By Joseph Moran
Security is an important concern on any network, but it’s especially so for a wireless one where information travels back and forth through the air and is open to eavesdrop and intercept by anyone within range. As a result issues surrounding security come up in almost any discussion of implementing a WLAN.
New security techniques and standards are constantly under development, and a comprehensive discussion of security is beyond the scope of this tutorial, but we’ll outline some of the security features you can take advantage of to help safeguard your data and protect against unauthorized access to your network.
The method by which WLANs protect wireless data streams today is called Wireless Equivalent Privacy, or WEP. Despite the implication of its name, WEP doesn’t really provide privacy equivalent to that of a wired network. As mentioned earlier, a wireless network is inherently less secure than a wired one because it eliminates many of the physical barriers to network access.
The way WEP attempts to overcome this is by encrypting the data transferred between two wireless devices. This could be for example a computer and an access point, two access points, or two computers. A data stream encrypted with WEP can still be intercepted or eavesdropped upon, but the encryption makes the data unintelligible to the interloper, at least in theory. The principle behind WEP is similar to that used by SSL (Secure Sockets Layer) which encrypts data sent between a computer and a Web server, say, when you order something from an online store.
There are different levels of WEP available, depending on the type of hardware you are using. The strength of WEP is measured by the length of the key used to encrypt the data. The longer the key, the harder it is to crack (in terms of the time and computing power required).
The earliest 802.11b implementations provided 40-bit WEP, which was generally regarded as too weak to afford any real protection. Later 802.11b products (like the ones on the market today) strengthened WEP to use 64-bit (which is actually the same as 40-bit) or 128-bit keys.
802.11a products offer those same WEP levels but add a yet higher level–152-bit, while the some of the latest 802.11b+ products often feature 256-bit WEP.
To maximize your security, you should always utilize the highest level of WEP that your hardware supports. Sometimes, if you use hardware from several different vendors, you may find that they support varying levels of WEP. In these cases, you should use the highest level common to both devices. Although generally WLAN products from different vendors communicate with each other just fine, enabling WEP is often a way to expose interoperability problems. If security is your paramount concern, consider getting all of your hardware from a single vendor.
Although the calculations required to encrypt data with WEP can impact the performance of your wireless network, it’s generally seen only when running benchmarks, and not large enough to be noticeable in the course of normal network usage. The performance penalty on enabling WEP will generally be a little higher when using a router that incorporates a built-in WLAN access point, because of the added load of WEP encryption on a CPU that is already handing routing and switching functions for Internet sharing. When using a stand-alone access point, the performance penalty is usually imperceptible.
Enabling WEP on your WLAN equipment is not very difficult. Any WEP-enabled router, access point, or NIC will have a WEP configuration section that lets you specify the type of key you want to use as well as the key itself. Most devices let you specify your key using either ASCII (alphanumeric characters) or hex numerals (0-9 and A-F). If you’d rather let the computer do the work for you, you can usually input a plain-text passphrase (like “monkeyboy”) which the device will use to automatically generate the WEP key.
Whichever level of WEP you decide to use, it’s crucial to use identical settings–the key length, and the key itself, obviously – on all devices. Only devices with common WEP settings will be able to communicate. Similarly, if one device has WEP enabled and another doesn’t, they won’t be able to talk to each other.
When considering security on a WLAN, WEP is not the whole story. WEP may obscure the true nature of your data to eavesdroppers, but it doesn’t prevent unauthorized computers from getting on your network via your access point. (In fact, WEP encrypts only the data portion of a TCP/IP packet, not the headers, which means that source and destination address of every packet is clearly identifiable.) The job of a WLAN access point is to always broadcast its presence. By default, it grants access to any computer that requests it.
