802.11 Security 179
802.11 Security | |
author | Bruce Potter and Bob Fleck |
pages | 192 |
publisher | O'Reilly |
rating | very good |
reviewer | Gregory Ruiz-Ade (JadeSky) |
ISBN | 0596002904 |
summary | Securing wireless networks |
With the amazing proliferation of wireless networks these days, there seems to be constant churning about how best to secure them, while at the very same time, barely anybody is actually doing anything about it. Potter and Fleck have offered up this little book, 802.11 Security, as a no-nonsense guide to understanding the problem of wireless networking security (or, as the case may be, the complete lack thereof) as well as demonstrating how to implement viable solutions.
Straight from the horse's mouth, "This book is aimed at network engineers, security engineers, systems administrators or general hobbyists interested in deploying secure 802.11b-based systems." The greatest attention is given to Linux and FreeBSD systems, though OpenBSD, Mac OS X and Windows are covered as client systems, too. The authors split the book into four parts: "802.11 Security Basics (Part I)," "Station Security (Part II)," "Access Point Security (Part III)," and "Gateway Security (Part IV)."
Part I, "Security Basics," gives a very good introduction to the concepts of wireless communications. Chapter 1 explains how radio transmissions work (and how antenna shapes affect them), and why radio transmissions are inherently insecure (i.e., anyone with an antenna in range can listen in). 802.11 is explained, as well as WEP, and WEP's problems. Chapter 2 describes in detail the risks involved with wireless networking, and gives examples of types of attacks which can be performed against wireless networks.
Part II, "Station Security," outlines in great detail what you need to do to make sure your wireless network clients are as secure as possible. We're given two goals for client station security: prevent any access to the client systems, and make sure that the clients speak secure protocols for any network services they access. To the paranoid, both these goals are rather obvious, but they're important enough that the authors spent time explaining them. They follow with a couple paragraphs on logging and security updates on the client systems, and the rest of Part II (Chapters 4 through 8) give specific information on how to best secure client systems of various OSes.
Part III (Chapter 9, really), "Setting Up an Access Point," delves into the intricacies of setting up and securing a wireless access point, from generic advice on how to configure access point appliances to more specific instructions on configuring host-based access points running Linux, FreeBSD and OpenBSD. Comparatively little time is spent on host-based access points in the book, probably because most people generally don't do things things way since access point appliances are so cheap and simple to configure/install.
The remainder of the book is spent on Part IV, "Gateway Security" (Chapters 10 through 15), which describes the infrastructure end of how most wireless networks will likely end up being integrated to wired networks. Basic suggestions for structuring the combined networks are given, and follow what I'd consider to be really good advice: wireless networks should be on their own interface of the gateway (or firewall), physically separated from both internal networks and the Internet. The authors strongly recommend against simply attaching the access points to the internal network, as that introduces too many security risks (an example involving ARP poisoning is given to illustrate why and how). The next three chapters detail the configuration of Linux, FreeBSD and OpenBSD as a secure gateway.
Chapter 14, "Authentication and Encryption", introduces the idea of using strong authentication and encryption mechanisms outside of WEP, using NoCat (which will run on Linux, FreeBSD and OpenBSD) and WiCap (for OpenBSD only) for authentication and IPSec for strong encryption. The idea the authors present here is that for the most secure setup, in addition to enabling strong WEP (as detailed in the rest of the book), your wireless network is set up to not allow clients access to anything until they are authenticated. Then, and only then, the gateway will allow wireless clients to access other network segments (i.e., the internal LAN, and/or the Internet), but only if all the communications over the wireless segment are done through secure tunnels. Sadly, the authors neglected to mention OpenBSD's, Windows 2000's or XP's ability to do IPSec, and their treatment of IPSec for FreeBSD and Linux certainly isn't very detailed, though pointers are given to the appropriate web sites for more information. 802.1x authentication (physical port authentication) is also explained in some detail, though it is of little use, since very little equipment deployed today has support for it. It is an interesting concept, though.
Closing out the book, Chapter 15 is appropriately titled "Putting It All Together." Here we get a final overview of all the pieces as well as how they fit together, and how certain aspects of the system as a whole affects both the administrators and the users of the system.
