Who creates security problems?
Basic tools you can use to protect your wireless networks (by increasing protection and complexity):
By turning off beacons, you can prevent your network from being shown in network scan utilities.
Advantages: Standard security feature supported by virtually all access points.
Disadvantages: "Closed" networks are not easily found in a site survey, and are easily found by passive monitoring tools.
A MAC filter may be applied to an access point to control which devices may be permitted to associate.
Advantages: Standard security feature supported by virtually all access points.
Disadvantages: MAC tables are inconvenient to maintain. Also, MAC addresses are transmitted in the clear (even when using WEP encryption), and are easily copied and reused.
Part of the 802.11 standard, Wired Equivalent Privacy provides encryption at layer two.
Advantages: Standard security feature supported by virtually all access points.
Disadvantages: Shared key, numerous security flaws, long-term maintenance impossible on large networks.
While WPA (802.11i) will likely become the standard for protected Wi-Fi access, we are not there yet.
Advantages: Significantly stronger protection than WEP, open standard.
Disadvantages: Vendor interoperability problems, complex configuration, protection only on layer two.
Good end-to-end security software should provide strong Authentication, Encryption, and Key Management.
Examples include:
The main problem with implementing encryption at layer two is the possibility of man-in-the-middle (MITM) attacks.
End-to-end encryption provides protection all the way to the remote end of the connection.
In addition to providing simple shell access, SSH is a general-purpose tunneling tool.
There are hundreds of free tools that will show you lots of information about your network:
There are a variety of wireless protocol analyzers available. Some include:
Using the proper tools, you can see precisely what is happening on your network.
By using strong end-to-end encryption, you can prevent others from using these tools to attack your networks.
The use of strong end-to-end encryption can also make it safe to use completely untrusted networks (from a public wireless AP all the way to the Internet).
Portions of this talk were adapted from Wireless Networking in the Developing World, http://wndw.net/