Hams Report 85-mile 802.11b File Transfers @ Oregon
Mark C. Langston
mark at bitshift.org
Wed Apr 14 18:02:21 PDT 2004
On Wed, Apr 14, 2004 at 05:45:15PM -0700, Roy S. Rapoport wrote:
>
> Right. What I'm saying, however, is that -- unless I misunderstand the
> basic concept behind WPA (disclosure: I haven't deployed it yet) -- nothing
> requires you to let the user select the password, right? So why not do "Hi,
> here's your new laptop with wireless card. And here's your WPA password:
> B2A40F73F92810." (BTW, this was auto-generated from an 11-line script I just
> wrote)
>
> Doesn't this solve the problem?
>
It minimizes the possibility that the WPA hash will be brute-forced.
It significantly raises the possibility that the user in question will
keep the password written down somewhere, or that management will decree
that Easier Passwords Shall Be Used(TM).
My Best Practice for deploying a wireless network is the following:
1) Deploy all wireless access points outside your edge, with standard
precautions taken (MAC ACLs, high-entropy password, non-default
SSID, no 802.11b/g/whathaveyou broadcast frames enabled, etc.)
2) Connections originating from/routed through the access point can
go only one place: One end of a VPN, after authenticating to
an internal LDAP, RADIUS, or similar system. All traffic will
thus be wrapped in TCP 50/51 while in the air.
3) All traffic shall use encrypted protocols whenever possible. This
implies that the AP's encryption, the AP's access restriction, the
VPN's encryption, and the VPN's access restriction are still
insufficient. Which is entirely true, because the whole bet's off
if, after jumping through these hoops, the user then telnets, POP3s,
or otherwise insecurely puts account name and password on the wire
to a system that has access to your network, over whose transit
you have no control. Because I can assure you to a fairly high
degree of certainty that a great many users make an effort to use
the same username and password everywhere, unless forced to do
otherwise.
4) If possible, port and protocols will be firewalled at the VPN
endpoint, before encapsulation, providing further control over traffic
influx from the wireless network.
5) If possible, permitted traffic will be proxied outbound from the
VPN, and restricted or prohibited otherwise.
...of course, this is my preferred remote access solution crossing an
edge in either direction. Needless to say, I rarely if ever get to
implement the full-spectrum best practice as described above. However,
I try to insist on 1-4 when deploying wireless networks, and am only
really comfortable negotiating away #4.
There are other approaches that provide a similar level of security,
if you're willing to grant access to all and sundry: E.g., put the
AP outside your edge, and only allow traffic from the APs to travel
out from your edge, never cross it. So wardrivers may end up with
free bandwidth, but they'll hit a null route when trying to hit your
infrastructure.
--
Mark C. Langston Sr. Unix SysAdmin
mark at bitshift.org mark at seti.org
Systems & Network Admin SETI Institute
http://bitshift.org http://www.seti.org
More information about the Baylisa
mailing list