Study: Wi-Fi users Still Don't Encrypt 283
Shackleford writes "SecurityFocus has an article saying that two days of electronic eavesdropping at the 802.11 Planet Expo in Boston last week sniffed out more evidence that most Wi-Fi users still aren't securing their networks. Security vendor AirDefense set up two of its commercial 'AirDefense Guard' sensors at opposite corners of the exhibit hall at the Boston World Trade Center, the site of the conference, and for two days analyzed the traffic flowing between conference-goers and 141 unencrypted access points set up by the conference for public use, and by vendors on the floor.
What they found was that users checking their e-mail through unencrypted POP connections vastly outnumbered those using a VPN or another encrypted tunnel. Only three percent of e-mail downloads were encrypted on the first day of the conference, 12 percent on the second day."
WEP is weak (Score:5, Funny)
Re:WEP is weak (Score:5, Interesting)
Re:WEP is weak (Score:5, Funny)
That would be awesome! It would mean that once in a while, an actual spammer would be parked out in front of my house, so they would be in close enough proximity for me to run out and beat the living shit out of them.
Please spammers, I'm begging you. Try this tactic.
Re:WEP is weak (Score:3, Funny)
What about an Amish one?
Re:WEP is weak (Score:3, Funny)
where do I sign up!!!?
Okay ... (Score:4, Informative)
Maybe it's time for a new, and effective standard.
Re:Okay ... (Score:5, Insightful)
Furthermore... there are legal implications. Is sniffing out POP passwords in this way illegal? Probably, but maybe not.. but is doing so off an encrypted channel illegal? Most certainly... as there is no logical way you can deny that you kneew the signal was supposed to be private.
Re:Okay ... (Score:5, Insightful)
And with some patience, very little in fact, your car door can be opened, and your car stolen, or your house door opened, and your house cleaned out... but that doens't mean we run around leaving our doors unlocked and open.
A lot of people do leave their doors unlocked. Besides, your analogy is flawed because breaking into a car or house attracts people to the presense of the crime. Cracking WEP encryption is something that can be done in the privacy of your own home.
Is sniffing out POP passwords in this way illegal?
Maybe not, but using that sniffed POP password certainly is.
WEll (Score:5, Informative)
That means.. it was supposed to be roughly as hard to get access to the actual network packets as it is when someone has a wired lan.
The wire is not secure, as you know. Wires can be tapped numerous ways, invasively, or passively. Yes, the logic is kind of flawed, the situation is different.. but it just makes it harder to sniff, not impossible.
IT wasn't supposed to be a replacement for using secure protocols.
Re:WEll (Score:3, Interesting)
I agree.
I have yet to actually get WEP to work for anything beyond a brand X access point talking to a Brand X card. There are actually 2 or 3 different notations vendor's use for WEP keys. I'm just to lazy to learn one more level of obfuscation that is cracked with a tool downloadable from sourceforge!
Re:Okay ... (Score:5, Insightful)
At the moment I am sitting in a coffee shop with free, unencrypted, 802.11b internet access. My reading of slashdot, and the posting of this message, are quite readable by anyone nearby with motivation, a computer, and some brains.
But in another window I have an ssh session logged into my basement Linux server. When I logged in my notebook checked that the signature was as expected and therefore there was no man-in-the-middle attack going on. I am typing this on a notebook I control, I have high confidence that that session is as secure as my house (the weak link, my server is there). I don't need to trust the guy sitting a few chairs down, I don't need to trust the coffee shop.
If I really want to do some web browsing secure from local sniffers I could fire up netscape from my basement but with the display on my notebook. (X has some bebefits.) It would be slow, but it would work.
Encryption is not a magic bullet, but it is a very valuable tool.
What can you do? Don't use MS Windows. Don't use telnet for text logins, don't use plain POP or IMAP for reading e-mail--there are encrypted versions of both. Be worried about banking on open wires; if you see a padlock in the corner of your browser window it means (probably means, there could be bugs) it is encrypted and you have a secure connection to the other end--but who is on the other end? Is it *really* your bank? (This is the man-in-the-middle attack.) Think twice before typing important passwords on a keyboard you don't control. Twice in recent months there has been news of rogue technicians putting sniffers on keyboards, I think one was airport kiosks and one at some college.
Don't use one (or even two) passwords for everything. It is far better to write your different passwords down on a list and keep it in your wallet than it is to reuse passwords in different circumstances. If someone mugs you they can get the list and they might not appreciate its significance, but if you reuse a password one crooked or incompetent web site can leak and now anyone in the world might have your "master key". I keep my list of passwords encrypted with one nasty-ass-long password, and that one I don't write down. Pick good passwords, single words, names, dates, etc., are bad ideas.
