In the past, any user connecting to the residential network was required to authenticate about once a week with their NetID (a personally identifiable username on the BYU network) and password. This had to be done through a web browser (a process with which I disagree, but that’s a topic for another post). The system would record the MAC address or something and use that to link all network activity originating from that address with that NetID. In this way, BYU network security analysts have a way to pin down any suspicious activity to a responsible person.
That is still in force, but starting this month a new layer of security is being added. All Windows computers connecting to the BYU network are required to have (a) the most recent operating system patches from Windows Update and (b) an approved, up-to-date virus protection program. Note that this only applies to Windows computers. Macs and Linux boxes can get onto the network with just a NetID and password.
BYU has had these security measures on their campus-wide wired and wireless networks since last fall, but this is the first time these measures are being implemented in the residential wired network.
This is where it gets interesting. Enter NetGear router.
My router manages the laptops that my roommate and I use (which are connected to it via Ethernet), as well as my iPod, my Palm Pre, and any of my other roommates’ computers (via the router’s wireless). The two laptops on the Ethernet have Linux or Windows (or both), my iPod is recognized as a Mac, and the login page doesn’t know what to call my Palm Pre. Of all of those, the Windows side of my laptop is the only one the network authentication will quarantine for virus checking.
Because the router assigns private IP addresses (192.168.1.x) to all the devices connected behind it, the only thing the BYU network ever sees is the IP address it gave my router through the DHCP. As far as the network can tell, I have only one device connected.
Because of that, I can run through the network authentication using my Linux box, or my iPod, or even my Palm Pre. None of those are required to have anti-virus or the latest Windows updates. That clears the way for me to connect any virus-infected, out-of-date PC to that router, and the network will never know the difference.
Brilliant. Network security circumvented.
Of course, everything that goes onto the network through my router will be linked to whatever NetID I used to authenticate it. So that still leaves me in charge of making sure nobody does anything stupid through my router.
I don’t know if there’s any way for our beloved network administrators to fix this (rather large) hole in the system. But until they do, my router will carry on connecting anyone and everyone I authorize, regardless of whether BYU thinks them fit for the network.Posted 17 February 2010
My friend told me today about an Internet service called Clearwire that his company is using. It’s very intriguing.
Clearwire works by providing wireless Internet to users through structures similar to cell phone towers. Once the user sets up a special router, he can connect his computer or network to it in various ways:
That last one is a bit baffling to me. Ethernet over electrical wiring? I haven’t been able to find much information on it, although this blogger says it isn’t very reliable. Hmm.
One advantage (or, some say, disadvantage) is Clearwire’s use of the licensed radio frequencies at 2.5 GHz. This makes it more secure than typical Wi-Fi, which uses unlicensed (and therefore more open but also more vulnerable) frequencies of 2.4 GHz. (Read the FAQ on their website, under About Clearwire.)Posted 27 July 2007