Open Wifi Security (Friday evening rant)
1) Yes, at our @nordic_choice hotels we have open wifi as standard. No Client<->AP encryption (WPA/23), and no captive portal to logon to.
Let me first explain some obvious reasons for doing so. (Often disregarded by infosec pros.)
-
-
9) DNS IS PLAINTEXT. We know. We are working hard to only use
#DNSSEC resolving DNS servers, but of course you can use your own as well. Personally I want to provide our guests with DoT too, and you can use DoH as well with whatever provider you prefer.Prikaži ovu nit -
10) About DNS: We
@Nordic_Choice use#DNSSEC. We do#DNSSEC for our email with Google. Check our MX records: we use mailservers with the http://smtp.goog (Google) domain, which is#DNSSEC signed. We ask our providers to use#DNSSEC. You should too.Prikaži ovu nit -
11) We haven't had a single report coming in from anyone becoming a victim of "hacking", where lack of Client<->AP encryption in our guest wifi was the reason for the incident. *Not a single report.*
Prikaži ovu nit -
12) Yes, we are well aware of clients remembering open wifi SSIDs, & automatically connecting to those SSIDs, even if it is someone playing with Kali or their brand new Hak5 Pineapple. We can't help with your wifi history, and imho most devices have been on open wifi once.
Prikaži ovu nit -
13) Side note: two largest telcos in Norway ran massive campaigns warning against use of (open) wifi last year, promoting 4G instead. One of those telcos is also a BIG provider of open wifi in several countries. Paradox?
Prikaži ovu nit -
14) We have also experienced the confusion related to encryption & captive portals. Some even believe that captive portals are there to protect their security & privacy, and that a captive portal means there is encryption in place.
Prikaži ovu nit -
15) At one point I was told that without "double encryption" + login using a captive portal, we would violate
#GDPR, and our wifi could not be used by employees of organisation X. Tough job trying to fix that one.Prikaži ovu nit -
16) Now a little probability threat analysis: Where is the most obvious location of a villain wanting to hack you?
Prikaži ovu nit -
17) Another survey: What do you reckon as the most common way of getting hacked:
Prikaži ovu nit -
18) Third survey question: Have you ever been the victim of open Wifi hacking (MitM or other ways) - Infosec cons & Hak5 Pineapple demos excluded?
Prikaži ovu nit -
19) Obviously there are MANY ways to hack, bypass or make any wifi Client<->AP encryption irrelevant. Not to make that an argument against using encryption though, I personally prefer the encrypted version. But risk analysis is cool.
Prikaži ovu nit -
20) There are threats out there, we will always have vulnerabilities, and we have values to protect. As a provider of free & open wifi access for our guests, we try to evaluate all of those, looking at probability & impact, while also remembering UX.
Prikaži ovu nit -
21) I could have said lots more, and I probably forgot something important as well. A nudge to
@boblord here is in place, as well as@schneierblog & many, many others I've learned from in terms of being sober when doing risk analysis. :)Prikaži ovu nit -
22) So I'll stop my rant here, and say thank you for reading all these tweets. I am now ready to answer your questions, comments and flames.pic.twitter.com/7LM1h2R52X
Prikaži ovu nit
Kraj razgovora
Novi razgovor -
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.
