Secure Linksys Wrt54g
Secure Linksys Wrt54g
Secure Linksys Wrt54g
Abstract
Current implementations of the 802.11b and 802.11g wireless LAN standards have several potential pitfalls for security. However, built in security mechanisms in these protocols can be used to mitigate most security risks for SOHO users. Out of the box, the Linksys Wireless Router default configuration is insecure. However functionality built into the product can be used to greatly enhance the security of this device. This paper examines how to configure the Linksys Wireless Router, WRT54G, in a manner which will maximize the security of your Wireless LAN
1/12 2005 Richard Wanner. All rights reserved. For information contact cerberus@whitehats.ca or rwanner@pobox.com.
Table of Contents
Abstract.................................................................................................................1 Introduction ...........................................................................................................3 Configuration Recommendations..........................................................................3 Configure Management Parameters .....................................................................3 Reset Admin Password .....................................................................................3 Enable Secure Management.............................................................................4 Disable Management via Wireless ....................................................................4 Disable Remote Management ...........................................................................4 Disable UPnP (Universal Plug and Play)...........................................................4 Configure Basic Wireless Parameters ..................................................................5 Configure Network Mode...................................................................................5 Set SSID from default........................................................................................6 Set Wireless Channel from default ....................................................................6 Disable SSID Broadcast....................................................................................7 Enable MAC Address Filtering ..............................................................................7 Configure MAC Address Filter...........................................................................8 Enable Wireless MAC Filter...............................................................................8 Enable Encryption.................................................................................................8 Set Encryption parameters ................................................................................8 Maintenance .........................................................................................................8 References ...........................................................................................................8
Table of Figures
Figure 1 Management Screen...........................................................................5 Figure 2 Wireless Network Properties Screen ...................................................6 Figure 3 Basic Wireless Settings Screen ...........................................................7 Figure 4 ipconfig /all output................................................................................8 Figure 5 MAC Address Filter List Screen...........................................................8 Figure 6 Wireless MAC Filter Screen.................................................................8 Figure 7 Wireless Network Properties Screen ...................................................8 Figure 8 Wireless Security Screen.....................................................................8
2/12 2005 Richard Wanner. All rights reserved. For information contact cerberus@whitehats.ca or rwanner@pobox.com.
Introduction
Wireless networks are becoming increasingly common due to the ease and cost of deployment of the LAN using wireless technologies. Wireless networks provide different challenges than wired networks, especially in securing data in transit between the client and the wireless access point. The common wireless standards, provide mechanisms for securing wireless data, and despite the limitations of the wireless, when the provided mechanisms are deployed and maintained in a systematic manner data can be secured against all but the most determined and patient attacker. This paper describes security strategies for the Linksys Wireless Router, model WRT54G, Version 2. Specifically the WRT54G running firmware version 3.03.6. Other firmware versions may have slight variances in functionality, but the general principles should apply. This paper assumes the user is familiar with the Linksys web-based management interface, and how to use a web browser.
Configuration Recommendations
For the Linksys Wireless Router WRT54G I recommend the following configuration settings to secure your wireless LAN. 1. Configure Management Parameters 2. Configure Basic Wireless Parameters 3. Reset default SSID 4. Disable SSID Broadcast 5. Change from default channel 6. Enable MAC Address Filtering 7. Enable Encryption The following sections will describe why and how you should do these steps.
accessible to anyone on your network. Because this is a wireless network, anyone who can access your network may be able to access the GUI interface and attempt to make changes. By setting the password we will at least be able to prohibit unwelcome users from reconfiguring the device. The password can be up to 63 characters.
4/12 2005 Richard Wanner. All rights reserved. For information contact cerberus@whitehats.ca or rwanner@pobox.com.
While you are on this screen, ensure that Remote Router Access and UPnP are disabled.
7/12 2005 Richard Wanner. All rights reserved. For information contact cerberus@whitehats.ca or rwanner@pobox.com.
The order of these two steps is significant. If you are doing the configuration from your wireless enabled computer If you enable the MAC filter without telling the filter which MACs to permit you will lock yourself out of configuration.
The MAC address is the one labelled Physical Address in this case 00-90-4B6B-BD-E5. If the machines you want to add to this list are already using the wireless network, there is an easier way to look up the MAC addresses. The MAC Address Filter List screen provides a Wireless Client MAC List button which conveniently pops up a window which provides the MAC of all currently associated systems. The MAC Address Filter List screen takes the MAC address without dashes or spaces or any other kind of separator, in this case 00904B6BBDE5. The figure below shows the screen with a MAC address filled in. Once you have filled in your relevant wireless MACs dont forget to scroll down to the bottom of the screen and click Save Settings. Then you can close the window and return to the main Wireless MAC Filter configuration screen.
8/12 2005 Richard Wanner. All rights reserved. For information contact cerberus@whitehats.ca or rwanner@pobox.com.
9/12 2005 Richard Wanner. All rights reserved. For information contact cerberus@whitehats.ca or rwanner@pobox.com.
Enable Encryption
I intentionally left this configuration for the end. We could have applied it earlier, but to do this you will lose connectivity with the clients, so it is best left to the end. The WRT54G provides several different choices for encryption. In a SOHO environment I recommend you use WPA with a pre-shared key. WPA stands for WiFi Protected Access. It utilizes a pre-shared key to initially set up an encrypted session, and then renegotiates the key at pre-defined interval. The changes in this section are all performed from the Wireless tab under Wireless Security. The following steps are in this section: 1. Set Encryption parameters on the router and client
10/12 2005 Richard Wanner. All rights reserved. For information contact cerberus@whitehats.ca or rwanner@pobox.com.
On the router side, choose WPA Pre-Shared Key from the Router Mode pulldown. Select AES from the WPA Algorithms: pull-down and enter your chosen pre-shared key into the WPA Shared Key: box. The Group Key Renewal field defines how often the key is renegotiated in seconds. The default is one hour (3600 seconds). This is adequate, but if you want to be extremely paranoid you can adjust the interval down accordingly. The figure below shows the configuration of this screen with all changes applied.
11/12 2005 Richard Wanner. All rights reserved. For information contact cerberus@whitehats.ca or rwanner@pobox.com.
Now click Save Settings on the router side, wait a few seconds and click OK on the client side. That will apply the changes and get the wireless network back in sync. Of course if you have more clients you will need to apply the same settings to them as well.
Maintenance
What we have covered in the rest of this document will provide you with a very stable and secure wireless setup. However there are some things you should still do periodically. The most important is to periodically check for and apply new firmware versions as they become available. Linksys releases new firmware for several reasons. The most important is to fix security vulnerabilities in the product. New firmware versions will appear at http://www.linksys.com/download/firmware.asp?fwid=201
References
Linksys Corporation, WRT54G User Guide, 2003 Craiger, Phillip J., 802.11, 802.1x, and Wireless Security, June 23, 2002, URL: http://rr.sans.org/wireless/802.11.php
12/12 2005 Richard Wanner. All rights reserved. For information contact cerberus@whitehats.ca or rwanner@pobox.com.