New Security Ideas From Intel 151
Scott writes "Intel is developing a new technology that could prevent unauthorized access to wireless networks using the time it takes for packets to arrive from the access point to the Wi-Fi user. This is one of several ideas were presented at Intel Developer Forum. Intel has also released a hardware-based solution to fight against worm spreading. From the report: 'The system monitors the number of external connections being made and if a higher network activity is detected, the computer is disconnected to prevent the infection of further machines on the network.'"
The security of your wireless network... (Score:5, Insightful)
Re:The security of your wireless network... (Score:1)
Re:The security of your wireless network... (Score:2, Informative)
Not all worms requires the user's involvment (cf zotob [slashdot.org]).
Re:The security of your network... (Score:2)
Until every single app can work seamlessly under Linux (either natively or via Wine), it's not an option
Sounds Fantastic (Score:1, Funny)
Re:Sounds Fantastic (Score:3, Funny)
It's because of people like you that I cannot touch our company's periodicals library. Damn you! DAMN YOU TO HELL!
Re:Sounds Fantastic (Score:2)
So don't look too harshly upon brown-tagged periodicals. They have their place in the media food chain.
Say Goodbye (Score:4, Interesting)
Say goodbye to P2P and BT.
Re:Say Goodbye (Score:1)
Distinguishing P2P from worms (Score:4, Informative)
If you tell the router which port you run your P2P on (e.g. I usually run Azureus on port 6502), then it should be able to distinguish P2P traffic from virus traffic. Besides, virus connections are usually much shorter lived than P2P connections, right?
Re:Distinguishing P2P from worms (Score:4, Insightful)
Usually these days they go in through a buffer overflow in some network application (such as P2P clients).
The bottom line is it's really hard to tell what's a virus and what's not (viruses tend to disguise themselves).
That's why they're trying out this method. Yes it's got some problems, especially for the home user, but for corporate situations this might work.
It all depends on how smart their algorithm is.
Re:Distinguishing P2P from worms (Score:1)
Re:Say Goodbye (Score:3, Insightful)
Re:Say Goodbye (Score:2)
Comment removed (Score:5, Insightful)
I hope so (Score:2)
I hope you're right! All those open WAPs are so convenient.
(This post should not be interpreted to advocate actions which may be illegal in your jurisdiction and probably mine too.)
Re: (Score:2)
Won't matter. (Score:2)
I hope you're right! All those open WAPs are so convenient.
Won't matter. They'll ship 'em with the limit turned on. The clueless will leave it that way, only the clueful who WANT to allow open access will turn it on.
APs are shipped with open default configs so users can get them up and running without making an expensive service call. Limiting the range won'
Re:If anyone actually bothers to turn it on.. (Score:5, Insightful)
Or take any other measures to secure the device for that matter, like preventing access to unknown MACs, limiting usage to certain times of the day, not broadcasting the SSID, etc, etc...
This is one of those cases where some of the people that want devices like these have absolutely no idea how to use them correctly. To me, it's like handing the keys to a Ferrari to a 12 year old. ALL of my neighbors have open access points, so whenever people come over to my house with wireless equipment, I don't even bother to modify my network to let them in - I just tell them to sit by a window and inevitably they get all the bandwidth they need.
Intel is developing a new technology that could prevent unauthorized access to wireless networks using the time it takes for packets to arrive from the access point to the Wi-Fi user.
I think this is supposed to read "using the time it takes for packets to arrive from the Wi-Fi user to the access point. I have no idea how an access point would be able to monitor how long it took for its packets to make it to the clients...
Re:If anyone actually bothers to turn it on.. (Score:5, Insightful)
It probably measures the time between transmission, and the reciept of an ACK(nowledgement). Of course, you'd think a really bogged down machine with a USB Wifi adapter could concievably return ACKs a little slow, and get dropped.
All in all, it seems like a pretty goofy idea: "Secure your WAP: artificially limit it's already meager range!"
Makes sense to me. (Score:2)
If it means accepting connections from people in the building and rejecting those from people in the parking lot, across the street, or in the competitor's facility next door, I bet it will go over big with enterprise users.
Measuring with multiple receivers can also pinpoint the client location, not just distance, even in the presence of unceartainty in turnaround time. Also: Turnaround time unce
Looks good for home units, too. (Score:2)
What's wrong with having an adjustable range limit? It makes perfect sense to me.
In particular: Permissions-based configurations lead to most home users having wide-open APs. The incentive on the manufacturers is to ship a default configuration with the door wide open, so the user doesn't have trouble getting connected on instalation. Of course most users stop once it's up and running, so most
Re:If anyone actually bothers to turn it on.. (Score:1, Insightful)
nice going!
