
Securing 802.11b with PPPoE? 40
no free lunches asks: "After giving up in disgust on layer 2 auth like *EAP/802.1x (which is a nightmare to configure properly and requires expensive access points and bleeding edge - flaky - firmware) I am considering controlling access to my wireless LAN (a small 50-user setup, with only one Linux user - me) using PPPoE, and would like to ask the Slashdot crowd their opinion."
So far, the issues can be summarized as follows:
Advantages:
- Totally platform, NIC and AP independent - you can use any NIC, any OS, any access points.
- No IP addresses required on the PPPoE server or the APs - no DHCP, no nothing, so there is no easy way to have access without establishing a PPPoE session.
- Built-in crypto per session - using CHAP for auth and MPPE for data encryption.
- No client/proprietary auth software required on Windows XP (around 40 of my users, and the ones that will actually use this)
- Full session control (IP address assignments, traffic accounting, sessions only allowed during office hours, etc.), same as any remote access server.
- Cheap (server packages available for Linux and FreeBSD, any box can take the load)
- No proprietary IPSec tricks required - yes, I've considered it as an option, but remember, my users are Windows users, and PPPoE has the advantage of removing all IP addresses from the WLAN segment.
Disadvantages:
- No PPPoE clients for PDAs (yet)
- No published HOWTOs on PPPoE server setup under Linux (plenty of DSL/PPPoE client info and at least one HOWTO for FreeBSD, but since PPPoE servers are mostly commercial products, no one wants to give away info for free)
- MPPE encryption has some religious detractors (but it works fine for 98% of my users - the 49- strong Windows laptop crowd - and totally removes the need for WEP key management)
- Rogue PPPoE Servers - not really an issue if you can filter PPPoE frames on the radio interface - and I can, so you need wired access to set up one - but I'd like to know people's opinions on whether this is more than an urban myth fanned by 802.1x proponents.
- Freeloaders can still use the WLAN (even though there are no IP addresses) as a bridged segment (but I can sniff on the PPPoE server interface and/or poll every AP and kick out/ban any MAC addresses without an established PPPoE session - so MAC spoofing is of very limited use).
Mind you, the usual procedures apply (disabling SSID broadcast, changing MTUs for PPPoE, investigating other data encryption methods) so on and so forth, but this approach strikes me as being quite 'clean', cheap and, most important of all, easy to implement NOW instead of waiting for the 802.1x crowd to get their act together (sure, some people will say you can get usable 802.1x now, but my experience with six different vendors indicates that full interoperability is a joke, and that you need all sorts of proprietary items and tweaks - you either use a single vendor for everything, or you're bust).
I know some ISPs are already doing this and I'm sure there are some people with PPPoE knowledge out there, so I'd like to know about similar experiences."
Re:NoNO (Score:3, Interesting)
IPsec is not the Holy Grail - In fact, it's more like the Holy Mess. Just try doing it in a heterogeneous environment (i.e., not all-Linux) and see how far it gets you.
In fact, his idea seems so well thought out (and simple) I'll investigate it myself. I'm totally fed up with wierd vendor-specific solutions.
Re:NoNO (Score:1, Informative)
Ipsec Tricks? (Score:5, Informative)
http://www.natecarlson.com/linux/ipsec-x509.
I've setup an Linux IPsec GW for WinXP with dhcp a few days ago
(Using the x509 patch of course)
Go for it. (Score:5, Interesting)
Document your results in the form of a HOWTO, or HOW-NOT-TO as the case may be. Just remember that active attacks are not necessarily your largest problem. Packets can still be sniffed off the air and analyzed, no matter what protocol you use.
Seperate Network and VPN? (Score:3, Insightful)
DHCP and VPN solutions exist for just about everything.
Re:Seperate Network and VPN? (Score:3, Informative)
'sides, you can DOS a dhcp server by taking all IP's possible.
Re:Seperate Network and VPN? (Score:3, Informative)
And you can DOS anything. Just flood the 802.11 spectrum with crap and nothing will work.
Re:Seperate Network and VPN? (Score:2)
Re:Seperate Network and VPN? (Score:2, Informative)
So the "wireless gateway" hands out IPs to the wireless folks (in a different range from the internal network) and acts as the VPN router for the wireless. That's all that box should do. Then it has no effect on the internal network except for routing authorized network traffic.