Overall, I'd have to say that this is exactly the type of "security in depth" book I've been needing to help me figure out how best to implement wireless networking at the office with minimal risk to the rest of the network. The authors write in a very approachable style and do a very good job of giving the necessary background before launching into any detailed discussions. I would highly recommend this book to anyone considering installing wireless networking without wanting to simultaneously install a simple back door to their network. Honestly, I haven't found much to complain about.
I'm of the opinion that, after reading this book, and using it as a guide to setting up a secure wireless network, I'll be able to sleep at night. Even though people can still war drive (or even war fly) and find your access points, even if they managed to crack the WEP keys and associate to the AP, the network will still be secure because of the multiple layers that have been put in place.
You can purchase 802.11 Security from bn.com. Slashdot welcomes readers' book reviews -- to see your own review here, read the book review guidelines, then visit the submission page.
If you liked these phrases ... (Score:5, Funny)
Is that anything like "military intelligence"?
-/-
Mikey-San
"I may be superficial, but you're fat."
Re:If you liked these phrases ... (Score:2, Funny)
Re:If you liked these phrases ... (Score:2)
Employee Empowerment
You question is addressed in Chapter 1 (Score:2, Informative)
I don't understand. (Score:1, Insightful)
Maybe the problem isn't 802.11 security, but computer security in general.
Re:I don't understand. (Score:2)
There'd be a similar hubbub if there was a small LED display outside your cubicle, showing everything that was moving across the ethernet segment on your desktop.
Re:I don't understand. (Score:4, Informative)
That is the inherent vulnerability. Someone can have "wired equivalent" access to your network from possibly miles away using a good antenna, so physical security is irrelevant. Compounding this problem is the fact that wireless networks are expected to have clients connecting and disconnecting all the time, from different places, whereas in most wired networks the client base is fairly stable (and easily policed).
Re:I don't understand. (Score:2, Insightful)
Wireless networks are broadcast-based, obviously; they work like a hub, not a switch. That means someone with an antenna can listen to everyone's packets, whereas with a switched network a "wire-splice" attacker only gets the packets belonging to a single client.
Re:I don't understand. (Score:4, Interesting)
This is something that doesn't seem to get a lot of attention. Even if you're using a rather low powered device, it is still fairly difficult to be sure of exactly where your signal is ending up or who is able to pick it up (which leads in to a discussion about directional antennas, I suppose).
Another point is that its very difficult to tell who is using a wireless network. With the conventional network it ultimately involves someone being reasonably obvious about having plugged a cable in to a drop. With wireless it could be the guy outside in the park with his laptop or a sniffer sitting in a car in the parkinglot. Or someone in an office building blocks away using the right kind of antenna (as pointed out previously). Sniffing / attacking a wireless network involves considerably less risk than a conventional wired network.
Re:I don't understand. (Score:2)
WEP is also wayyyyyy weak.
Re:I don't understand. (Score:1)
Re:I don't understand. (Score:3, Informative)
Well, no. It's not as strong as it could be or ought to be, but someone has to sniff and crunch your packets for a good long time (there's a spam subject line if I ever heard one) to break WEP.
This site [shmoo.com] suggests that you need the packet traffic generated by 500 person-hours of heavy network usage to break WEP. I use my network about 10 hours a week. Accordingly, if I change my password once every few months -- that is, once every 100-200 hours of network use -- I avoid the nig
Re:I don't understand. (Score:2)
So corporations still need to rotate their keys on a daily/weekly basis to protect this layer of security. Pain in the ass...
Re:I don't understand. (Score:4, Interesting)
Re:I don't understand. (Score:2)
As far as I can tell the Cisco solution, though it works, is mucho expensive. You require Cisco-only hardware, not just access points, but also Cisco client radios, so you have to kit out all the users with new PCMCIA cards etc. if you want everyone to use LEAP (well, unless they're using Macs, since Apple seems to have come to some arrangement with Cisco that allows their Lucent/Agere/whateverthey'recallednow-originating Airport cards to connect to LEAP networks. Does anyone have any
Re:I don't understand. (Score:2)
BTW - Cisco's getting out of the client card business?? Hrm... in that case won't their purchase of Linksys mean it's another right-hand-doesn't-know-what-left-hand-is-doing kind of situation?
print services (Score:2)
I get your point, but since wireless places everybody on a big LAN (the same goes for cable modem networks), it is smart to disable file and print sharing on a windows PC. If this isn't practical (the user has several PCs in his apartment and needs to share files and printers, or the WLAN is at an office doing the same), the inner network needs to be behind a firewall.