The feature that deals with the issue of unauthorized access is MAC filtering. Every piece of network hardware ever made has a MAC (Media Access Control) address. MAC addresses have the benefit of being both unique (no two network devices have the same MAC address) and permanent (they’re “burned” into the hardware, and cannot be changed). A MAC address is an attribute of the NIC, not the computer it’s in. Therefore, an access point will grant access to any computer that is using a NIC whose MAC address is on its “allow” list. The only time a MAC address can be absolutely tied to a computer is when, say, a notebook has a built-in WLAN adapter, as some do nowadays.
Wi-Fi routers and access points that support MAC filtering let you specify a list of MAC addresses that may connect to the access point, and thus dictate what devices are authorized to access the wireless network. When a device is using MAC filtering, any address not explicitly defined will be denied access.
You can almost always find a device’s MAC address on a label physically affixed to it. If not, go to the computer you need a MAC address from, get a DOS command prompt up by going to the Start Button, selecting Run, then typing “command’. At the prompt type “ipconfig /all” (without the quotes).
In Windows 95/98/ME, you can type “winipcfg” in the Run dialog box to get a list the MAC address of each network card in the system.
Some products take MAC filtering a step further and let you grant or deny access to either the LAN or the WAN (or both). This added flexibility comes in handy if you’re trying to control internal computers – for example, to allow a particular computer access to your internal network but not to the Internet, such as your kid’s computer.
Unfortunately, not all WLAN routers and access points provide MAC filtering capabilities, so be sure to check before buying. Some devices let you filter access by IP address, but because IP addresses are not always unique, can be changed, and are easily spoofed, they’re not a good basis to control network access.
Security – Why Bother?
Like the WLAN standards themselves, the security features within them are new and far from foolproof. That doesn’t mean, however, that they’re worthless and should not be implemented.
Think of it in the following terms – do you typically leave your car unlocked with the keys in the ignition? Probably not; more likely, you take the keys, lock the doors, and maybe even use a supplemental security feature like an alarm or steering wheel lock. This doesn’t guarantee that your car won’t be stolen, but it does greatly reduce the chances that it will.
You should approach security on your WLAN the same way. The security features currently available will probably not stop a determined hacker who wants to access your network, but they likely will thwart just about everyone else.
The worst thing you can do is set up your wireless network, leave all the default settings in place, and leave security features turned off. Even in business environments where the wireless networks were set up by supposedly knowledgeable IT people, you’d be surprised how often people do exactly that. Don’t be one of them.
Wi-Fi Protected Access
Although it is far, far better than nothing, WEP has been roundly criticized for providing both insufficient and incomplete security. For example, the encryption key used by WEP, regardless of its length, is static and never changes unless it is periodically and manually changed by the administrator on all devices a daunting task one even a small network, to say the least.
This means that an intruder eavesdropping on wireless transmissions could theoretically monitor network traffic over time and possibly gather enough information to decipher the key and decrypt the data. The heavier the network traffic and the more computing power the intruder had at his or her disposal, the less time it would take.
The second major weakness of WEP is that it does nothing to authenticate users on the network, which is why schemes like MAC address filtering were developed. Remember though, that the MAC address is a property of a network device, not a user or even a computer. Therefore, if an intruder stole a wireless NIC whose MAC address was in the allow list of an access by an access point they would be granted network access.
In response to these criticisms, the Wi-Fi Alliance recently announced a new wireless security protocol that will be available in early 2003. It s called Wi-Fi Protected Access (WPA), and is designed to take the place of WEP and address many of its shortcomings.
For starters, WPA requires the user to provide a master key, but this does not become a static encryption key. Instead, the master key is simply a password used as a starting point through which WPA derives the key it will use to encrypt network traffic. Moreover, the key is regularly and automatically changed (and never reused), reducing the likelihood that it will be compromised. The master key also serves as a password by which users can be authenticated and granted network access.
WPA was designed to be a software upgrade to WEP, so most existing wireless devices should be upgradeable to WPA via a firmware (define) update. In order to take advantage of WPA, all network devices like access points and clients must be upgraded.
The first WPA-enabled products are expected in the early Spring of 2003, and upgrades for existing products should be available at around the same time or shortly thereafter.