EMPEROR | good night |
---|---|
EMPEROR | the next conferenct is talk to Jose Maria Gomez Mundo |
sarnold | (Jose Maria Gomez Vergara) |
EMPEROR | asociation president Malagawirless |
EMPEROR | in colaboration to Unient on long time |
EMPEROR | "Problemas common of security in networks inalambricas and as solving them" |
EMPEROR | well |
EMPEROR | First to ask you excuses by the delay but when the R. Madrid plays in Madrid, is impossible to circulate with the car I thank you your aid to this chat as podeis to see, the holder of the chat this put in ingles in the program |
EMPEROR | because in principle think giving it in ingles, but when think a little upon what queria to say think that giving it in ingles was going to impede me to transmit the concepts of a clear form is therefore for which to the final one decidi giving it in Spaniard |
EMPEROR | Good.. without but enlargements we begin the chat in any moment podeis to interrupt me to do any I ask or to ask some aclaracion with respect what you comente aqui in the canal #qc (in ingles or Spanish) this chat does not intend to give solutions magicas that permit us to remove us the problems of security inherent in the networks wireless |
EMPEROR | Neither even it is going to offer solutions too much techniques |
EMPEROR | well, I try to expose the main problems of security with the ones that is going to find a person that is faced to this type of networks by first time. |
EMPEROR | Therefore what I went doing is to go introducciondo some own concepts of this type of networks, and so that can serve us |
EMPEROR | This chat this based on the own experience by experiments carried out in the department of I + D of the business in which job |
EMPEROR | As well as own experiences carried out in a group of investigation of this technology that is called malagawireless. (Http://www.malagawireless.org) that I have the honor to preside: -). |
EMPEROR | Ultimately the networks wireless are becoming something very popular, due above all to the price reduction of the hardware, |
EMPEROR | and there it has been a great movement in the areas metropolinas with the intention to cover a city with this type of networks, |
EMPEROR | With an idea quizás a little utopian to be able interconectar all a complete city. |
EMPEROR | If yours are interested in some of these projects, podeis to visit the web of one of the most active groups as is www. madridwireless. net or www. zaragozawireless. net. |
EMPEROR | The fact that this technology be becoming somewhat popular, |
EMPEROR | It is sufficient reason as to think that each time there is more people than is familiarized with this technology and therefore we count on more potential dangers. |
EMPEROR | But ¿That it differentiates to these networks of the normal networks or of cable? |
EMPEROR | In reality do not exist demasiadas differentiates in its operation, above all the layer of link up |
EMPEROR | There is a special characteristic that does them to be different and is the middle that utilize to transmit the information. |
EMPEROR | The fact that the information be transmitted by the air, can permit to a user malintencionado the power to listen the information with so alone to be put sufficiently near the nodo transmitter. |
EMPEROR | That dangers has this? To imagine you an intranet mounted with cable and without exit to internet. |
EMPEROR | This network puts us in a certain predicament if what we want is to agree from outside. Our swtich this in our cabinet, and the cables we have them at sight.. ; -) |
EMPEROR | We know who is connected and who not. If someone it goes with his cable and is connected to the switch, serious quickly detected. |
EMPEROR | Now to imagine you that that person decides a good one I gave to catch the switch, to remove it of the amario and to put it in the door of the street. |
EMPEROR | Where any can be connected without problems. Therefore well, that it is what does an unconscious administrator of form when mounts a network wireless, including is more serious todavia because instead of being a switch what he would be able in the serious door a hub. |
EMPEROR | therefore you can be snifada with facility without neither even using tecnicas of the man in the middle is a _hub_ not a switch |
EMPEROR | When in 1999 the IEEE began to define the estandar 802.11 for networks inalámbricas metropolitanas account of this problem was given and thought about as doing something to the respect to be able to solve this weakness since the point of view of the security. |
EMPEROR | have to be a method that permit to be able to be connected to the network, to those persons that were accredited, or authorized. |
EMPEROR | Or they said of another form, tendria that there to be a form to control who can hook a cable to ours "hub". |
EMPEROR | For it they created the (equivalent Privacy to the cableado) or said in English |
EMPEROR | Wired Equivalent Privacity |
EMPEROR | (WEP). |
EMPEROR | Good. ... before beginning to detail in which consists the WEP, someone has some question? no question? |
EMPEROR | well let`s go |
EMPEROR | what is the WEP? |
EMPEROR | The WEP is a protocolo implemented in the level of link, that will avoid to bind with the network, to the persons that do not be authorized. |
EMPEROR | The problem that have with the WEP is the common problem that happens with the technologies that still are in phase of ripening, and are the problems of security. |
EMPEROR | When we utilize WEP, the information will go encriptada and is necessary to know the key one to be able to agree to the network. The idea of the implementacion of the WEP would be very well if went not by its weaknesses. When IEEE definio the WEP had in mind the following rules or properties: |
EMPEROR | a) That fuese reasonably strong. The fortress of this algoritmo is bases on the difficulty that have of advinar the key secret by means of forces rough. |