Re:Seperate Network and VPN? (Score:2)
Re:Seperate Network and VPN? (Score:2)
http://www.strongsec.com/freeswan/dhcp
If I read the thing correct everything happens encrypted in this example... not 100% sure tho
(DHCPRelay is listening on ipsec0)
More Hassle Than It's Worth (Score:5, Informative)
There's plenty of IPSec and 802.11b HOWTOs out there, and they're pretty useful - just make sure you're using a recent version of racoon, the *nix IKE daemon, and you should be fine.
MPPE (Score:5, Insightful)
Re:MPPE (Score:2)
IPSEC is your friend (Score:1)
Either that, or tunnel everything with SSH2
Try PPTP (Score:3, Insightful)
Re:Try PPTP (Score:2, Insightful)
Re:Try PPTP (Score:2)
Re:Try PPTP (Score:1)
Don't get me wrong, I rather do not advocate PPTP as the best solution for secure wireless networking. I would opt for something which has proven (or belived) to be more secure, like IPSec.
However, I know people deploy PPTP-based VPN networks, for several reasons, among them PPTP being a free (as in beer) VPN version for Windows versions since Windows 95. I know of a university WLAN network which has to deal with numerous clients the network admins don't control and thus have to support as many client versions as possible. They chose to use longer passwords, which function as 'keys' in MS PPTP.It's true that the challange/response authentication scheme has been proven [counterpane.com] to be pretty insecure, mainly because LAN Manager passwords are suffering from significantly weaker encryption than NT passwords, but for backward compatibility reasons both are sent together, always, which makes password guessing way more easy. I figure that is what you refer to as 'breaking keys'. I agree. OTOH, Microsoft released a so-called pptp3-fix, which fixes the LAN Manager password problem. I know there remain a number of other issues, but the main problem has been fixed in there, according to MS and some other [ciac.org] sources.
Still, I am no fan of PPTP. But sometimes, admins face needs which force them to make compromises...
Re:Try PPTP (Score:2, Informative)
1) The kernel patch for ppp w/ mppe support 2) pppd patch for encryption support
check out this link [sourceforge.net]
Re:Try PPTP (Score:1)
I'll try that... I think it'll solve my encryption problems.
zaurus pppoe? (and ppp-over-ssh-in-win-q) (Score:2)
and another thing, does there yet exist a way to windows to get the ppp to talk to a tcp-port instead of com-port?(serial-port-> tcp wrapper basically, i know it's not a good solution/smart but i got a friend who needs to do this and i'm finding it hard for him to install linux/freebsd on his main, and only, computer).
Re:zaurus pppoe? (and ppp-over-ssh-in-win-q) (Score:4, Insightful)
Why TCP Over TCP Is A Bad Idea [sites.inka.de]
If you want to try it, consult the VPN PPP-SSH Mini-HOWTO [linux.org]
Re:zaurus pppoe? (and ppp-over-ssh-in-win-q) (Score:2)
i wasn't asking for a linux/freebsd/anything else than windows solution, but a way to get _windows_ machines to do this(get ppp talking to tcp-pipe, the searches i went through a couple of weeks ago came up empty, but there was a bazillion other guys wanting to do the same on windows platform too, so what i was asking for was that if somebody knew that somebody had written a dummy modem driver that instead of talking to a real modem actually just piped it to a tcp connection..).
Re:zaurus pppoe? (and ppp-over-ssh-in-win-q) (Score:1)
on one box (the trusted box:)
pppd pty 'ssh -t trusting.host.net pppd noipdefault noauth' trusted.box.ip:trusting.box.ip
the -t is important, or pppd on the remote end will choke.
Re:zaurus pppoe? (and ppp-over-ssh-in-win-q) (Score:1)
The situation would change if someone wrote a tun/tap driver for Windows [google.com]
It appears there are all types of network tunnels [netheaven.com] available for other platforms.
Re:zaurus pppoe? (and ppp-over-ssh-in-win-q) (Score:1)
prior to windows 2000 (or NT4 if you can handle PPPoE), there's no easy way to set up tunnels. Win2k and XP can do IPSec tunnel mode, and L2TP/IPSec; either of these are fairly rad and play nicely with free software at the other end.
There's a whole bunch of links floating around the shop with details, most of them are linked from freeswan.org.
Works for me (Score:2, Informative)
Another way? (Score:1)
No complicated setup or client component required, just a browser or SSH. They don't do encryption so you'll need to use encrypted channels(ssl, ssh, etc..).
Re:PPPoE for 802.11 (Score:1)
Despite the fact that this rather funny article on CHAP [experts-exchange.com] claims that reverse-MD5'ing a password is hard, any one way hash is going to be hit hard by a decent dictionary attack, especially since you get to go offline and attack it with as much computing power as you want.
In short, bad idea.