Either way, ports 137-139 should be firewal
Re:I don't understand. (Score:2)
Of course. But wireless makes in expodentially worse because you are broadcasting your insecurity to anyone within range. Whereas an insecure wired network is inherently more secure for the fact that you have to be plugged into it.
Re:I don't understand. (Score:5, Insightful)
Take 2 computers, link them by ethernet cable, lock it up pretty well, and poof you have a mostly secure network.
Only thing stopping you from getting on my home network right now, is the fact you don't have a cable plugged into my switch at home. I also have a good firewall on my dsl line.
Now, if i were to put the switch on the sidewalk, anyone could just walk up, and jack in. They'd have access behind my firewall and to my dsl line. That is what wireless is like: putting an invisible switch whever you happen to be, within certain distance of an access point. So it's harder to secure by the fact that you don't need a wire to connect, but just be in proximity.. and unless you have shielding around your AP and computers that use the AP's, you are more open.
That's why you have to put the AP before the FW! (Score:3, Insightful)
Re:I don't understand. (Score:2, Interesting)
I think you hit it on the head here. You don't have to have physical access to a wire. You could be 50 meters away from the AP and be able to access the network.
Another problem was with the first implementation of WEP. The 40/64 bit encryption is terribly easy to break, as is well documented. The 104/128-bit WEP is more secure, enough for casual use, but with enough packets sniffed,
Re:I don't understand. (Score:3, Insightful)
Re:I don't understand. (Score:2)
It's the simplicity.
Anyone who can open a Internet Explorer window can instal, configure and "secure" a 802.11 device or network.
Even my aunt, who don't understand anything about computers managed to get her new SMC Barricade Turbo Wireless up and running with Win2k. (She forgot to enable the 256-bit WEP, but I did that for her.)
This means that there a tons of peolpe out there without a
Re:I don't understand. (Score:4, Interesting)
In a similar manner, open wireless networks can usually be used to grant free internet access without doing anything but hanging near the building. Special antennae can be even used to grant one near perfect anonymity and immunity to prosecution. Wired network break-ins require physical access to key wiring somewhere, and the commission of a much more obvious and deliberate crime. (by contrast, most 802.1 war-drivers probably think of it more as walking into a building uninvited when they find the door left cracked open)
Sneaking around a building with a toolkit looking for network cable seems incredibly stupid and dangerous, an almost certain way to end up in jail eventually. It would only be worth even considering if the rewards were immense. By contrast, if one sits at a cafe/van with a laptop one can just power it up and run a few programs and sometimes break into a nearby network with little to no effort but a few clicks. And if one can snoop into a few internal network files, maybe read some mail, so much the better.
Re:I don't understand. (Score:2)
I say this to illustrate the real insecurity of a wireless network: there's no physical access restriction. I o
Re:I don't understand. (Score:2)
Basically from everything I've gathered is that wireless encryption is only good for a minimal wrapper. The only good way to secure a wireless network is to put an accesspoint in a DMZ and only allow clients to connect via a VPN that has real security. In otherwords treat
Re:I don't understand. (Score:2)
Unfortunately there was no internet access in the training room
Fortunately my Mac told me there was a wireless lan.
Unfortunately it was encrypted
Fortunately the password needed was the name of the company
Unfortunately there was no DHCP server so I'll have to guess an IP address, router and DNS server in order to get arrested for unauthorised use of their LAN.
But the main thing wa
802.11 (Score:1, Insightful)
Re:802.11 (Score:2)
Shouldn't that be all you need is a laptop an antennae and some good skills to break into an unsecured Wavelan
There is plenty that you can do on existing WLANS to lock down access, disable broadcast SSID, enable WEP,use MAC ACL's within the access point and even treat the WLAN as an insecure LAN and VPN tunnel through to the LAN. On top of this the latest kit gives you 802.1x Access control and WPA encryption an
Personally... (Score:1)
Re:Personally... (Score:4, Insightful)
What if one of your neighbours decides to leach child porn off the net using your wireless network? Should they think of themselves as your guest?
