as evidence when prosecuting a suspected intruder in court.
Do I allow guest access? If you do then be sure to separate your corporate
network from the WLAN by placing the WLAN in your DMZ or outside the
network and implement a firewall between them. Also, don’t forget to log and
audit guest user activity so that you can see if any abuse is taking place.
Where does my wireless signal end? Perform a site survey and find out exactly
where the signal starts and ends; know your boundary.
Do I know what’s on the network? Document everything and when a new access
point is attached to the current network make sure you know about it. In larger
companies, departments implement their own WLAN by adding an access point
to the network and not informing the administration department, thus
potentially opening up a hole in the network.
Have I performed a Wireless LAN security audit? Make sure you scan your
network to identify known vulnerabilities, and if any are found, take action as
soon as possible!
Are the wireless clients safe? Introduce, or amend a current security policy that
will require mobile users to keep their laptops protected with antivirus and
firewall software.
Tips for Securing your Wireless Network
There are a numbers of things you can keep in mind which will help to lessen the
likeliness of a breach of security in your wireless network. I have compiled a list of
tips that I think will be of use to anyone who has a wireless network.









As should be the case with a wired network, only share what is needed. Don’t
share entire partitions, share folders instead. Also, depending on the level of
confidentiality, you should always password protect anything that is shared
using an archive tool.
If you’ve implemented the WEP authentication method, be sure to use the
Shared Key method, every so often change your WEP keys and make them as
difficult as possible.
Be sure to secure your wireless access point with a strong password; don’t just
leave the default one in place!
Disable access point administration via wireless clients. This means that any
changes to the access point configuration would have to be done from a
machine attached to the wired network.
On smaller networks, use MAC address filtering as an added means of security.
Don’t rely on this feature alone but use it in conjunction with another security
method.
Change the default SSID to something that is understandable to you but not to
outsiders. This will make it slightly more difficult for people to connect to your
network. Be sure to change it to something that won’t give too much
information away about your network.
Disable SSID broadcasting. This feature is meant to make it easier for clients to
connect to the network because the network name can be automatically
discovered by the client operating system. This means anyone in range of your
access point will automatically know your network exists.
If you need wireless access in your building alone, try putting the access point
in the centre of the building to decrease the chance of a wardriver* being in
range of your signal.
If you’re willing to see a dip in speed then using a VPN would be the more
secure option for a wireless network. This is fairly quick and easy to setup and
has great benefits, as opposed to other means of security.
* A wardriver is a person who roams around with his/her laptop to gather information
about a wireless system.
Types of Security
SSID (Service Set Identifier)
An SSID, or Network Name (like a Windows networking Workgroup name), is a
“secret” `@grin` name given to a wireless network. I put secret in inverted commas
because it can be sniffed pretty easily. By default, the SSID is a part of every packet
that travels over the WLAN. Unless you know the SSID of a wireless network you
cannot join it. Every network node must be configured with the same SSID of the
access point that it wishes to connect, which becomes a bit of a headache for the
network administrator.
WEP (Wired Equivalent Privacy)
Developed in the late 1990s, WEP is a basic protocol that is sometimes overlooked by
wireless administrators because of its numerous vulnerabilities. The original
implementations of WEP used 64-bit encryption (40-bit + 24-bit Initialization Vector).
By means of a Brute Force attack, 64-bit WEP can be broken in a matter of minutes,
whereas the stronger 128-bit version will take hours. It’s not the best line of defense
against unauthorized intruders but better than nothing and mainly used by the
average home user. One of the drawbacks of WEP is that since it uses a shared key, if
someone leaves the company then the key will have to be changed on the access
point and all client machines.
WEP2 (Wired Equivalent Privacy version 2)
In 2004, the IEEE proposed an updated version of WEP; WEP2 to address its
predecessor’s shortcomings. Like WEP it relies on the RC4 algorithm but instead uses a
128-bit initialization vector making it stronger than the original version of WEP, but
may still be susceptible to the same kind of attacks.
WPA (Wi-Fi Protected Access)
WPA provides encryption via the Temporary Key Integrity Protocol (TKIP) using the
RC4 algorithm. It is based on the 802.1X protocol and addresses the weaknesses of
WEP by providing enhancements such as Per-Packet key construction and distribution,
a message integrity code feature and a stronger IV (Initialization Vector). The
downside of WPA is that unless your current hardware supports WPA by means of a
firmware upgrade, you will most likely have to purchase new hardware to enjoy the
benefits of this security method. The length of a WPA key is between 8 and 63
characters – the longer it is the more secure it is.
WPA2 (Wi-Fi Protected Access version 2)
Based on the 802.11i standard, WPA2 was released in 2004 and uses a stronger
method of encryption – AES (Advanced Encryption Standard). AES supports key sizes of
128 bits, 192 bits, and 256 bits. It is backward compatible with WPA and uses a fresh
set of keys for every session, so essentially every packet that sent over the air is
encrypted with a unique key. As did WPA, WPA2 offers two versions – Personal and
Enterprise. Personal mode requires only an access point and uses a pre-shared key
for authentication and Enterprise mode requires a RADIUS authentication server and
uses EAP.
