Personal computing discussed

Moderators: renee, Steel, notfred

 
deadzone
Gerbil
Topic Author
Posts: 18
Joined: Sun Jul 14, 2002 9:10 am
Location: Lafayette, La.

Wireless Networking questions

Wed Dec 03, 2003 11:40 am

I apologize in advance if this has been covered to death... I was hoping for fresh responses rather than older threads.

I have a fairly simple network setup at home with two computers that I am adding a third to soon. The router I have is a Netgear (802.11b wireless) and it has wired connectivity as well. The desktop computer is setup via RJ-45 (Wired) and my Laptop setup up via wireless with a USB Wireless adapter to the router, and this all is running on a Cable Modem connection.

Heh, my question now.... Is it possible to "isolate" the wireless connected machines behind a firewall? I want the INTERNET/e-mail access wirelessly, but I don't want anyone to share and/or hijack my wireless connectivity if I can at all help it. I enabled 128-bit WEP encryption, disabled DHCP, SSID broadcasting, changed my passwords/names, all of the normal stuff you know.

Am I just too paranoid about getting hacked or hijacked? The surprising thing I think for me was upon initial install of my new wireless router, I was able to see 2 other wireless connections which I assume must be close to me. Kinda gave me the willies to see this and they seemed to be wide-open too. (ie, I could have used their connection if I wanted)

I am envisioning some sort of cheap linux or mandrake box with two NIC's... am I far off here? I would like to run the wired connections off of this box and then have the router possibly behind this and handing out my wireless connections to the other PC's.

All of these PC's are running Windows XP Pro with the latest updates, software firewalls (Tiny Personal Firewall, the good older version), and have Norton Corporate Edition Virus protection.

Help? Suggestions? Teasing because I have no clue what I am talking about or even what to ask? Anything is welcomed at this point. BTW, you guys rocked for me last time I asked some questions here, thanks a lot for that. :)
 
thegleek
Darth Gerbil
Posts: 7460
Joined: Tue Jun 10, 2003 11:06 am
Location: Detroit, MI
Contact:

Wed Dec 03, 2003 11:53 am

http://www.computerworld.com/securityto ... 05,00.html

Story by John Cox
DECEMBER 01, 2003
NETWORK WORLD

In August, engineers with AirDefense Inc., a wireless LAN security
software vendor, made war drives in Atlanta, Chicago and San
Francisco, using scanners to find WLAN access points around downtown
office buildings.

The drivers discovered more than 1,100 access points. Of these, 57%
weren't using any form of data encryption, although most of the actual
data traffic in Chicago and San Francisco was encrypted by other
means, such as a VPN. Three-quarters of the access points were
broadcasting their Service Set Identifier (SSID), which is like hiding
in a game of hide-and-seek while carrying a boom box blaring heavy
metal.

The WLAN out of the packing boxes is inherently unsecure. But the
final WLAN security system you create will hinge on what data you want
to protect, how valuable it is and the level of risk to that data.
Good WLAN security is expensive: in time, training, maintenance,
oversight and in hardware and software costs.

The following recommendations assume an enterprise WLAN of 150 to 500
access points, up to several hundreds of users and a relatively high
requirement for protection.


1. Control the wireless clients.

Standardize the WLAN network interface cards (NIC), block user access
to them, and register their media access control (MAC) addresses.

Create and enforce procedures and policies for promptly updating
clients with software patches and security updates, and for blocking
clients running out-of-date software.

Consider disabling NICs' ad hoc or peer-to-peer mode, which lets
clients connect to each other without an access point. Attackers can
use this feature to lure or force clients to associate with a rogue
WLAN.


2. Treat the WLAN as you do the Internet - as untrusted.

Put a firewall between the WLAN and the wired network. This barrier
blocks unauthenticated WLAN users from sending Layer 2 packets on to
the wired network, for example, as part of an Address Resolution
Protocol (ARP) attack. A successful ARP assault lets the attacker
route traffic between two computers on your network through his own
computer.


3. Protect the access points.

Conceal access points behind ceiling panels or in closets, and secure
them to prevent tampering. At one university, someone pulled out the
PC cards from more than 100 access points and tried to sell them on
eBay.

Hide access points from attackers by changing the factory default
settings for the SSID or IP address information, creating difficult
passwords, and turning off SSID broadcasting.

Turn on Access Control Lists for use with client MAC addresses.

Select access points that use flash memory, to simplify future
upgrades of security patches and of still-developing security
standards.

Consider buying access points that let you create virtual LANs (VLAN).
VLANs let you group users and give the groups access to different
network resources. VLANs also let you separate management traffic from
user traffic.


4. Prevent radio waves from "leaking" out of your site.

You can "shape" radio waves by replacing the standard omni-directional
antenna with a directional antenna, especially on the edges of your
site.

Another technique is to adjust the power levels of the radios. Using
less power means the signal doesn't reach as far.


5. Update NICs and access points with WPA, but don't rely solely on
it.

Wi-Fi Protected Access (WPA), an early release of the upcoming IEEE
802.11i standard, fixes a number of problems in the original 802.11
encryption scheme called Wired Equivalent Privacy (WEP).