Now think about all this advice. Think it through. Understand why I said what I said and whether it makes sense. There are no easy rules to computer security, you have to stop to understand the problem a bit.
One of the tasks involved in becoming an adult is to acquire an ability for "common sense", something that children don't have and take years to develop. Well, computer security has hit us and turned us all into children who have to learn a new kind of common sense. Don't just follow rules, learn and think. And don't be too paranoid.
-kb, the Kent who keeps his ssh related software up to date, and you should too.
Re:Okay ... (Score:2)
Problem is, slashdoters don't usually use the "higher end" ideas, such as irony, analogies and such correct. If you want to make your point, just make it.
wifi is nothing like having a car. It's like a line of communication, just like a voice call or using walkie talkies. Unless you use code (
Re:Okay ... (Score:5, Insightful)
Re:Okay ... (Score:5, Insightful)
Of course I wouldn't see it much differently if the conference hall had CAT5 jacks that you could plug into: You still should have no faith in the people running the show, or anyone capable of putting in a wire shunt, who have every ability to log and trace all of you messages: You should always presume that someone is listening. This is just another reminder that the world needs to move to secured application layer transport protocols as mandatory (or blocking external access apart from through a VPN) as quickly as possible, because the human element will always take the easiest route, and the natural human instinct, barring a case of paranoia, is to presume that nothing will ever happen to them- Every victim is someone who thinks it'll only happen to the next guy.
Re:Okay ... (Score:4, Insightful)
Of course there is always the alternative view that these people simply didn't care if someone was evesdropping on their email. I know I wouldn't be at all bothered.
People still send postcards - think of it - in this day and age when paper envelopes are so easily available...
Re:Okay ... (Score:2)
Correct me if I am wrong but, unless you already have access to the WiFi controller and know what MAC addresses have been explicitly granted permission, it doesn't matter that you can change your MAC address.
Re:Okay ... (Score:2)
Re:Okay ... (Score:3)
In the end, I guess it's very much like locking your car door. It'll disuade the casual thief but if someone really wants to get in, they're going to get in.
IPSEC (Score:2)
Re:Okay ... (Score:5, Informative)
At a conference, it's unlikely that people will even bother setting up WEP since key management isn't worth the effort.
MAC address filtering is a mixed bag. Yes, it's trivial to alter your own MAC address to impersonate another machine, but the usefulness depends on your environment. A big site probably won't bother with filtering. Too many addresses to track. A small site running MAC filtering may well have a clueful network admin who'll notice homeboy.haxornet.lan's MAC on the air when he -knows- he left that box at the office.
The point was the insecure protocols used over the wireless links. Web, POP, IMAP, telnet, etc., passwords sent in the clear are trivial to sniff in that environment.
As some have already pointed out SSL will cure that issue for quite a number of applications. Using SSH to reach your mail server is another simple "fix" to what is essentially NOT a wireless networking problem.
POP3 with SSL (Score:5, Insightful)
Re:POP3 with SSL (Score:2)
Re:POP3 with SSL (Score:2)
Ciryon
Re:POP3 with SSL (Score:5, Informative)
both IMAP and SMTP also support ssl nativley.
I use wifi around my apartment, and I encrypt everything via either ssl (imap, smtp and http) or ssh tunnels. After living on a non-switched college network for 4 years, I've learned to never trust the local network anywhere.
Re:POP3 with SSL (Score:3, Informative)
It's good that you've learned never to trust the local network anywhere, but your comment implies that you could rely on a switched network for some sort of added security. You can't. It is trivial to sniff traffic on a switched network. [sourceforge.net]
Yes.. (Score:3, Interesting)
Furthermore... if I'm the sysadmin, and I catch you running a sniffer, well, I probably won't care.
If I catch you doing arp poisoning in order to intercept traffic on a switched lan, I'm going to yank your connection / get you fired / expelled / press charges for hacking.
One involves listening. The other involves messing with stuff and deliberately breaking how things work.
Re:POP3 with SSL (Score:2)
Re:POP3 with SSL (Score:2)
Re:POP3 with SSL (Score:2)
http://www.washington.edu/imap/documentation/SSLBU ILD.html [washington.edu]
I don't think it uses stunnel. I've also done forwarding of port 110 over SSH.
Re:POP3 with SSL (Score:2, Informative)
Qpopper does.