Dinivin
responsibility and a sanity check. (Score:2)
I'd ask my ISP about that one, but they are all in jail because one or two of their customers decided to download kiddie porn. Oh wait, they are not in jail and neither am I. The core thought of your statement is dangerous. I'm not resoponsible for the actions of others and common carriers should not be either.
Re:responsibility and a sanity check. (Score:2)
No one is suggesting you should be.... But how would you like to convince a judge and jury that it wasn't you? After all, they traced it to your IP address, didn't they?
Dinivin
Re:Personally... (Score:2)
Nice try... After they took all your computer equipment and made your life a living hell for a few months, they might finally decide they had the wrong guy. However, due to your reckless nature with your wireless network, the person downloading kiddy porn could have been parked in front of your house for all you know, and gotten away with it.
Dinivin
Re:Personally... (Score:2)
Then I hope you don't live in New Hampshire [slashdot.org]. With the burden of securing networks falling upon the network owner, and the propensity of the law to look unfavourably at those who "facilitate" illegal behaviour (think bars and party hosts in relation to drunk driving), I would think that it would very well be worth applying some amount of se
Re:Personally... (Score:2)
"No officer, it wasn't me. It must have been someone using my network."
Ugly cables... (Score:1, Funny)
Power, keyboard, and mouse cables are less ugly than Ethernet?
One word: (Score:1)
Re:One word: (Score:2)
Re:One word: (Score:2)
Five finger discount...!
Re:Ugly cables... (Score:2)
Personally I would love to see a computer training room where all of 12 or 24 computers are all using wireless keyboards and mice. I would love to see the expression on the administrators face when the mice and keyboards are all randomly moved from one workstation to another, mouse a to system b, keyboard a to system c. a, b and c, randomly allocated.
Of course all of these systems are using integrated displays, with internal battery systems, and eve
We reward WiFi makers for a job badly done (Score:3, Insightful)
Re:We reward WiFi makers for a job badly done (Score:2)
OT: Rewarding buggy design (Score:2)
This came to me as I power cycling my cable box (which had crashed) not long after power-cycling my DVD player because it "crashes" during certain disc-change cycles (eg, don't hit OPEN when its inventorying the changer -- it will crash every time).
I think so many people have already been so exposed to software bugs and things that don't work right, we've come to expect it instead of expecti
Re:OT: Rewarding buggy design (Score:2)
But strangely that's the only software problem I've had with it. Plays VCD and SVCD really well (from a whole shitpile of encodings) and I've yet to have a crash during playing of a DVD.
Maybe there's a bad sensor or something that jams it up?
Re:OT: Rewarding buggy design (Score:2)
I think I'll ultimately look for a whole new player here in the next year or so. The APEX MP3 playback is kind of braindead -- there's no shuffle, it often cuts off the beginning if you skip tr
Re:OT: Rewarding buggy design (Score:2)
Re:We reward WiFi makers for a job badly done (Score:2)
If it dies off, it's gone and no company will take a chance on it. If we keep it alive long enough,
Did they discuss "all in one" wireless routers? (Score:5, Informative)
When I arrived, I found out the client had everything running through a Belkin firewall/router device with built in 802.1g wi-fi. (It was attached to an external DSL modem via ethernet cable.)
It struck me that unless I'm missing something, these combo wi-fi bases/routers are inherently limiting in how much security they can offer the user. (EG. You can't really place the wireless clients behind some sort of a VPN tunnel with authentication if the other end of the wi-fi connection is managed by integrated firmware in the router itself, right?)
I ended up enabling 128-bit WEP for the guy, as well as disabling "broadcasting" of the existance of the router/w-fi base, but couldn't see much else to do beyond those measures.
Re:Did they discuss "all in one" wireless routers? (Score:3, Interesting)
That's just a start. You can require rsa key ssh tunnels into the security server for the WiFi attached device, which implements a VPN to provide access to your own network for authorized users.
Obviously
From my experience... (Score:2)
Better wireless switchs have "dual subnets" and this allows you more flexibility by denying access to the insecure subnet. Unfortunately, most home users can't really afford one, or can't justify the price increase.