Among other things, WPA supports 802.1x, which was originally created
as an IEEE standard for port-based authentication on wired networks.

But WPA still uses what's called a stream cipher to encrypt wireless
traffic, instead of the more powerful block ciphers. Block ciphers are
used in Triple-DES and, especially, the Advanced Encryption Standard
(AES). AES will be part of the 802.11i standard and likely will
require new WLAN hardware that's been revamped to handle the
additional processing load.

Make sure the cipher scheme that you choose encrypts the packet's
payload.


6. Use a VPN.

VPNs, with IP Security (IPSec) or Secure Sockets Layer (SSL)
encryption, still are widely seen as the best protection, although
there are an array of limitations: handling only IP traffic and not
AppleTalk or IPX or other protocols, installing code on client devices
(for IPSec VPNs), forcing users to reauthenticate when moving between
access points, bandwidth-intensive operation, administrative overhead,
and greater complexity as the size of the WLAN grows.

But VPNs are well understood and are often already part of the
enterprise for remote access. They create secure, end-to-end
encryption, authentication (often via RADIUS servers) and access
control.


7. Complement the VPN with a third-party wireless security controller.

On the market for about two years, security gateways solve some of the
problems of using VPNs for WLANs. Many incorporate firewalls and VPN
termination, support roaming among access points and across subnet
boundaries, and centralize security administration.

Controllers can run an array of encryption and authentication schemes,
and vendors are adding in the emerging standards such as 802.1x and
one or more of the Extensible Authentication Protocol (EAP) methods
that 802.1x can support.

A range of these security features are also found in WLAN "switches,"
devices that combine a centralized box - which applies to WLAN traffic
the management, control and provisioning features found in wire-line
switches - with companion, highly simplified wireless access points.


8. Plan for 802.1x authentication.

VPNs for WLANs will be supplanted by the gradual implementation of
802.1x authentication and the other elements in the IEEE 802.11i
standard, such as better encryption, and management and distribution
of encryption keys.

But some early adopters of 802.1x are running into problems:
overloading the processing power of the access points, complicated
troubleshooting, and lack of 802.1x support in various client
operating systems and NICs. Their experiences suggest that 802.1x
implementations will be gradual as vendors work out the kinks.

Within 802.1x, you have several EAP methods from which to choose. For
all-Cisco or all-Microsoft shops, it makes sense to go with Protected
EAP (PEAP), jointly authored by Cisco Systems, Microsoft Corp. and RSA
Security.

Methods such as Microsoft's EAP-Transport Layer Security require
digital certificates on clients and servers, and the complexity of the
attendant public-key infrastructure. Others, such as EAP-Tunneled
Transport Layer Security, are designed not to require client
certificates, so users can trigger the authentication process with the
same username/password they use to access the wired LAN.

Stick with a method that supports mutual, or two-way, authentication,
to prevent man-in-the-middle attacks.


9. Monitor the network.

A growing number of analyzers and monitors let you examine WLAN radio
traffic, discover unauthorized access points, block or disconnect
clients as needed, and detect intruders. Some products are Ethernet
sniffers adapted to handle WLAN packets, others are specifically
designed for WLANs. Vendors include AirDefense, AirMagnet Inc.,
Finisar, Network Associates Inc., WildPackets Inc. and YellowJacket.


i hope that helps... 8)
––•–√\/––√\/––•–– nostalgia is an emotion for people with no future ––•–√\/––√\/––•–-
 
deadzone
Gerbil
Topic Author
Posts: 18
Joined: Sun Jul 14, 2002 9:10 am
Location: Lafayette, La.

Wed Dec 03, 2003 12:07 pm

heheh, ummmm that would be a good start I think! Thanks a ton for that information! Hopefully my brain won't explode when I start sorting through that stuff and trying to implement it! You guys freaking rock.... what the heck do you do in order to keep on top of information as it comes in?! Off to study some I guess.... :)
 
Despite
Gerbil XP
Posts: 496
Joined: Thu Dec 27, 2001 7:00 pm
Location: Oklahoma
Contact:

Wed Dec 03, 2003 1:49 pm

good find, gleek
 
Slade
Gerbil
Posts: 39
Joined: Tue Mar 18, 2003 11:13 am

Wed Dec 03, 2003 2:12 pm

You could simply limit access to those MAC addresses you select. That is if your router supports that function.
 
deadzone
Gerbil
Topic Author
Posts: 18
Joined: Sun Jul 14, 2002 9:10 am
Location: Lafayette, La.

Wed Dec 03, 2003 2:18 pm

Slade - Is there a certain thing to look for under my Router settings to see if this is possible? For some reason what you suggest rings a bell and makes me think I may have heard or read that before. Thanks for the suggestion too. :) I would love it if it was that simple for me to start out. I would eventually like to play more with the network and add more computers and another, home-built, configured firewall as well though. This is more of a long-term goal though as I am simply too busy with work right now to give that project the attention it would need.

Who is online

Users browsing this forum: No registered users and 21 guests
GZIP: On