From: John Navas on
On Sun, 07 Dec 2008 00:06:09 +0000, Mark McIntyre
<markmcintyre(a)TROUSERSspamcop.net> wrote in
<UrE_k.100536$i92.27467(a)en-nntp-03.am2.easynews.com>:

>Jeff Liebermann wrote:
>> On Sat, 6 Dec 2008 05:42:55 -0800 (PST), Chrisjoy
>> <ultralibertarianer(a)gmail.com> wrote:
>>
>>> Logging on to windows need users to know this:
>>>
>>> 1) Knowing the name of your own account.
>>> 2) Knowing the spelling of your own account password, and where the
>>> keys are at the keyborard.
>>
>> A fingerprint reader can be used in place of the login and password.
>> I've had rather bad luck at getting users to consistently use the
>> reader, but it does work. The ones where you swipe the finger over a
>> narrow reader window seem to be a problem. The ones where you just
>> press your finger onto a larger window, work much better (but cost
>> more).
>
>Unless you go high-end these things are horribly insecure. I've toyed
>with deploying them but having watched the issues that others have had,
>shied away. Typical problems would seem to be too many false negatives,
>too easy to sniff, foolable by a variety of creative methods not
>including severing digits, and not hooked into the OS at a low enough
>level to properly secure the login.

That's a joke, right? LOL! Assuming you can get past that worry, check
out the integrated security solution in Lenovo ThinkPads equipped with
security chips, fingerprint readers, and encrypting hard disk -- they
are very reliable and secure.

>The way a lot of banks and market data vendors do it nowadays for
>internal logins is with a chip-n-pin type card and a card reader slot in
>the keyboard. The next level up is a pin and an RSA securid dongle to be
>used in conjunction with your normal uid and pwd to login to the company
>vpn.

A physical token is of course much easier to compromise than severing a
digit. ;) Regardless, I'm frankly not terribly impressed by the bank
measures I've seen, which is why I'm not terribly surprised by all the
security breaches that have occurred, most of which never make the
press.
--
Best regards, FAQ for Wireless Internet: <http://wireless.navas.us>
John Navas FAQ for Wi-Fi: <http://wireless.navas.us/wiki/Wi-Fi>
Wi-Fi How To: <http://wireless.navas.us/wiki/Wi-Fi_HowTo>
Fixes to Wi-Fi Problems: <http://wireless.navas.us/wiki/Wi-Fi_Fixes>
From: Jeff Liebermann on
On Sun, 07 Dec 2008 00:08:48 +0000, Mark McIntyre
<markmcintyre(a)TROUSERSspamcop.net> wrote:

>Jeff Liebermann wrote:
>> On Sat, 6 Dec 2008 06:31:21 -0800 (PST), Chrisjoy
>> <ultralibertarianer(a)gmail.com> wrote:
>>
>>> About 85% of all internet traffic is P2P, and close to all of it
>>> contains copyrighted material that is illegal to download.
>>
>> I think 75% is a more accurate figure.
>
>I doubt its even that nowadays, not if you mean "illegal p2p". Over here
>in the UK all the main free-to-air TV broadcasters now have totally
>legal p2p watch-again services which I suspect eat a heck of a lot of
>bandwidth.

Good point. Here's Cisco's numbers:
<http://www.cisco.com/en/US/solutions/collateral/ns341/ns525/ns537/ns705/ns827/white_paper_c11-481360_ns827_Networking_Solutions_White_Paper.html>

"Traffic from all applications grew in volume in 2007,
but the traffic mix shifted considerably. Peer-to-peer (P2P)
file sharing networks are now carrying 600 petabytes per month
more than they did this time last year, which means there is
the equivalent of an additional 150 million DVDs crossing
the network each month, for a total monthly volume of over
500 million DVD equivalents, or two exabytes. Despite this
growth, P2P as a percentage of consumer Internet traffic dropped
to 51 percent at the end of 2007, down from 60 percent the year
before. The decline in traffic-share is due primarily to the
increasing share of video traffic. A secondary factor in the
decline is the uptake of web-based file in some regions."

Scroll down to Table 5 for peer-to-peer numbers.

Looks like you're right about online video file sharing and viewing.

