Originally posted by: nweaver
I'll just send the FBI over, say "they keep trying to acess our network and DDOS the fbi website"
FOWL! Unfair advantage!
LOL!
Originally posted by: nweaver
I'll just send the FBI over, say "they keep trying to acess our network and DDOS the fbi website"
OK. Now I get to tell my phishing story.Originally posted by: nweaver....Oh, by the way, if I see a bunch of requests from a rogue client, My WLSE server will triangulate your position and email me, I'll just send the FBI over, say "they keep trying to acess our network and DDOS the fbi website"
Mostly, I'm thinking that it'd be a lot safer and more destructive for me to do a DDOS against your Servers or DNS servers than to try to get away with setting up a jamming transmitter against your 802.1x WiFi network. How many jamming attacks have been attempted against 802.1x networks so far?Originally posted by: cmetz
RebateMonger, I don't know where you got your definition of security. Where I come from, availability is part of security (assurance).
Originally posted by: nweaver
Originally posted by: diegoalcatraz
Originally posted by: nweaver
Originally posted by: Gillbot
I'll never agree that wireless is stronger than wired since I know how many wires are physically running from my switch. Wireless broadcasts so people can still see it. Unless you have physical access to my house, you can't get a wired connection.
but I don't have to get in your house, unless you don't have a single connection out. If you have a connection out, then you don't know. I can tap your line right outside, down the road, at the ISP's datacenter....
But you'll run across that same issue if you're using wireless.
meaning wireless is pretty much "As secure" as wired
Originally posted by: cmetz
RebateMonger, a 2.4GHz wireless network is easily denied service accidentally using a cordless phone. This is much easier, lower-tech, and harder to track down and stop than a DDoS. All networks with contact with the outside world (public Internet, RF, etc.) are succeptable to denial of service, and thus not completely secure. So the philosophy to take is to raise the bar of attackers' resources required high enough that you're not worth it as a target.
A 2.4GHz or 5GHz wireless network can be knocked offline with a $50ish cordless phone, actually the cheaper the more effective since cheap cordless phones are stupid about RF. That's cheap enough and easy enough that someone who's just bored can take your net down. Spamming the channel with bogon 802.11 frames, or control frames that do damage, is a matter of a laptop and a wireless card, the right software and some knowledge. More expensive and more advanced than a cordless phone, but still quite approachable.
A DoS attack to take out a DSL/T1 business is not rocket science, but doing that and making it hard to track down your identity / stop the attack traffic requires more black-hat resources. When you get to the T3 and up level, it requires a pretty serious DDoS net.
So the point of all this is that it's still comparatively really easy to knock out a wireless net. There are things at the RF and 802.11 control levels that could be done that would improve this situation. In the case of the RF side, you can only improve, you can't totally fix. I believe the control protocol could be fully fixed.
spidey, wireless in manufacturing and retail is a fine example of clueless management types who don't understand all the details. They like the coolness of wireless, and the potential business benefits, and the fact that they don't have to go through annoying FCC licensing hoops. But watch as those same MBAs call their lawyers when somebody interferes with their network. And then watch the lobbying to fix this problem by imposing rules on everyone else. The end game is that the ISM bands will get a lot less free 🙁
I'd really like to see 802.11ish gear that runs on a nearby commercial band and requires a per-site FCC commercial license. Like some of the old wireless MAN bridging gear did. So at least people smart enough to go that route would have a legitimate claim to the resource, a legitimate legal basis to go after folks interfering with their network, and would raise the bar of gear/knowledge required to cause their network trouble. It's really a very not good situation when some nearby factory is running mission critical stuff on the same band as a lot of my home wireless electronics.
Originally posted by: ScottMac
In (at least) some cases, the WLSE (or other IDS/IPS) will send a "Disconnect" message to clients it sees as rogues (can be dangerous to use in a high-rise .... at least take time to ID your friendly neighbors ...)
