Intern proves WLAN encryption protocol vulnerable

EE Times: Intern proves WLAN encryption protocol vulnerable. Stubblefield, working as an intern at AT&T Labs with AT&T research staff members John Ioannidis and Aviel Rubin, used the $100 Prism II-based Linksys PC card and a Linux driver that could capture encrypted WEP packets to perform the attack.

Links:

Quote from Stubblefield’s report:

Given this attack, we believe that 802.11 networks should be viewed as insecure.
We recommend the following for people using such wireless networks.

  • Assume that the link layer offers no security.
  • Use higher-level security mechanisms such as IPsec [3] and SSH [8] for
    security, instead of relying on WEP.

  • Treat all systems that are connected via 802.11 as external. Place all access
    points outside the firewall.

  • Assume that anyone within physical range can communicate on the network
    as a valid user. Keep in mind that an adversary may utilize a sophisticated
    antenna with much longer range than found on a typical 802.11 PC card.

[via Tomalak’s Realm]

Leave a Reply