"Video is now approximately one-quarter of all consumer Internet
traffic, not including the amount of video exchanged through
P2P file sharing. Internet video grew from 12 percent in 2006
to 22 percent in 2007, and will reach 31 percent by the end of
this year."

I haven't done the numbers for my wireless coffee shop customers yet,
but will try to do so Sunday, after I recover from the traditional
Christmas dinner over eating.

>> You would if you've ever been ripped off. I have and it completely
>> changed my attitude toward copyright protection and enforcement.
>
>Kinda depends on how, to what extent, and to what commercial or
>reputational loss.

It's a complex mess that I don't want to openly discuss. Sorry.


--
# Jeff Liebermann 150 Felker St #D Santa Cruz CA 95060
# 831-336-2558 jeffl(a)comix.santa-cruz.ca.us
# http://802.11junk.com jeffl(a)cruzio.com
# http://www.LearnByDestroying.com AE6KS
From: Jeff Liebermann on
On Sun, 07 Dec 2008 00:06:09 +0000, Mark McIntyre
<markmcintyre(a)TROUSERSspamcop.net> wrote:

>Jeff Liebermann wrote:
>> A fingerprint reader can be used in place of the login and password.
>> I've had rather bad luck at getting users to consistently use the
>> reader, but it does work. The ones where you swipe the finger over a
>> narrow reader window seem to be a problem. The ones where you just
>> press your finger onto a larger window, work much better (but cost
>> more).

>Unless you go high-end these things are horribly insecure. I've toyed
>with deploying them but having watched the issues that others have had,
>shied away.

They seem ok to me for "casual" use. My main concern is what happens
to a desktop or laptop if the user/owner walks away, and some shoves
in a USB dongle or something similar in their absense. My having the
user lock the PC, that problem is reduced somewhat.

Personally, I wouldn't mind seeing some system of face recognition
deployed on laptops with cameras. It's probably even less reliable
and secure than the fingerprint reader, but it sure will be more
convenient, which means users may actually be inspired to use it.

>Typical problems would seem to be too many false negatives,

Agreed. The software requires that you train the reader with 3
successful reads in a row. That turns out to be amazingly difficult
to do. After using one for a day, my batting average was only about
75%. It seemed like every other scan had to be done twice.

>too easy to sniff,

How so? The swipe type readers are inside the laptop. One was on a
Dell XPS something laptop. Two others on various Lenovo laptops.
There was no way to tap the data.

What did work quite well was an external reader. It was plugged into
a USB port and most certainly can be tapped and sniffed. However, it
didn't require swiping the finger across the reader, which made it
much easier to use and far more consistent.

Incidentally, the generally acknowledged best biometric practice is
currently retinal eye recognition. One that I saw, but haven't played
with, is thermal imaging of the blood vessels in the hand. Expensive,
but quite unique, reliable, and probably impossible to spoof.

>foolable by a variety of creative methods not
>including severing digits, and not hooked into the OS at a low enough
>level to properly secure the login.

Other than using the software, I have no experience with how it works.
I'll plead ignorance here.

>The way a lot of banks and market data vendors do it nowadays for
>internal logins is with a chip-n-pin type card and a card reader slot in
>the keyboard. The next level up is a pin and an RSA securid dongle to be
>used in conjunction with your normal uid and pwd to login to the company
>vpn.

Yep. That's also what I'm seeing for HIPAA compliance at hospitals.
However, I've also seen what I assume to be an RFID reader system that
doubles for door access control. I smell lots of potential problems
with these, but haven't had a chance to dig deeper.

--
# Jeff Liebermann 150 Felker St #D Santa Cruz CA 95060
# 831-336-2558 jeffl(a)comix.santa-cruz.ca.us
# http://802.11junk.com jeffl(a)cruzio.com
# http://www.LearnByDestroying.com AE6KS
From: Jeff Liebermann on
On Sat, 6 Dec 2008 12:12:26 -0800 (PST), Chrisjoy
<ultralibertarianer(a)gmail.com> wrote:

>I don't need accounts. I don't want accounts. I only want different
>key for each session, and this is ONLY motivated by protecting guests,
>that is our custommers, from being sniffed at.