Now, home usage and busin
Re:Did they discuss "all in one" wireless routers? (Score:2, Interesting)
Wireless security is relatively easy... (Score:4, Insightful)
Stunnel (Score:2)
Rus
802.11 (Score:2, Funny)
But we can't create a united task force to spread wireless broad band across my blood back yard?
Re:802.11 (Score:2)
Even worse, we can't get everyone to learn to spell correctly. Absolutely awful, indeed!
warning! (Score:2, Informative)
otherwise, it's a good book.
Another review... (Score:4, Interesting)
Quick take: ehh. It's good for small, Unix savvy sites, but windows shops or large installations should probably look elsewhere.
simple key to wireless security? (Score:2)
Re:simple key to wireless security? (Score:2)
Is this do-able? Sure.
Is this widely documented as a simple general solution for all operating systems that support WiFi connectivity? I don't think so. If so, is it cross platform? Again, I am not aware of any, but then I have not done any research papers on this topic.
Then again, I could be wrong. It's happened before, and I expect it will happen again.
-Rusty
wireless security (Score:5, Informative)
The solution is to not rely on the hardware encryption of your card and hub. Instead, use encrypted streams for all communications from your laptop. Use SSH, never use telnet (that should be common sense). If you just do that, then you don't have to worry about someone sniffing your packets because they are encrypted (and if they're also hardware encrypted you have some nice double-encryption). Also, you could easily set up an ssh tunnel to your router for the http protocol or whatever else you need. That way you have the security through the air. Anything after that is subject to wires on the internet, which like I said before, give off measurable radiation.
In short, just remember to always use software encryption and not rely on the hardware encryption of your wireless devices. Simples as that.
Re:wireless security (Score:3, Funny)
That's what I thought, but then someone cracked my rot13. I swear, if double-encrypted rot13 isn't secure, nothing is.
Re:wireless security (Score:4, Interesting)
802.11 sniffing and cracking WEP codes (for the less than 5% of sites that even bother turning on WEP) is trivial skr1pt-k1dd13 stuff, can be accomplished for less than $200, and from several miles away.
So, in short, for a savy *nix (or even Windoze) admin / user, wireless can be used in a reasonable secure manner. But you have to keep in mind that this represents less that 0.001% of the wireless users out there. Therefore, wireless security is a massive timebomb of a problem.
Remember: your average small- to medium-sized businesses and home users usually have inexperienced people administering their networks. I hate when people assume that just because experts can get it to work it means that a product or service is "fine."
Re:wireless security (Score:3, Interesting)
We had our DSL turned off with no warning, and apparently it was due to somebody trying to spam/attack the MSN Gaming Zone boards.
When tracked back, it appears to have been a laptop with a wireless card, that was reconfigured to bridging - turning it into an open WAP.
At no time did the intruder do anything to any of our systems... but it still caused us major grief for a day!
Re:wireless security (Score:2)
Re:wireless security (Score:2)
For example, what if someone drives by and sets up an access point with the same name as yours? Then you'd have all the clients authenticating to your intruder.
You'd need to make sure you had 2-way authentication going on, and tunnel everything through ssh or ipsec or whatever.
802.11 isn't secure, but... (Score:4, Informative)
I'm used to CIPE [sites.inka.de] and like it because it has a Windows NT/2K/XP implementation as well as a Linux module. VTUN [sourceforge.net] does much the same job, is slightly easier to set up, although instead of a Windows driver, runs on Solaris and various BSDs. We used the latter to make a link between mine & my partner's house and managed to use the Linux bridging features to bridge his home wireless network to the office ethernet-- the bridge is over a vtun interface which sits on top of the 802.11 link between our office and his house. Complicated but it seems to work
Anyone else have a similar setup? I'd be interested to know how to grow this kind of setup manageable (not that we have a need for it, but
Very useful resource (Score:2)
I just wrote a book on 802.11 security: Here it is (Score:3, Funny)
That's it, the whole book, two sentences, and it's free for the public domain.
High cover price to page ratio (Score:1)
Compare that to one of O'Reilly's best books, Building Internet Firewalls [oreilly.com], with a cover of $49.95 and 890 pages -- less than 6 cents per page. buy.com [buy.com] has it for $31.47, dropping the ratio to less than 4 cents per page!