Re:If anyone actually bothers to turn it on.. (Score:4, Insightful)
Re:If anyone actually bothers to turn it on.. (Score:2)
That's what it would take to be certain that those installing them had the smarts to do it safely. Most of these non-secured AP's are installed by the same person that uses them.
Re:If anyone actually bothers to turn it on.. (Score:3, Insightful)
And yet, no one makes this a requirement. Like when you get an ATM card and they make you change the PIN when you activate it. Really, how hard is this?
Re:If anyone actually bothers to turn it on.. (Score:2)
Re:If anyone actually bothers to turn it on.. (Score:3, Insightful)
so what's the solution? (Score:4, Insightful)
What is the solution to this? I am hardly an expert on supply-side economics relating to production, but how hard would it be to set a random password for both the router and the wireless network? Include a piece of paper with both the password written on them (kind of like a manual addendum, that way each manual won't have to be customized). Or better yet, make the default password the serial number of the router. Extremely difficult to guess, usually a string of alpha and numerics, and the user could never really lose it (unless they removed the serial number sticker from the router).
There has to be a better way of doing things than what currently exists. To offer a product to consumers that has no security whatsoever in an out of the box condfiguration is moronic. Even more moronic is the fact that the consumer (I'm speaking in general terms of course) makes no effort to read the manual. You would think that logic would strike them in the face as they connect to their network for the first time...
"Oh, look, Windows automagically detected my wireless network!"
"Neat, now it's joined! That was easy..."
"Almost TOO easy"
*smack* (this is the sound of logic smacking them in the face)
"Wow, maybe I should do something so that it wouldn't be this easy for other people!"
Re: (Score:2, Insightful)
Re:so what's the solution? (Score:2)
I also share a dream of a socialist wifi sharing utopia, but public paranoia over security is definitely making this an issue. Look at the recent arrest in FL (there was a slashdot article about it, too lazy to look it up) where a man was arrested for leeching wifi. Granted, he was a dumbass who did it from a car, and also in the same location for many hours... but the potential for abuse does exist, especially in urban areas where there are many more users within
Re:so what's the solution? (Score:4)
You made a mistake here. Using the word "socialist" immediately sends a "strawman alert" through the brains of anyone reading your message. It's just overused nowadays, and doesn't have the same "oomph" as it did when Soviet Union was still the evil empire.
The consumers couldn't care less about security, as proven by their continued usage of Windows, for example. And why should they ? It's not like it harms them in any way if someone piggypacks on their connection - especially if they can do the same on their neighbour's connection, which will lead to traffick being routed through whatever connection has most unused available.
No, it is the four- and three-letter acronyms that want security - RIAA, MPAA, FBI, CIA etc. If people are free to connect through whatever wireless connection happens to be available, they are pretty difficult to monitor. Make them connect through a single designated pipe, and you can pin easily monitor all incoming and outgoing traffick for a particular person.
Furthermore, as wireless access points grow more numerous, you would eventually get to a point where IP packets would simply be routed from one wireless point to the next, forming an uncensorable internet. That is unacceptable - all countries want to censor their citizens. Even Finland recently found an arrangement where the police gives a list of websites to be blocked to the ISP's, who will then block them - this was done to combat child porn, of course; now let's see how long until someone starts demanding that hate speech, illegal file sharing, and whatever else he might have a grievance against gets blocked by the Great Firewall of Finland.
A privately owned (by private citizens, not corporations) and operated Internet, made up of wireless access points routing packets outside the corporation owned wires would make such censorship impossible, so better to kill it off before it really catches on. That is the true motive behind these calls for security.
Yeah, but that means that you purposefully allowed your access point to be used by anyone, making it much easier to succesfully sue you for any illegal actions someone might conduct through it.
Who do you work for ? CIA ? FBI ? RIAA ? MPAA ? How well did they pay you for your message ?
Re:so what's the solution? (Score:1)
Re:so what's the solution? (Score:2)
What is the purpose of your question?
Re:so what's the solution? (Score:2)
Disconnects on too many connections... (Score:5, Funny)
Please. Slashdot has had the same effect on websites for years.
Re:Disconnects on too many connections... (Score:2, Interesting)
Time to drag out this old chestnut: (Score:5, Insightful)
Re:Time to drag out this old chestnut: (Score:3, Insightful)
On the contrary, using a device that implements security through proximity is a good way to make use of your existing physical security procedures.
Re:Time to drag out this old chestnut: (Score:2)
I hear tell there are multi-story buildings with different businesses on different floors too.
Huh? (Score:4, Insightful)
No thank you. Don't decide for me what traffic I can generate.