Setup the RADIUS server to accept a "guest" login with no password. I
think a blank password will do the trick, but I have to try it to be
sure. I don't think you can use a blank login, but maybe that's
possible. Even though everyone has the same login and blank password,
they will get different WPA encryption keys from the RADIUS server.
Since you were able to setup a RADIUS server with MySQL in 1 hour, I
would think you could try a blank login or password in a few seconds.

>Are you unable to
>answer me on my terms?

Does it matter? I present you with the best answers and advice that I
can offer. I explain most of what I present. If you fail to
appreciate or benefit from such advice, that's your problem. You've
offered me no reason or incentive to comply with your terms, whatever
they may be.

Incidentally, although this does not comply with your terms and
requirements, you might find it interesting. It's basically an online
RADIUS server service:
http://www.linksys.com/wirelessguard/
The catch is that it uses services from Wireless Security Corp, which
was bought by McAfee and appears to be unsupported, dead, or
something.

--
# Jeff Liebermann 150 Felker St #D Santa Cruz CA 95060
# 831-336-2558 jeffl(a)comix.santa-cruz.ca.us
# http://802.11junk.com jeffl(a)cruzio.com
# http://www.LearnByDestroying.com AE6KS
From: John Navas on
On Sat, 06 Dec 2008 20:32:10 -0800, Jeff Liebermann <jeffl(a)cruzio.com>
wrote in <fjjmj4t96u64er82u5qvsd4k50tjf2hthf(a)4ax.com>:

>On Sat, 6 Dec 2008 12:12:26 -0800 (PST), Chrisjoy
><ultralibertarianer(a)gmail.com> wrote:
>
>>I don't need accounts. I don't want accounts. I only want different
>>key for each session, and this is ONLY motivated by protecting guests,
>>that is our custommers, from being sniffed at.
>
>Setup the RADIUS server to accept a "guest" login with no password. I
>think a blank password will do the trick, but I have to try it to be
>sure. I don't think you can use a blank login, but maybe that's
>possible. Even though everyone has the same login and blank password,
>they will get different WPA encryption keys from the RADIUS server.
>Since you were able to setup a RADIUS server with MySQL in 1 hour, I
>would think you could try a blank login or password in a few seconds.

I suggest using (hashing) the MAC address of the client as a login ID to
provide an audit trail of sorts, although the other tricky bit would be
creating RADIUS accounts invisibly and dynamically. But you're correct
that even a single RADIUS account will still ensure unique encryption of
different wireless connections (by generating a different Master Key for
each session even for the same login ID).

But snooping of WPA-PSK traffic is non-trivial. I think the much bigger
risk is allowing wireless clients to connect to each other. (Think
accidentally open shares.) Unless there were unusual requirements, I'd
probably just publish a simple WPA-PSK key (in the SSID as well), turn
on wireless-to-wireless isolation, and be done with it. I think it's
unfortunate that most public hotspots don't do this.

One of the reasons I use and recommend Thinkvantage Access Connections
over WZC for ThinkPad computers is that it allows you to configure
profiles to selectively disable File and Printer Sharing (and Internet
Connection Sharing, etc).

>Incidentally, although this does not comply with your terms and
>requirements, you might find it interesting. It's basically an online
>RADIUS server service:
>http://www.linksys.com/wirelessguard/
>The catch is that it uses services from Wireless Security Corp, which
>was bought by McAfee and appears to be unsupported, dead, or
>something.

It's pretty cheap and easy to setup a RADIUS server (e.g., FreeRADIUS)
on a networked PC. I like the ASUS Eee PC because it's cheap, reliable,
and essentially has its own built-in UPS -- about $250 for the 4G.
Or a used computer can be used to bring the cost down even more.

FWIW I do agree it's unfortunate that Master Key generation in WPA-PSK
is so completely predictable -- I think it would have been better to put
some effort into making Master Keys unique to each session even with the
same PSK. And I don't think this is 20-20 hindsight -- it's something
I think should have been done as a matter of course -- I was surprised
when I first learned it hadn't been done.
--
Best regards, FAQ for Wireless Internet: <http://wireless.navas.us>
John Navas FAQ for Wi-Fi: <http://wireless.navas.us/wiki/Wi-Fi>
Wi-Fi How To: <http://wireless.navas.us/wiki/Wi-Fi_HowTo>
Fixes to Wi-Fi Problems: <http://wireless.navas.us/wiki/Wi-Fi_Fixes>