Securing the Black Hat Wi-Fi Network
How do you provide military-grade secure wireless
network connectivity to 6,000 hackers? We take a look inside the Network
Operations Center at the Black Hat 2012 conference.
By Abin |
July 26, 2012
LAS VEGAS. With over 6,000 attendees, the Black Hat Wi-Fi network is
one of the most hostile networks on Earth. Attendees routinely test the
network and attempt to exploit both the show as well as other attendees.
The job of provisioning and defending the Wi-Fi network at Black Hat
falls to Aruba Networks. It's a job that Aruba has been doing at Black
Hat both officially and un-officially for the last seven years. For this
year at Black Hat, Aruba deployed more than 35 access points across
multiple session rooms to deliver seamless connectivity.
Aruba engineer Robbie Gill explained to TechnoHelp
that approximately 15 of those access points are connected in a mesh
topology. In a mesh, each access point can connect to another access
point in order to provide backhaul connectivity. The others can be
directly connected to the main controller.
Rogue access points is one of the challenges faced by Aruba. Clogging
the available spectrum, these rogue access points often turn out to be
mobile handsets with Wi-Fi sharing capability turned on.
Donald Meyer, senior manager of product marketing at Aruba, explained
that his company has a technology called Adaptive Radio Management
(ARM) that will automatically move across different channels in order to
find one that is less congested. For end users, there is no disruption
as the Aruba network continuously adjusts to conditions in the air.
Aside from rogue access points, Gill faces other type of challenges
as well -- including denial of service and spoofed access points with
Karma.
At this year's event, Aruba is only providing WPA-PSK security, as
opposed to the more robust EAP/TLS (Extensible Authentication Protocol –
Transport Layer Security). With EAP/TLS each user has their own key,
whereas with PSK the key is known.
As such, WPA-PSK is not as secure as the EAP/TLS option that was
available in 2011 at Black Hat. Gill noted that as long as users
maintain proper security best practices -- not sending data over clear
text and stick to HTTPS/SSL secured sites when submitting sensitive
information -- there shouldn't be much risk.
No comments:
Post a Comment