Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Privacy

NASA Overcomes 802.11b Wireless Security Flaws 111

4mn0t1337 writes: "Looks like the people at NASA came up with a "solution" to the weak secrutity in 802.11: Bypass it. From the article: "The team also assumed that all information on the network would be subject to eavesdropping, and that no identification information built into 802.11b could be trusted." So they chose to disable it, and set up an 'off-the-shelf PC running the OpenBSD operating system, an Apache web server, the Internet Software Consortium DHCP server, the IPF firewall software' and just depend on the security in protocols the services use. Moral of the story: Ignore the 802.11 security and just tunnel into our access points ..."
This discussion has been archived. No new comments can be posted.

NASA Overcomes 802.11b Wireless Security Flaws

Comments Filter:
  • Re: insecure? (Score:5, Informative)

    by Bodero ( 136806 ) on Saturday September 01, 2001 @11:38AM (#2243100)
    I love how everyone is spouting "wireless is insecure" but give no real details on how that is.


    The real details are not too hard to find...30 seconds with a search
    engine came up with quite a few references, including:

    http://www.cs.umd.edu/~waa/wireless.pdf [umd.edu]

    That document contains a fair number of bibliographical references
    which you might find interesting.


    The principal problem I've found with wireless security is that lots
    of people deploy it poorly - effectively allowing anyone nearby to
    "plug" into their network. Most of the news articles about hacking
    wireless networking are about this kind of insecurity. The implication
    is that when you set up a wireless network you need to use WEP to
    encrypt the connection.


    Some of the more alarming articles suggest that WEP is weak, and so
    can't really be relied upon. If this is correct, then it means one
    must use encryption at a higher level - which is not a trivial
    undertaking. If you can't deploy IPSEC thoughout your network, you'll
    have to put your wireless access points outside of your firewall and
    use VPNs to get in.

  • Re: Bluetooth (Score:5, Informative)

    by Bodero ( 136806 ) on Saturday September 01, 2001 @11:42AM (#2243107)
    It's sure to give both Bluetooth, which was gasping for breath, and HomeRF, which was on a respirator, renewed leases on life. If the powerline networking gear arrives by year end and works as advertised, it will probably win the battle.

    Not really...

    802.11b is seeing high adoption rates in corporate networks. For better or worse, impenetrable security is not usually at the top of the list when choosing a network component. (ahem [sourceforge.net])

    By starting with a halfway decent basestation that allows for only registered MAC addresses to attach to it, then running some simple Vlan software (with or without WEP) you have an RF network that is as secure as most people *really* need it to be.

    As for Bluetooth, it's reaally not here yet, and it's intended for short-range devices that will most likely require lower throughput's than what 802.11b offers. HomeRF is a sort-of direct competitor, but it also has issues of it's own.

    With the right tools, and some dedication almost any simple network can be cracked. I remember when most people didn't know what "promiscuous mode drivers" were for, and many corporate LANs on simple 10M hubs were easily cracked by patching into an unsecured jack.

    802.11b is gaining a lot of press, and thus attracts more hacker efforts. I can almost guarantee that if HomeRF were the predominant wireless standard, we would be seeing the same hacker tools for it.

  • by NetJunkie ( 56134 ) <jason.nash@CHICAGOgmail.com minus city> on Saturday September 01, 2001 @11:57AM (#2243149)
    Many people, me included, will put the access points outside the firewall and have the clients VPN back in to the network. This way you can disable WAP and just use the 3DES encryption of the VPN.
  • MAC based security? (Score:2, Informative)

    by Laven ( 102436 ) on Saturday September 01, 2001 @12:22PM (#2243216)
    Please correct me if I am wrong, but is not MAC based security easily circumvented by simply changing the MAC address on your card? It is very easy to do with Linux and/or some vendor supplied setup programs.
  • by jcostom ( 14735 ) on Saturday September 01, 2001 @01:21PM (#2243332) Homepage
    We've deployed a wireless application over CDPD. While we can pretty much assume the traffic between modem and CDPD carrier is encrypted and authenticated using the built in capabilities, we can't say the same about the connection from the carrier to our customer's site and their WAN.

    I hope you're not relying on the crypto in CDPD. It's RC2.

  • by mesocyclone ( 80188 ) on Saturday September 01, 2001 @03:14PM (#2243578) Homepage Journal
    MAC level can be secured by means other than simple MAC address screening. The key is to encrypt at the MAC level (as IEE802.11b does), but to do it well. 802.11b uses a private key, so if the key is chosen properly, and the encryption algorithm is strengthened (by using it right!), then one should not need any higher level protocols for normal security.


    Certainly even encrypted systems are susceptible to traffic analysis (putting together an org chart by seeing who talks to who), but that is rarely a threat in the commercial world.

  • by nikpieX ( 518952 ) on Saturday September 01, 2001 @04:40PM (#2243738)
    As the developer of this system, I would like to add a few points that the news articles didn't make clear, or mis-stated. The reason why we have a wireless network is for conferences and visiting scientists. From the start, it was considered an external network to prevent access to sensitive data. Thus, we have to support any person walking in with any type of equipment (Macs, Windows, Linux, BSD, etc) without having them use any specialized software. This is all focused on how convenient it is for the person who walks in at 8 AM and has a presentation to do in 15 min. As long as they can figure out how to use DHCP and open up a web browser, nothing more needs done. So yes, we can do IPSec, VPN, and so on, but we also don't care as it's external to begin with. We simply do not want to become a "free ISP" like so many other companies are with their wireless.

    This device is indeed quite "common sense"; it is supposed to be. We searched for a vendor that provided these services (user accounting/authentication, dynamic firewall, etc), but didn't find any, so we simply built it ourselves. It does the job for what we need it to do in our environment.

    -Nichole
    (NASA Advanced Supercomputing Division)

The one day you'd sell your soul for something, souls are a glut.

Working...