Re:Huh? (Score:1)
Re:Huh? (Score:3, Informative)
This has nothing to do with the actual 'ping time' of data sent using the wireless protocol, rather it has everything to do with the 'ping time' of protocol itself.
Re:Huh? (Score:2)
Meaning that it assumes that people using a device from too great a distance must be a hacker? Do network cards / computers have predictable enough response times? I say that because sometimes there is some other processes might slow down response times, and a computer chugging along on a bunch of eyecandy might not respond quickly enough.
Re:Huh? (Score:2)
The response time of a wireless NIC is several orders of magnitude faster than the time it takes for a signal to travel through the air (think of the difference between a CPU hitting cache vs a CPU hitting main memory and multiply by a factor of ~250 per 100 feet).
Obviously, this technique isn't precise to the exact cm, but the tolerances are acceptable. In other words, the coverage pattern won't
Re:Huh? (Score:2)
2) I know about TCP and how ACK and SACK works, thankyouverymuch.
Re: (Score:1)
Indeed (Score:1)
The first idea sounds like some geek's dissertation. Bully for you, Dr. Poindexter, you get the degree, but you don't get the VC. The second is just stupid, a naive case of traffic conditioning.
Here's a novel idea for security--stop writing crappy software. This will never happen so long as profit$ = quality / time. That's why I hate programming, and why I'm now doing system administration t
im skeptikal... (Score:1, Interesting)
Re:im skeptikal... (Score:2)
Are these ideas well thought through? (Score:2, Insightful)
Re:Are these ideas well thought through? (Score:2)
But the connect limit would have to be configurable to accomodate people's usage patterns... and if the limits are programmable, nothing is stopping a virus from altering them even if the limiting itself is done in hardware.
Local space-time distortion (Score:2)
The speed of light in the neighborhood of the device might be locally distorted, too. (I hate it when that happens. I loose all track of time.)
irresponsible paranoia induction (Score:1, Interesting)
Re:irresponsible paranoia induction (Score:2, Interesting)
The thought of having other people using my ISP account, which has my name on it, to do ilegal or inmoral (to me) stuff like spam, warez, piracy, etc is enogh to think about security. The fact that I don't wan others sucking up my bandwithd is another thing I think off.
I would donate part of my bandwidth to the general community though. If it was easy and secure.
Regarding others reading my packets, well I already asume that,
Security??!!??!! (Score:2)
The system monitors the number of external connections being made and if a higher network activity is detected, the computer is disconnected to prevent the infection of further machines on the network. You'd have to wonder how many people are that transucent to understand once you're connected to a netwrk, you're vulnerable from many varieties of attacks, no matter what browser you use.
These people make sure that they find workable ways around browsers to ensure the installation
Wrong vector, wrong layer, respectively. (Score:5, Insightful)
Crackers are developing new technologies to enable unauthorized access to wireless networks using the time it takes them to intercept and retransmit packets between the access point and the Wi-Fi user.
As for the "solution" of detecting worms by autokilling connections when bandwidth usage changes in a way that the software didn't predict, (in a way that's more likely to cripple your favorite P2P client software more than it's likely to disable a worm that decides to start slowly and ramp up), how about Intel gets off its sorry ass (if you felt a rant coming on, you were right) and comes up with a real solution to connection hijacking -- namely by implementing cryptographically strong authentication between client and access point at Layer 2 of the OSI model, not Layer 7.
Oh, right. Securing Layer 2 instead of Layer 7 would harm the interest of those in charge of writing Layers 8 (financial) and Layer 9 (political) of the 7-layer model.
Circuitbreaker *not for home users and developers* (Score:5, Informative)
This kind of technology is not interesting to home users, or even for developer workstations: nobody is going to want to use a technology that cuts off their personal computer. The place it looks (IMHO) to be aimed at is ordinary user desktops in large corporations. These are (supposed to be) highly locked-down environment and controlled tightly by the sysadmins. In this environment, the IT manager is going to prefer inconveniencing a few users by cutting their 'net connection than managing a widescale worm outbreak that'll likely take the rest of the network down for everyone.
Horses for courses: home users and developers will still be best served by taking precautions (virus scanners and social countermeasures) and being vigilant for signs of an outbreak.
Re:Circuitbreaker *not for home users and develope (Score:2, Insightful)
So how long before your ISP picks it up? Think of upload caps, port blocks and smtp jails as other "technologies" that piss users off and don't do anything for security.
