330 likes | 351 Views
Risks of Wireless Access Points. Brian Moeller, CISSP. What is a wireless access point?. A device that uses a radio to allow access to a network. Apple Airport. Apple Airport “in the wild”. Cisco Wireless Access Point. Cisco Wireless Access Point – Front View. Linksys. Netgear.
E N D
Risks of Wireless Access Points Brian Moeller, CISSP The Ohio State University Network Security Group
What is a wireless access point? • A device that uses a radio to allow access to a network The Ohio State University Network Security Group
Apple Airport The Ohio State University Network Security Group
Apple Airport “in the wild” The Ohio State University Network Security Group
Cisco Wireless Access Point The Ohio State University Network Security Group
Cisco Wireless Access Point – Front View The Ohio State University Network Security Group
Linksys The Ohio State University Network Security Group
Netgear The Ohio State University Network Security Group
Apple Powerbook Laptop The Ohio State University Network Security Group
Why scan for wireless? • Inventory Access Points and get a rough idea of how they’re secured • Plot their locations • Experiment with new wireless “Scanning” software The Ohio State University Network Security Group
Why scan for wireless? • Get an idea of how wireless is being used on Campus • Prove/disprove that wireless implementations are secure or not secure • Demonstrate scanning technology and methods The Ohio State University Network Security Group
The Scanning process • Laptop • Wireless card (Orinoco/Lucent Silver, in this scan) • Small external antenna • Golf Cart • Map of Campus The Ohio State University Network Security Group
The Scanning process • Added GPS • GPS gives location data via satellite triangulation • Accuracy usually around 15ft. The Ohio State University Network Security Group
The Scanning Process The Ohio State University Network Security Group
The Scanning Process The Ohio State University Network Security Group
The Scanning Process The Ohio State University Network Security Group
The Scanning Process • How the scan works • Software looks for SSID (Service Set Identifier) broadcasts • Polls access point for configuration, names, and any other information it’s willing to share • Does *NOT* request IP address The Ohio State University Network Security Group
So, make your point • Wireless common around Campus • Good system administration practice is questionable • Many appear to be merely unpacked, and plugged in • Most not running authentication or encryption The Ohio State University Network Security Group
Campus Wireless Scan Results • Total of 122 Wireless Access Points found • 45 encrypted (WEP) • 77 Not Encypted The Ohio State University Network Security Group
Campus Wireless Scan Results • 35 Access Points appear to have factory default settings The Ohio State University Network Security Group
Conclusion • Many wireless access points on campus • Channel contention may be an issue • No standardized configuration The Ohio State University Network Security Group
Conclusion • Security issues • Authentication • Authorization • Accountability • Integrity • Confidentiality The Ohio State University Network Security Group
Policy Discussion • Ownership of Wireless Frequencies and channels on campus • Centralized Management of Wireless Frequencies and Channels • Authority to assign channels, and approval of frequency/channel usage. The Ohio State University Network Security Group
Policy Discussion • Ownership of Wireless Frequencies and channels on campus • Authority to define which wireless technologies will be authorized for use on campus The Ohio State University Network Security Group
Policy Discussion • Requirement for wireless encryption • Proposed policy outlines requirement for *AT LEAST* WEP, and strongly recommends usage of VPN technology (but does not require VPN) The Ohio State University Network Security Group
Policy Discussion • Requirement for MAC address registration and filtering The Ohio State University Network Security Group
Policy Discussion • Requirement for authentication for all users who use the network (includes wireless) The Ohio State University Network Security Group
Policy Discussion • Network Addressing • Requirement for using campus-assigned network addresses – and specifically disallowing NAT or private addressing. The Ohio State University Network Security Group
Policy Discussion • Wireless Base Station Naming • Campus-wide standardization of access point names, and registration in DNS. • Requirement for contact information for all access points. The Ohio State University Network Security Group
Policy Discussion • Wireless Base Station Naming • Campus-wide standardization of access point names, and registration in DNS. • Requirement for contact information for all access points. The Ohio State University Network Security Group
Policy Discussion • Logging Policy • All wireless access points must employ a logging scheme that logs the IP address and user authentication information (including username, login/logout times and dates) for at least 30 days. The Ohio State University Network Security Group
Policy Discussion • Protection of the wireless and network devices • Configuration must protect wireless access point configuration (i.e. by disabling or changing SNMP settings) • Password protection of all configuration methods The Ohio State University Network Security Group