O'Reilly books seem to be the most expensi
A nuisance in corporate LANs (Score:5, Interesting)
The simple implementation of this just puts the 802.11 network on the outside of the firewall, using whatever existing VPN infrastructure you have to gain internal access. The downside to this is the set of people with "anywhere" VPN access is a minimally overlapping subset of the people who should have 802.11 VPN access.
And then I'm left with the usability/training issue, explaining to people (lusers, help desk, etc) why the VPN connection is necessary and other sundry details of usage.
And then there's equipment. It makes no sense to equip all ~100 laptops that don't have 802.11 with 802.11 cards for the few conference rooms that would get it.
It looks fun, but there's so much baggage associated with it I can't see it happening in these economic times..
Re:A nuisance in corporate LANs (Score:2)
Work in advertising, too?
One of the compromise solutions we thought of was putting in base stations with adjustable radio power and turning the power so far down that the base station wasn't usable outside the conference room. We're high in an office building and the rooms that would get it are in the middle of the stack with numerous metallic surfaces between us and "them", so this might actually work.
Except that it reduces the functionality t
Re:A nuisance in corporate LANs (Score:2)
I work in a dental office, and the Dr. likes the cool factor of WiFi, and he's impulsive enough that the ability to move any computer anywhere at a whim is appealing to him. I've argued that wireless isn't HIPPA complieant and all that too. Durring the last re-model,10 yrs ago, I dropped cat5e cable everywhere concievable, after all th
Not to hard to secure (Score:2)
Put the AP itself on a port of its own on the firewall (not on of those cheap appliances, but something that will do nat/ipsec/ip firewalling).
Do not use DHCP, disable broadcasting so that for someone to connect to the network they have to actually know it is there.
Use ipsec to connect t
WEP is NOT useless (Score:2)
WEP is NOT useless. It is a "NO TRESSPASSING" sign. It informs a casual passerby that you INTEND the AP to be private (perhaps saving his time trying to figure out why this particular "open" AP isn't working for him).
And if your firewall or configuration screws up, or somebody cracks it, it gives you ammunition in court to show that the guy who broke in knew he wasn't supposed to be there.
Unauthenticated layer 2 (Score:5, Informative)
Actually, layer2 is completely unauthenticated, so anyone can associate with your access point using no key or the wrong key. IP and above will get dropped however.
The lack of an authentication mechanism in the 802.11b MAC leaves a number of nasty weaknesses that can be exploited by malicious persons.
Denial of service (forged disassociation) and active man-in-the-middle attacks (using higher signal and forged BSSID/SSID) continue to remain possible in even the latest security extensions to 802.11.
I'm surprised no mention was made of IDS systems that can detect and respond in real time to 802.11 layer 2 attacks (and other higher level IDS checks on the IP traffic), although even these are of limited utility
What about finding rouge APs (Score:3, Interesting)
I don't think that most people would be suprised that there is a lot of corporate espionage being done by going down to CompUSA and paying $100 cash for your untraceable security hole.
Re:What about finding rouge APs (Score:3, Interesting)
They set up wireless sniffers at the sites and those packets go to a central monitoring system. So if you put up a WAP, they get alerted and can track you down. They even send out people to practice this to make sure it works.
If you get caught, you get your walking papers. More than one person has left the bank this way.
Rouge APs want to be found. (Score:3, Funny)
Rouge [m-w.com] APs want to be found. Otherwise, why would they be applying cosmetics for coloring the cheeks or lips red? Alas, frequently, due to their garish application of rouge, most APs tend to attract only rogues [m-w.com].
Re:What about finding rouge APs (Score:2)
(wires are ugly)? (Score:2)
If you're going wireless just because wi
Re:(wires are ugly)? (Score:2)
But with a laptop running on battery power, you would be completely wireless unless you use an external mouse. Even then you can get a wireless external mouse. But you have to plug the laptop in SOME time.
Re:(wires are ugly)? (Score:2)
when somebody has an office that has bare cat5 cable dangling from the drop ceiling it's ugly and a sign of poor planning or a real cheap-skate
Rolls eyes on disbelief... (Score:2)
Keyboard, mouse, printer are all wireless.