MAC Address Filtering
MAC Address Filtering is a means of controlling which network adapters have access
to the access point. A list of MAC Addresses is entered into the access point and
anyone whose MAC address on the wireless network adapter does not match an entry
in the list will not be permitted entry. This is a pretty good means of security when
also used with a packet encryption method. However, keep in mind that MAC
addresses can be spoofed. This type of security is usually used as a means of
authentication, in conjunction with something like WEP for encryption. Below is a
basic image demonstrating the MAC Address Filtering process:
A laptop, with MAC Address 00-0F-CA-AE-C6-A5 wants to access the wireless network
via the access point. The access point compares this Address to its list and permits or
denies access accordingly.
VPN (Virtual Private Network)
Perhaps the most reliable form of security would be to setup a VPN connection over
the wireless network. VPNs have for long been a trusted method of accessing the
corporate network over the internet by forming a secure tunnel from the client to the
server. Setting up a VPN may affect performance due to the amount of data
encryption involved but your mind will be at rest knowing your data is secure. The
VPN option is preferred by many enterprise administrators because VPNs offer the
best commercially available encryption. VPN software uses advanced encryption
mechanisms (AES for example), which makes decrypting the traffic a very hard, if not
impossible, task.
For a clearer understanding of the VPN link method, see the image below.
There are various levels of VPN technology, some of which are expensive and include
both hardware and software. Microsoft does however provide us with a basic VPN
technology – commonly used in small to medium enterprise networks - Windows 2003
Advanced Server and Windows Server 2008. These are more than capable of handling
your wireless VPN requirements.
802.1X
With 802.1X the authentication stage is done via a RADIUS server (IAS on Windows
Server 2003/2008) where the user credentials are checked against the server. When a
user first attempts to connect to the network they are asked to enter their username
and password. These are checked with the RADIUS server and access is granted
accordingly. Every user has a unique key that is changed regularly to allow for better
security. Hackers can crack codes but it does take time, and with a new code being
generated automatically every few minutes, by the time the hacker cracks the code it
would have expired. 802.1X is essentially a simplified standard for passing EAP
(Extensible Authentication Protocol) over a wireless (or wired) network.
Below is an image showing the 802.1X process.
The wireless client (laptop) is known as the Supplicant. The Access Point is known as
the Authenticator and the RADIUS server is known as the Authentication server.
General Tips and Tricks








When purchasing a wireless NIC card, try and get one that can take an external
antenna. This will allow you to change it for a stronger one if ever required.
When you are out and about with your Wi-Fi enabled laptop, disable Microsoft
File and Printer sharing (which enables other computers to access resources on
your computer) so as not to leave your computer vulnerable to hackers.
If you are concerned about the interference from other Wireless Access Points
or wireless devices in the area, set the AP and wireless clients to use a nonoverlapping channel such as 1, 6 or 11.
Change the configuration interface password of the access point before you
enable it. This is more common sense than a tip but most people overlook this
part of setting up a wireless network.
Only buy an access point that has upgradeable firmware. This will allow you to
take advantage of security enhancements or interface updates.
On the same note as above, keep the access point firmware up to date.
Upgrade your firmware whenever a new one is available. It will probably
consist of a new or improved feature.
When you are not using Wi-Fi on your Wi-Fi enabled laptop, turn it off. As well
as protecting yourself from hackers you will be saving battery power.
From time to time, scan the area for rogue access points. If an employee went
out and bought a cheap AP and NIC card, and plugged it into the corporate
network behind the firewall then all your hard work securing the network will
go out the window. This is commonly seen on university campuses where
students purchase hardware and setup a rogue access point in their dorm
rooms.
News and Statistics
Even though the approval of 802.11n is pending, hardware manufacturers such as
Belkin have already started to offer Pre-N routers and wireless network adapters.
These offer improved network speed and range which would benefit users who wish to
transfer larger files and stream audio/video. With Pre-N, an Access Point and Wireless
NIC Card 10 feet away from each other have an average throughput of about 40mbps.
Hardware vendors, such as Linksys and D-Link have also announced the use of MIMO
(Multiple- In-Multiple-Out) in their products. MIMO allows the signal to be bounced
off several antennas and paths so that data delivery is guaranteed. Basically, many
unique data streams are passed in the same frequency channel. It is a technology that
allows for the boosting of wireless bandwidth and range, effectively providing better
performance for wireless multimedia and entertainment systems.
The Wi-Fi market is booming with over 98% of all laptops shipped in 2009 being Wi-Fi
enabled.
In the last quarter of last year, Wi-Fi hardware revenues grew by 17% over the
previous year.
Guest access looks set to be a key requirement for enterprises. The ability to send
and receive mail and access information on the enterprise servers while attending a
meeting at another company is a major plus for mobile workers.
Wireless data revenues are set to grow to 130 billion US Dollars within the next few
years.
60% of hotels in the tourism industry deploy WI-FI themselves, without using a service
provider. They usually bill it to the room or offer it free as an amenity to guests.
In a recent Poll, forty per cent of people said they would buy a cell phone with Wi-Fi
and only twelve per cent said they would want to get TV on their cell phone. The
possibility of using voWLAN (Voice Over Wireless Local Area Network) is appealing to
many business users. This would allow someone to use GSM while out and about and
switch to voWLAN as soon as they step back into the office.
Conclusion
That concludes my overview of wireless security article. We took a look at why
security is so important for wireless networks, I gave you some general tips for
securing a network and showed you the different threats that one may face. Despite
what most people think, a wireless network can be secure. However, there is a dire
need for better education and stronger security implementations.
Download