I believe they can also shut down the (Cisco) switchport that it associates with the rogue traffic.
FWIW
Scott
I think it's great when a technical discussion can stimulate debate without restoring to name-calling. There's too much of that in this world.Originally posted by: dphantom
This has been a great discussion. Real big :thumbsup: to all the experts here.
Actually, to implement 802.1x, all you really need is a single Windows 2003 Server. Or an SBS 2003 server, which costs even less (about $450 for the OS). Not THAT much more than the $200 for XP Professional.Originally posted by: dphantom
[As a library, we do not have a lot of money and implementing a full security model with certificates is beyond our reach.
Originally posted by: RebateMonger
I think it's great when a technical discussion can stimulate debate without restoring to name-calling. There's too much of that in this world.Originally posted by: dphantom
This has been a great discussion. Real big :thumbsup: to all the experts here.
Hush, you Linux loser!!!! 🙂Originally posted by: spidey07
oh, quiet you MS bigot!!!!
😉
Internet Authentication Service (IAS, the Windows RADIUS server) is available for install in SBS 2003 and all versions of Server 2003 (except, possibly, the Web version). And, no, I've never actually INSTALLED IAS on an SBS Server, but Microsoft's 700-page book on SBS says that it works fine. They have three pages on installing it and using it for 802.1x.Originally posted by: nweaver
can 2k3SBE be used as a radius server? I have only ever used Cisco ACS. I actually think calling Spidey a Cisco communist is better then a linux loser 😉
Originally posted by: Woodie
Good discussion. Scott makes some very interesting comments.
DoS: I consider the WLAN to be a convenience network, not the core network. If you have a legitimate (business) reason to be using our wireless network, then you also have permission to plug in to the LAN. I consider that a "minor" risk, as an inconvenience more than anything. Note: This is based on our sites, where we do not now have, nor plan to have sites with no wired LAN.
Man in the Middle: I'm sceptical that it's "so easy", however I wil defer to the man who's seen the demo.
Is it really that easy to poison the ARP cache on both client and AP without prior authentication?
If the AP is decently configured for encryption (no WEP) and the authentiction is PKI dependant, how weak is that really? I think (correct me if I'm wrong), that it would be pretty hard to break in to such a system.
FWIW, we provide WLAN at one of our campuses, but it's strictly as a convenience, primarily for non-employees.
We secured it by:
(1) No encryption. We turned off WEP, WPA, etc...it's wide open.
(2) The AP's connect to a segment hooked to a FW.
(3) Outbound traffic (to Internet) is port-restricted to 10001 only.
(4) Inbound traffic (to LAN) is IP and port restricted to 10001 and to our VPN switch only.
The thought is that we now have a place where guests can connect and VPN back to their corporate switches. Employees are restricted the same way, and can only connect to the corporate VPN switch (on the outside interface). So, we saved all the hassle/maintenance associated w/ the authentication/encryption set up for wlan. We rely on the VPN tunnel/configuration to protect the data stream, using the same standards/technology for that traffic flowing across the internet.
Your thoughts? Weaknesses? (don't bother w/ Social Engineering...we're painfully aware of end user/help desk susceptibility) 😉
While it never hurts to have multiple security layers, my PERSONAL PREFERENCE is to not mess with MAC restrictions and SSID broadcast. It adds too many complications for my clients, and they are likely to just dump the whole WiFi security thing as being too messy. I DO want them to keep WPA enabled! It's enough work for them just to copy that long shared key!Originally posted by: DaiShan
I take a similar approach on my wifi network, but I also use MAC restriction and no broadcast on the SSID. (Only minimal impact I know).
That's why I suggest 20-character pass phrases for my clients. Breaking those should take quite a bit longer.....Originally posted by: nweaver
We had just under 500 PC's, (mix of P3 550's and P4 2.6 non HT's) and brute forced a password that was 10 digits, non dictionary, uppercase and lowercase, alphanumeric in 6 hours or so.