EMPEROR | b) That fuese efficient: AND really is it, besides permits its implementation so much to niver of software as to level of hardware. |
EMPEROR | c) That fuese exportable: we Have to keep in mind that this algoritmo itself tenia that to adjust to the limitations you imposed by the Department of Commerce of the United States. This it is very important, because then we will see the consequence that this has. |
EMPEROR | d) That fuese optional: that is to say that a network wireless could function correctly without having assets the WEP |
EMPEROR | However, the fact to want to comply with the rule c) created a strong conflict with the rule a) |
EMPEROR | Of fact, in the Netscape SSL Callenge (www.cipherspace.org/ßadam/ssl) we can read that the implementations with a key one as short as the one that definia the American laws pertimitan to guess that key one utilizing forces rough. |
EMPEROR | The WEP this based on RC4, but himself does not apply correctly to the east protocolo and does that the WEP return debil. I stand out that although implementations of 128 exist bits for the encriptación utilizing WEP, is not what dictates the estandar that are 104 bits. We can think that a key one of 104 bits is complicated to remove for rough strength by a normal user, but. |
EMPEROR | Not for a business with sufficient resources. Of fact, the one that the normal users have the infrastructure of a great business is only cuestion of time. |
EMPEROR | not obtante being realists, normal a great deal of people has in its house ordenadores that are capable of doing these calculos without estresarse too much |
Arador | However Jesse R. Walker in his document "unsafe at any key size: an analisys of WEB encapsulation" /sin estar a salvo en cualquier tamaño de clave: un analisis de la encapsulacion WEP" http://grouper.ieee.org/groups/802/11/Documents/DocumentHolder/0-362.zip he explain some problems detected in the WEP design |
Arador | The rule d> is anotuer source of problems. Ww know of the comodity of the users, and if something is optional, probably isn't ctived |
Arador | IN fact, cards and software that they have for its configuration has this option unenabled by defect |
Arador | In some of my outs? in Madrid searching wireless nets i could check that only 10% of them had the WEP enabled |
Arador | Some of them gave you ip using DHCP }:-) |
Arador | We could talk more about WEBk but suming you must know that its a security level that should be obligatory |
Arador | But that isn't going to solve all the security problems because is a weak algorithm and easily exploitable |
Arador | In fact it's easy to deduce the WEB clave usd with capturin a 1mb traffic and with some systems even less |
Arador | In these moments i'm developin a software that i'll release GPL that shows the weakness of this protocol and that deduce the web password used to encrypt a string given |
Arador | software as this exist today, that makes perhaps a bit differted is the fat that is being prepared to be uesd distributed |
Arador | If someone wnats to know more about these vulnerabilities i'd recommend these links |
Arador | www.dmzs.com/~dmz/WeakKeys.txt |
Arador | www.cs.berkeley.edu/~daz/my-posts/my-rc4-weak-keys |
EMPEROR | We pass to describe a setting tipico of attack to a network wireless: |
Arador | The first step is a victim. For this we'll use a software called Netstumbler (www.netstumbler.org). |
Arador | This software uses a broadcast traffic that the access point transmit to detect the existance of a wireless net |
Arador | While it detects it it adds them to a list |
Arador | If we're lucky that we've a good laptop with a gps, we can give a round in the city and when we return we can have a good map of the wireless nets in your city |
Arador | See that netstumbler detects traffic and it dosn't think that the traffic is encrypted or not, so it detects also nets that have GPG proteccion enabled |
Arador | THis practice is similar to war dialers were a computer with a sodtware dialed telephon numbers to see what of them had a modem to add it to a list |
Arador | Now you've to choose an atractive net |
Arador | between all of them, we elect what we like |
Arador | We get the car, and with the laptop and wireless in the hand we go there to see if we sniff traffic |
Arador | For that we can use any sniffer |
Arador | An sniffer created for that is airsnort |
Arador | But you can use another such as etherreal |
Arador | lokk that up the link level |
Arador | the wireless are the same that tradicional nets or cable |
Arador | So the same tools and tricks tha we're used to use can ba valid |
Arador | The promiscous mode in the ethernet cards is the moitor mode in wireless cards |
Arador | and some times you need to patch ethereal so you can use it |
Arador | more info in the web |
Arador | if the information that we get is encrypted |
Arador | we've found one of the few nets with WEP |
Arador | however it's a good idea to capture some information, for example 1 mb to try to dedude the WEB key used and retunr later |
Arador | an interesnting practive is to get a information more des-encryptable |
Arador | it consist in introduce know info in the net to know what's being encrypted |
Arador | for example sending a mail to some people we know the're in the net |
Arador | If they don't haveWEP active, the most normal, we can see in the information captured the ips, even with luck we can have an ip through dhcp |
Arador | another tools that you musn't forgot are ngrep or tcpdump |
Arador | But as i said you can use the same tools that you's use with other nets |
Arador | another tool less know but very useful is tcpflow |
Arador | it gets sessins in files with similar syntaxis to tcpdump |
Arador | so it's a very recomendable tool |
Arador | As we saw, it's not enought to have enabled WEP, but we saw that it's should be obligatory. Imagine that a net hasn't WEP or that it has but we know the key |
