Tackling security vulnerabilities in VPN-based wireless deployments

被引:3
作者
Fazal, L [1 ]
Ganu, S [1 ]
Kappes, M [1 ]
Krishnakumar, AS [1 ]
Krishnan, P [1 ]
机构
[1] Avaya Labs Res, Basking Ridge, NJ 07920 USA
来源
2004 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-7 | 2004年
关键词
wireless LANs; security; VPNs; hidden wireless router; vulnerability;
D O I
10.1109/ICC.2004.1312460
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Current "best practice" recommendations for enterprise wireless deployments suggest the use of VPNs from a wireless client for both authentication and privacy. In this paper, we demonstrate a security issue with such deployments, which we refer to as the hidden wireless router vulnerability. This vulnerability is inherent in the VPN-based wireless LAN architecture, and leads to unsuspecting clients becoming conduits for an attack, exploiting features readily available in popular operating systems like Windows(TM) and Linux. We describe the attack scenario, and possible solutions for, both detecting and locating such hidden wireless routers. Our solutions include a range of possibilities stretching from purely passive to active probing methods, and Access Point-based solutions. We describe our techniques and results of our implementation and experiments.
引用
收藏
页码:100 / 104
页数:5
相关论文
共 12 条
  • [1] [Anonymous], 8021X IEEE
  • [2] [Anonymous], 80211I IEEE
  • [3] Arbaugh W., 2001, P 1 IEEE INT C WIR L
  • [4] BAHL P, 2000, P IEEE INFOCOM
  • [5] Borisov N., 2001, P 7 INT C MOB COMP N
  • [6] FLUHRER S, 2001, P 8 ANN WORKSH SEL A
  • [7] GANU S, 2004, P 2004 IEEE WIR COMM
  • [8] GEIER J, 2002, 80211 WEP CONCEPTS V
  • [9] KRISHNAN P, 2004, P 23 IEEE C COMM INF
  • [10] Mishra A., 2002, CSTR4328 U MAR