Want more advice for locking down your network? Stay on top of the latest security issues and industry trends by automatically signing up for our free Internet Security Focus newsletter, delivered each Monday.
Years ago, at a computer show during the dot-com boom, I stopped by the booth of a now-defunct high-speed wireless network provider and inquired about the security of the vendor's wireless networks. Specifically, I questioned the inherent insecurity of the 802.11a standard, the prevalent wireless networking specification at the time.
The engineer who was staffing the booth assured me that the company's wireless access was indeed secure, yet he failed to explain how or why. It was more than apparent that he scoffed at the idea that I would even ask such a question—particularly with potential customers present—and he seemed to want nothing more than for me to walk away.
Of course, the booth was quite elaborate, complete with fancy A/V displays and everyone working the booth dressed in sharp suits. But their appearance belied their inability to understand the security of their own products.
However, while most of us recognize the fact that looks are deceiving, appearance still appears to be everything to a whole lot of people. So I'm happy that the well-dressed agents of the Federal Bureau of Investigation recently were able to conclusively demonstrate how insecure the majority of wireless networks really are. In addition, the agency announced that even 802.11b wireless access with Wired Equivalent Privacy (WEP) encryption—widely touted as the secure replacement for the 802.11a standard I was so concerned about years ago—is just as insecure.
I sincerely hope this satisfies those people who insist that a suit and tie are prerequisites for knowledge of security information. It took the FBI literally three minutes to demonstrate how to break WEP encryption and gain access to a secured network.
The FBI's findings should serve as a warning to organizations currently using wireless access, and it might prevent some companies from using wireless networks entirely. Regardless, companies need to be more aware of the critical role that security plays in wireless networks.
Whatever comes of the FBI demonstration, it's important that companies fully understand this concept: Unless you've deployed end-to-end data encryption, communication is never really secure, no matter how well-secured the wireless network. Despite advances in wireless technology, the security of a wireless network will never equal that of a wired network.
Unfortunately, most corporations that have already deployed wireless access chose usability over security, just like most software companies. In addition, many organizations don't consider the fact that wireless access doesn't really offer any advantages over wired access in many cases.
In fact, it can actually introduce new problems. I can't tell you how many times I've witnessed 802.11b wireless network problems caused entirely by the use of 2.4-GHz wireless phones, often from wireless PBX systems.
Despite my own personal disdain for wireless network access, wireless networks are now in the corporate environment, and enterprise deployments are increasing. However, I strongly advise organizations to use this strategy when deciding whether to go wireless: Use wireless networking only in cases where wired access is impossible, not just as a simple or trendy alternative.
And while security should be a primary factor in this decision, keep in mind that there are more than just security-related reasons for staying wired. For example, wired networks can handle significantly higher bandwidth, as well as offer better security, because they don't broadcast packets of information.
But if bandwidth isn't a concern, and the powers-that-be are convinced that wireless is the way to go, rest assured that it is possible to make wireless access much more secure without depending on WEP. Two methods for accomplishing this include using protocols such as Point-to-Point Tunneling Protocol (PPTP) or Layer Two Tunneling Protocol (L2TP) and enforcing access controls with usernames and passwords or some other authentication method. Add IPSec to the mix, and you've got both access control and end-to-end encryption that's more secure than wired network access. But keep in mind that this solution is still prone to interference.
Of course, some people will argue that 802.11i features all of this security provided by Wi-Fi Protected Access (WPA)—WEP's expected replacement—as well as better interference control. While this is great news, 802.11i is no use to anyone until there are plans to replace all existing wireless networking equipment or upgrade the firmware, if that's even possible.
In addition, remember that no matter what security technologies or standards emerge, there will always be someone out there trying to break it—and that includes WPA. In my experience, you can deploy Gigabit Ethernet access at a lower cost, and it provides both superior security and bandwidth irrespective of data encryption.
If wireless access is your only alternative, explore the use of PPTP/L2TP and IPSec on your existing infrastructure before deciding to replace or upgrade existing 802.11a and 802.11b equipment. While it's not "pretty" from a technological point of view, it's quite functional, and it just might prove to be more secure than 802.11i. As for me, I'll stick with wired networks.
Jonathan Yarden is the senior UNIX system administrator, network security manager, and senior software architect for a regional ISP.