Arador | Now we could link with the net, we've acess....but the administrator can have some other protecction |
Arador | But these protections are the same that we find in other nets |
Arador | - IP acces control |
Arador | It consist in give access only to some ips, por example 192.168.0.0/24 or even he han be strict and only allow to 192.168.0.0/30 |
Arador | In this case we'll have to use ip spoofing. If we've sniffed enouht traffic we'll see in the comunication the ips that they use |
Arador | wo we can have valid ips |
Arador | If we've enought patiente we can wwait that some of them go out so we enterwith his ip. |
Arador | It lloks easy, but not only it seems easy, it's easy |
Arador | - Mac access control |
Arador | This know of proteccion consots in controlling the acces by MAC address. Theorically every card hane a unique MAC address |
Arador | soso it's reasonable to use this protecction |
Arador | but we can change the MAC with software |
Arador | And in same way that we've explained but with macs, we could enter the net. That's mac spoofing |
Arador | As we can see, always there's a way to enter in a net. This is aplplicable to all kind of nets |
Arador | This that i've explained it's only a ferw, of course there's some advanced techniques |
Arador | Is waht makes the security world so nice :) |
Arador | sorry about the translation, blame isp modem providers :-/ |
Arador | i continue |
MJesus | A certain great power is a failure generalized between some administrators and to trust its knowledge. They do not realize, that the one that more experience has of all, so single knows a 1% of the total |
MJesus | and that its network can be victim of a person who knows 2% |
Arador | so, what can we do to avoid people entering in our net and stole us or information? What can we do to make safe our mails? what can we do to avoid somebody to stole our ftp/telnet passwords? |
Arador | the one solution is _ENCRYPTATION_ and access control to the net with ipsec! |
Arador | in a unconnected net, any host that's connectes to it can have non-autorized accesses |
Arador | so my personal opinion is, of course, to have a very restrictive firewall, and having several levels of security |
Arador | allowing only encrypted connections with ssh and if possible with certificates |
Arador | and control the access with ipsec |
Arador | encrypting all the information that goes out of our computer, with ssl or gpg por emails and files. And store always the important data encrypted |
Arador | The wireless nets shows new walls that we've to explore because it's a new technology |
Arador | and so they're nets that need some admins with hability and creativity to have a secure net |
Arador | Try to explore what the wireless nets allow you because it has a lot of advantajes. Perhaps the next year, all of us will have a wireless net in home |
Arador | IF you agree, we open questions and compentarys if somebody wants to ask. |
Arador | Thanks for coming here, i'm at your disposition at jose.maria@icodsi.biz |
Arador | if you think of some tomorrow ;) |
Arador | <casanegra> jmvg: it's possible that the problem with security in wireless nets it's that they're by nature? |
Arador | of course, in fact think that i gave more importance to the WEP section |
Arador | that's the protection that you get in the link level, because that's the only difference |
Arador | the problem is that the wireless nets inherit all the problems of wired nets, adding even, that preventive we should have due to the environmet tiself adn that allows to listen easyly that kind of nets |
Arador | however, having enought hability they aren't specially insecures, so you musn't hide of them... |
Arador | in fact, i'd only try wired connections when the througput of the wireless weren't wnought |
Arador | think that in these moments the maxium speed is 11 mb and the canal is shared |
Arador | however, it's a lot of applications and it's being worked in modifications to allow more bandwith |
Arador | any question? |
Arador | jmvg: in a near future it's possible that a lot of people has wireless, but what's the diferency of the radiospectr to support a huge amount of nets, mainly in very founded cities, is this a problem? |
Arador | certainly, that's another problem |
Arador | in these moments a wireless card aroud the 2 Ghz can work in 7 different channels |
Arador | but to avoid the interferences in the nets you need as minium 3 channels separation |
Arador | to not sharing the medium |
Arador | net 1 channel 1 -> net2 channel 4 -> net 3 channel 7 -> net 4 channel 2 -> net 5 channel 5 |
Arador | in this way the 1 net is enought far of the 4 to use a canal that's divided only by 1 |
Arador | in all way...we're advancing in this field syncronizing the data emmission |
Arador | but that's a limitation of the wireless nets, however think that the net has an identificator, so in the case that 2 nets of different people that sahre a common medium |
Arador | or even the same ips, there wouldn't be problems in the communication. ESSID is the net identification |
Arador | if there's no more questions, the lecture has finished, i'm available at jose.maria@icodsi.biz |
sarnold | arador :) thanks! |
Arador | sarnold: sorry for the BIG delay :-/ |
Arador | my mother tried to use the phone...that hangs the ppp link |
sarnold | Arador: ugh |
EMPEROR | well.. all forms.. we are finished.. the conference... :s |
Arador | sarnold: it's curious....that happens with the 56k modem, but the 33.6 modem tries to "resync" the connection and it continues ;) |
sarnold | Arador: wierd ... i would have thought that 56k could at least fallback to 33.6 |
Arador | the 56k modem SHOULD do that |
Arador | sarnold: v92 connections supports these kind of things i think , but my isp, telefonica (and all the isps in spain) seem they haven't implemented v92, only v90 |
MJesus | arador, you are excellent traslator !! |
Arador | EMPEROR also does it good :) |