Re:Circuitbreaker *not for home users and develope (Score:2)
This kind of technology might be useful to ISPs (from their point of view) but it's something I'd pay extra to avoid - I'd been very happy to vote with my wallet by going to another ISP, as long as the competition is available (not in my case
OTOH, will the availability of this technology *really* make the situation much worse
Westell 327w (Score:3, Funny)
The system monitors the number of external connections being made and if a higher network activity is detected, the computer is disconnected to prevent the infection of further machines on the network.
My router, a Westell 327w, already has this feature. It locks up when I use the wifi for anything remotely network-intensi...NO CARRIER SIGNAL
I have a Westell 327w too. (Score:2)
I use it for (mostly) Web sites (including now) and also for gaming. You are perfectly right, the VersaLink (as Westell marks it) does disconnect the wireless (and sometimes even the Ethernet) connection sometimes, especially when both are active--and sometimes when both are needed. (Playing SOCOM II while finding a "war" on Game Battles [gamebattles.com], etc.) I ued to think it was just the ISP booting us for abuse; from what you say, I believe it is That Damn Modem.
Usually, it gets teh job done, though.
A-HEM... (Score:2)
hmm (Score:3, Interesting)
Also, the article says this proposed change will require change to existing Wi-Fi devices. IS that really going to happen in near future?
Pardon my complete naivette... (Score:1)
Re:Pardon my complete naivette... (Score:2)
You'd still be completely vulnerable to worms that exploit buffer overflows and the like. The only difference is that a reset will cure you.
But I suppose this is what is meant by 'dumb terminals'.
No. Dumb terminals, such as Sun Rays, don't have their own processors and memory.
Re:Pardon my complete naivette... (Score:1)
bye bye bittorrent (Score:4, Insightful)
What is there here that can't be done with software ?. Oh, wait .. that needs Microsoft to do it. Doing it at the WiFi card level might give intel an advantage - but most likely they'll just push this into the driver code. Then we're back to the "why doesn't Microsoft do this" - though in truth, we should chuck it and use Linux.
It essentially means that the moment I run bittorrent, Intel's new WiFi chip will throw me off the network. That's what it'll do for most of us.
> The access point times the time it takes a packet to arrive the client and go back. Using this time, the access point can predict the location of the user and tell whether a client device is inside or outside the allowed area, for example office wall.Similarly all Ethernet cards will have something that allows only packets addressed to it's MAC address to be read. And then someone will find out a way to work around that. I could rephrase when guns are outlawed, only outlaws will have guns - but this is even worse. Intel will create APs which have an artificially limited range to prevent you from taking your laptop to the crapper. This is almost like the userfriendly joke about laptops chained to the desk form of security.
Truly these are ideas to be sold, not products. Once people buy in on the security of these things, intel hopes to make a killing for no extra-work (yes, we have to buy the NEW secure WiFi cards and then just boot up that AP, let's get mailing status reports - leaving a router with "linksys" wide open). Security needs care and control - just cheap hacks on hardware will not do .I wonder which new technology (Score:4, Interesting)
Could it be..
It seems like Intel might be searching for an automatic solution for this problem, which is bound to fail as quickly as they can put it out in the wild. How do you protect users from bad network setups if the users largely aren't aware that the problem exists? We don't need new technology, we need to modify existing technology that, while it might add a few extra steps, forces users to pay attention to the problem that everyone here is already aware of.
as if it wasnt easy enough... (Score:5, Insightful)
DOS attacks have just gotten easier.
easier morphs to intentional Denial of Service (Score:2)
Yes, and the potential for worm based inward-facing DOS attacks is very real, even though most DOS attacks are thought of as accidental (due to network traffic from the probing threads) or outward facing (directed at remote web site). It's one of the more interesting aspects of this Zotob outbreak, but not well reported.
Zotob (and variants) demonstrated that an internal DOS attack can be about as devastating as the worm / botnet infestation itself. The massive
no one cares because it's not been justified (Score:2)
There are plenty of existing ways of securing an existing Wi-Fi network. Those who care will.
A lot of the reason people don't know how to secure their networks is because people have never been give a reason to learn. In spite of all this talk from the security conscious about why they should lock down their networks (the most compelling justification I feel is to make sure illicit things (terrorism, kiddie por
Huh? (Score:1)
I'm accustomed to technical descriptions occasionally lapsing into arcana, but come on. Is a grammatically correct sentence too much to ask? Sure, you might say 'But you were able to figure out what they meant', but the fact is I had to work to get the drift of it, and I know I may have misinterpreted something. I suspect they weren't
Time for Clarke's Corollary? (Score:4, Interesting)
(OK, so it has nothing to do with Clarke's Law, other than sharing the same sentence pattern.)
Re:Time for Clarke's Corollary? (Score:2)
Any worm distinguishable from normal user traffic is insufficiently advanced.