Re:(wires are ugly)? (Score:2)
Hi Laptop. Hi Notebook Computer. How are you? Nice to meet you.
Seriously though, and I'll admit I'm making an assumption, but the blurb says this room is to be used for "in-house customer training." I'd be willing to bet this room doesn't use laptops but instead desktop PCs. I know I've never worked for a company that has laptops for in-house customer training, and I don't suspect there are ma
Re:(wires are ugly)? (Score:2)
Still, I would bet that your assumption is in fact correct in this instance.
Re:(wires are ugly)? (Score:2)
Re:(wires are ugly)? (Score:2)
Just wait for the next version (Score:4, Funny)
I've given up (Score:4, Funny)
I ended up tacking a ethernet cable along the ceiling down to the kitchen. I told the wife that it is just temporary until I drill a hole in the ceiling to run a hidden cable. (I even meant it at the time.)
Of course, I never got around to that, but it seems she's gotten used to the cable. Another problem solved by procrastination.
Rating: Outdated (Score:3, Informative)
Steven
Wires are ugly? (Score:3, Funny)
HAHAHA
Spoken like typical non technical person..
My last IT manager was so anal about wires it was insane. We averaged 300 drops per communications room coupled with the wires that needed to run into the switches, it was a nightmare. He made us rewire the entire things and neaten up the wires. I'm not a neat freak but I am not a slob either. The way he wanted it done it was impossible to track down any wires or work on any wires without completely undoing the bundles and starting over. He wanted the closer wires to be shorter so they would not have to be looped around the tray so instead of using prefabbed wires we had to cut and crimp our own in roughly 6in increments (some 18in, 24in, 30in etc..) He did not give a crap about the router upgrades we did, the uptime charts we had, the firmware upgrades, the cooling system or the UPS's we installed to keep the equipment running, all he wanted was a clean looking room in case any of his bosses vistited our site and wanted to look around. It was very obvious he could not impress anyone with his technical ability or oversight, so he decided to go the "neat" route.
Not as bad as it used to be.... (Score:4, Informative)
That's fine for home use. I'm not so worried about my simple 128bit WEP now. For the office you can go pricey, but good, with something like Cisco LEAP...or you can buy any old AP and do VPN/SSH/Tunnel.
Re:Not as bad as it used to be.... (Score:2, Informative)
EAP-TLS is also another model of security that is ignored when creating wireless networks.
The cool thing about these aforementioned security types is that they create a per user WEP key.
Basically, if you are not running a Cisco 1200 or Symbol T3 AP, you're not doing wireless security right.
Securing 802.11 is trivial (Score:5, Insightful)
802.1x has little equipment support? (Score:4, Informative)
Believe me, the wireless industry is moving heavily towards 802.1x (I've written two different implementations of 802.1x for two different access point products myself), so it should not be so casually dismissed.
For those who scoff at wireless security: sure, it probably won't be as secure as locked away wired networks; but 802.11i does at least make it non-trivial to break the security of wireless networks (pairwise session keys on a per-client basis, larger size keys, larger IV space, message integrity checks, etc).
Re:Americans! (Score:2)
Re:Here's a few basics. (Score:2)
MAC authentication -- Useless. Period. You can clone a MAC address with very little effort after you sniff a MAC address out of the air using airsnort.
Secure protocols -- I suppose but that isn't really different from a wired scenario so in essence you haven't added any security precautions. You are only observing the same care you should take in a wired world.
Lock down your AP -- Based on your description this only prevents access to the management
Re:Here's a few basics. (Score:2, Insightful)
Security is usually inconvenient, but it doesn't have to be too inconvenient. A wireless AP on a DMZ, with only the ability to VPN into the real network is a good solution.
Well, I can say two things here. If they aren't going to concern
Re:Another option (Score:2)
It has been said "place your wireless network outside the firewall", but I think this is only any good if there is also a firewall between the wireless LAN and the Internet too. Otherwise all the PCs on the wireless LAN are weak spots for a cracker. Compromise a box which has a VPN connection to the corporate LAN and you are effectively inside it.
I think the same argument applies to any type of VPN connection (such as users at home on a DSL or dial-up) unless