Wireless Security in 2009 - Recommendations
Yesterday, I grabbed an 802.11b/g/* router from Chinatown ($32 - can’t beat that) and set out to use my laptop’s wireless network card. I hadn’t done this before because I was (justifiably) concerned about wireless security, so I wanted to make sure that a breach of the wireless network wouldn’t turn into a breach of the wired LAN (which includes a printer and a few sensitive servers). This post collects some of my research and observations, and it concludes with my recommendations for how you can secure your own wireless network… or at a minimum, it tells you how you could if you were willing to spend $32 on a new wireless access point.
Network Topology: equal distrust for the Internet as for wireless
A series of events brought me to the point where this became realistic, the most important of which is that I got an extra router for the LAN. Let me briefly explain the current network topology I use, which allows me to equally distrust public Internet traffic as much as I distrust my wireless router.
-
We connect to the internet via DSL and a router, which uses NAT to provide a private address space behind the router (10.0.50.x)
-
The “wired” router connects to the DSL+router, which uses NAT to create a separate private address space (10.0.51.x)
-
The wireless router also connects to the DSL+router, and as you might have guessed, there is yet another private address space behind this router (10.0.52.x)
So, if you’re using an ethernet cable, your connection cannot be routed to a machine connected via wireless, and vise versa. Barring an attack against the wired router, the address space is simply not routable. I’ll eventually provide a VPN into the wired network, so I can print using a wireless connection (since the printer is only connected to the wired network).
At this point, I was pretty happy about running a wireless access point, because I was really no worse off if someone attacked the wired LAN via wireless or via the public Internet. Basically, both vectors are equally untrusted.
Digging into WPA2
Still, I was uneasy about actually using my wireless network, and I hoped that wireless security had advanced beyond the famous WEP debacle, which made it downright trivial to attack older wireless access points. The solution is to use WPA2, which is a better protocol that only runs on newer hardware. This is not without its pitfalls, and some impressive work has been undertaken to attack WPA2. Notably, the pyrit project has made great progress using 3d acceleration hardware to create downright feasible attacks against WPA2 with a pre-shared key (WPA2-PSK).
An alternative to using a pre-shared key with WPA2 is to use a key server technology called Radius, but because I didn’t wish to run another server, I needed to learn more about the pyrit approach so that I could still use WPA2-PSK.
The Pyrit Approach
Pyrit can make use of multiple 3d accelerator cards, and now can even cluster machines for parallel processing, in order to pre-calculate values that are useful in attacking a wireless network. In other words, it is plausible for anyone with enough friends (or perhaps a government budget) to get the raw computing power required to crunch the numbers. After saving these computed values to disk (a process that takes hours or days), they can be rapidly transmitted to the access point in a few minutes, and the attack will have been executed.
The key here comes down to disk storage, instead of processor power, because we might as well assume that processor power isn’t realistically limited anymore. From the pyrit blog itself, it appears PSK values longer than 10 ASCII characters cannot affordably be stored on current hard drives, even though it is definitely possible to perform the necessary calculations.
The pyrit attack is further thwarted by the incorporation of the wireless access point’s SSID in the WPA2 calculations, so while it is possible to pre-calculate an attack for common SSIDs (like “linksys” or “default”) it is only possible to attack a novel SSID after some reconnaissance to determine that value of the target SSID. Most impromptu pyrit attacks will probably involve common SSIDs that ship as the default setting for wireless access points.
Other considerations
There is also the issue of traffic over the air, where the question is to either use TKIP or AES. This one is easy: there is a weakness in TKIP, so don’t use it.
If you know ahead of time which machines will exclusively use your access point, then MAC address filtering will be an extra security measure. While MAC addresses can be spoofed, it takes extra time to do so and can be a hassle to brute force your way through the address space. MAC address filtering is an option on my wireless router, so I have chosen to disallow all network access except for the few wireless devices that I know the MAC address of.
So you know, it can become a hassle to keep your MAC address whitelist up to date if you keep adding new wireless devices, like if you have friends who drop by with their laptops. It’s probably worth the 60 seconds it takes to add a new device, but YMMV.
Recommendations
After all is said and done, it looks like it’s possible to create a relatively secure wireless access point. Here are my recommendations:
-
Use WPA2-PSK
-
Use a PSK that is the maximum allowable length (probably around 63.) Use a completely random method that includes all allowable ASCII characters (mixed case, numbers, and symbols). Your wireless access point will probably call this a “password” or something, but just know that this is the “pre-shared key” (PSK).
-
Encrypt all traffic with AES instead of TKIP
-
Use a randomly generated SSID to name your access point
-
tell your access point to NOT broadcast its SSID. This will prevent it from showing up in the list of available access points when someone clicks on their wireless network card to scan. This won’t deter the most determined attackers, but do this if it’s an option.
-
Use MAC address filtering. Disallow all by default, and whitelist the devices you want to explicitly allow.
This should be a pretty good starting point, and it works with my $32 wireless router. There may be new attacks in the future, and hard drive space will obviously get cheaper, but I feel pretty comfortable at this precise moment.