-
More like new workarounds... (Score:2, Insightful)
As opposed to, say, enabling encryption?
"Intel has also released a hardware-based solution to fight against worm spreading."
The software-based solution is using a real OS. Another hardware-based solution is to refuse to run any Microsoft operating systems.
Innovation may rescue the Windows monoculture (Score:3, Insightful)
Windows won't be going away any time soon, so there will remain plenty of worm fodder. I am surprised by the number of relatively unsophisticated home users who are switching to Mac OS X or Linux as a result of adware, spyware, and worms, but I haven't seen the same switcher phenomenon occurring in corporations.
Besides, worms probably wouldn't go away even if Windows did. Although conventional wisdom says that a large pool of exploitable systems is
"anti-worm" may as well be "anti-bittorrent". (Score:1)
ok.. so this will also cut off anyone who uses bit torrent or any other swarming distribution program, regardless of legitimate or illegitimate activity. Fun.
Re:"anti-worm" may as well be "anti-bittorrent". (Score:2)
Such a system would have to be tuned properly, and yes, bittorrent would probably be a casualty of this sort of thing. Often times the tuning of these sorts of systems can be nearly impossible in a big organization that cannot have downtime or helpdesk calls from fa
Higher activity? (Score:1, Offtopic)
Security Conservation (Score:2)
Maybe tightly focused beams of radio energy, connecting transmitter and receiver with thin, long low po
Well, why bother .. (Score:2)
Re:Well, why bother .. (Score:2)
Re:My system isn't very complicated .. (Score:2)
It is not like I could not see the NSA trying it out, but for every other institution your idea is just not how affordable electronics is handled.
Re:My system isn't very complicated .. (Score:2)
Re: Quantum entanglement is easy and cheap? (Score:2)
Also QE gets down to the smallest unit that energy can be measured in - your system would still risk to be snooped on by a detector that didn't milk much power. So eventually your system with increasing sophistication would end up being a quantum entanglement system as well.
Your idea is quite useful to detect someone exploting an existing system, but not as a concept for the design of a new system.
Re:Security Conservation (Score:2, Funny)
This has been available to us since 4/1/03, and comes to us via Steve Bellovin, a security guy of note.
Re:Security Conservation (Score:2)
If you're hanging around Slashdot for the rigorous engineering, you really shouldn'
Brilliant! (Score:1)
So any one macine will only have time to infect five others. Problem solved!
Hardware-based solution to worm propagation (Score:1)
Re:Hardware-based solution to worm propagation (Score:1, Interesting)
some other thing using a well known protocol will come along.... hey lets block it, not like this is called the internet or anything.
Re:Hardware-based solution to worm propagation (Score:2, Interesting)
Re:Hardware-based solution to worm propagation (Score:2, Interesting)
Are you implying that the constant complaining I was hit with was all about nothing?
bell south even admitted to them the problem was they were blockign port 25, but didn't indicate they'd do something to alleviate those little "inconveniences" involving non-working email and routers.
Whoops!
Re:Hardware-based solution to worm propagation (Score:2)
If you want to DIY, just run on a different port. If you can't figure out how to do that, then you shouldn't be running your own mail server.
I ran into this problem yesterday when I was setting up my computer from someone else's LAN that had port 25 blocked. I ssh'd into my server and set up another
unauthorized access (Score:3, Insightful)
There already exist a number of methods for preventing unauthorized access to wireless networks: stopping SSID broadcasting, filtering MAC addresses, WPA, and even IPSEC for the paranoid. People already don't use what is available because they don't think it is important. What makes Intel think they will use this? It seems to me that the automatic response to security mechanism these days is "turn it off, it's too confusing and we aren't trying to hide anything." A lot of people just don't understand that their passwords and credit card numbers are being sent over the airwaves in cleartext and can be easily intercepted unless you use the security features of your access point.
Re:unauthorized access (Score:2)
I have had this for years (Score:2, Funny)
Mostly its not anything special just a 25 foot cat5 cable.
Securing Wireless... (Score:2)
I could imagine a collection of settings on the remote device (Home, Office, Starbucks) that once set, are kept and automatically scanned through when powered on, and uniquely indentified. (each user getting a key set could ge
Torrent? (Score:2)
I see it now...
*open Azureus or other BitTorrent client*
*50+ connections very quickly*
*Intel has used hardware to protect you from yourself. Have great day*
-M
The physics (Score:2)
In order to establish a "bubble" within which users must be located, you have to determine the position of the furthest legitimate user and then add one foot per nanosecond of worst-case response time. For a real-world situation, this new sphere is likely to take in some real estate that isn't under you