Consider Your Hotel Network Hostile
As I’m preparing to take my trip to New York for the OWASP AppSec Conference, I came across a timely article on the risks involved with using a hotel network. The Center for Hospitality Research at Cornell University surveyed 147 hotels and then conducted on-site vulnerability testing at 50 of those hotels. Approximately 20% of those hotels still run basic ethernet hub-type networks and almost 93% offer wireless. Only six of the 39 hotels that had WiFi networks were using encryption (see my blog on why are people still using WEP for why this is necessary). What does this mean for you, Joe User? It means that both your personal and company information is at risk any time you connect to those networks. The next time you’re surfing the web, start paying attention to all of the non-SSL links (http:// versus https://) that you visit. Then, think about the information that you are passing along to those sites. Are you signing in with a user name and password? Entering credit card information? Whatever it is, you better make sure that it’s something that you wouldn’t feel bad if it wound up on a billboard in Times Square, because that’s about how risky your trasmission could be.
Before you get too concerned, there are a few things you can do to try to prevent this. First, DO NOT visit any links where you transmit information unencrypted. This is just asking for trouble. Since many man-in-the-middle type attacks can still be used to exploit this, my second suggestion is to use some sort of VPN tunnel. Whether it’s a corporate VPN or just a freebie software VPN to your network back home, this allows you to encrypt all traffic over the untrusted hotel network. Make this your standard operating procedure anytime you connect to an untrusted network (not just a hotel) and you should keep your data much safer. Lastly, please be sure to have current firewall and anti-virus software on the computer you are using to connect to the untrusted network. The last thing you want is to get infected by some worm or virus just by plugging in to the network.
One other thing that I think that deserves mentioning here is that if you don’t absolutely have to use the internet on an untrusted network, then don’t do it. Obviously, there are times when you need access to do work, pay bills, etc, but if you can save those tasks until you reach a more familiar (and hopefully safer) network, that is far and away the best way to keep yourself and your data safe.
September 15th, 2008 at 5:08 pm
I picked up a Linksys Travel Wireless Router used for about $30 more than a year ago. This does 3 things for me when I’m in a hotel: 1. It frees me from the tether and brick ethernet cable that most hotels have and lets me use my laptop anywhere in the room. 2. It provides me with a firewall so my computer is not directly exposed to the hotel’s network. and 3. It lets me pay for one connection at the inflated Hotel price that I can quietly share with whomever I happen to be traveling with.
It’s not perfect and your tips are still very valid, but it’s a nice addition.
September 15th, 2008 at 10:06 pm
A quick and dirty way to provide secure HTTP/S over an unsecured network is to use OpenSSH to create a SOCKS proxy using the “-D” flag:
$ssh -D 8081 user@yourmachine.com
Once you’ve authenticate and are connected, your local machine is listening on TCP/8081 (or whatever you choose) and forwarding those packets through the SSH connection to your secure machine. To use, just configure your browser to use port 8081 as a SOCKS proxy.
September 16th, 2008 at 9:09 am
Thanks Randy and Victor for the fantastic suggestions. I just might have to run out and get a wireless router for the trip to NYC so that I can run two laptops over the same overpriced “hard line” into the matrix.
There are a couple caveats to Victor’s suggestion, but hopefully a non-issue. First, the hotel network has to allow outbound SSH connections. Second, you have to have a trusted server somewhere outside of the hotel network that is running an internet-accessible SSH server. Provided that neither of those is an issue, Victor’s approach is a fantastic way to encrypt all of your browser traffic going over the hotel network.