Re:POP3 with SSL (Score:2)
Re:POP3 with SSL (Score:5, Informative)
ssh -N -l loginname -i ~/.ssh/identity_nopass -L 5110:localhost:110 pop.server.net
In the above, you would configure your pop client to go to localhost as the server on port 5110.
Re:POP3 with SSL (Score:2)
(Not that I'm automatically criticizing anyone that knows better and has still made a conscious choice to use Outlook Express. It's your right to not give a rat's ass about security.
Re:POP3 with SSL (Score:2, Informative)
Re:POP3 with SSL (Score:2)
https Re:POP3 with SSL (Score:2)
However they do have https'd web interfaces to the mail servers, so you can always use that at these conferences, and that would be secure.
At least ... (Score:4, Funny)
Re:At least ... (Score:2, Funny)
Good basic WLAN security info... (Score:5, Informative)
Application level encryption (Score:5, Interesting)
Suprasphere encrypts all socket communication using a dynamically generated Diffie-Hellman key exchange. This is much better than SSL because it does not require using a CA so you can set it all up without any administrative overhead.
Furthermore, all authentication uses a zero-knowledge proof so that a password is never sent over the wire. Even though the traffic is all encrypted anyway, this adds another level of security so that a compromised passphrase at one sphere will not allow authentication at any other. You can store a profile at different places that can only give you access if you can prove beyond a statistically reasonable doubt that you are who you say you are.
Re:Application level encryption (Score:3, Interesting)
Wouldn't that make man-in-the-middle pretty much trivially easy? All I would need to do is haxor the name server to point you to my evil box. You'd get a dutfilly performed diffie-hellman exchange just before all your data came into my posession. Your plan has no way to verify identity of the endpoints.
Re:Application level encryption (Score:3, Interesting)
And one very easy way of encrypting "every socket communication" is via IPsec. And, guess what, you don't need to hack every application to do it. Nor, for that matter, do you need
Suprasphere encrypts all socket communication using a dynamically generated Diffie-Hellman key exchange. This is much better than SSL because it does
Not surprising (Score:5, Insightful)
With all the media hype about wireless, a growing number of people are simply buying an access point and a couple of NICs, flicking through the manual, and then running default configurations, because the average user probably isn't aware that what they are doing *is* insecure, and has never heard of WEP. No doubt this (and newer ideas such as 802.11x) will be in the 'advanced' section at the back of the manual with bluntly technical instructions filled with acronyms and concepts that a non-IT savvy person would simply skip over.
Once it 'works', the majority set-it-and-forget-it - no different to the populous of home users running xDSL without a firewall, or those who never patch their boxes. A quick drive round your local residential area with a copy of Kismet proves this point for anyone with any doubt =)
On the flipside of the coin, in the corporate world, sales reps, engineers, and other 'road warriors' should really be given this advice from their support teams, and have their machines configured appropriately in advance by someone knowledgeable - they really can't be held responsible for the lack of action by the correct department.
Re:Not surprising (Score:3, Insightful)
Re:Not surprising (for other reasons) (Score:2, Informative)
There is a low likelihood that someone will engage in a targetted attack against your machine. However, with batch attacks being run by adolescents, targetting entire IP address ranges, you b0x could be 0wnz0r3d by such an attack.
Your...question, "My point is, sure, if someone went to the effort, I guess
Not surprising (Score:5, Interesting)
Screenshot of AirDefense software... (Score:2, Informative)
Jeez... (Score:4, Funny)
Comment removed (Score:5, Funny)
Re:Arriving clue (Score:4, Informative)
It's not the e-mail that's the problem. It's the fact that your password is sent unencrypted (with a few notable exceptions). And, a large portion of the time, I'd bet your password for the POP3 server is the same as that for a shell account with that ISP. Or FTP access to your web publishing directories. Or, if you're really stupid, it's the same as your online banking password.
Re:Arriving clue (Score:2)
Re:Arriving clue (Score:2)
Just a note.. The program driftnet is a fun toy. Try it on your insecure network today. It nicely lets you see
Re:Arriving clue (Score:3, Informative)
I mean really - if I want secure transfer of information i'm not going to use e-mail. The effort wasted securing it is truly wasted effort, in my view, because of the lack of a trusted MTA.
Use GPG. Then you don't have to trust anything, except that you have a geniune key.
Wi-Fi? (Score:5, Interesting)
A few years ago I was given a demo of TCP-dump by a resident BOFH. First step was to read all of the private communications between a certain user and other people in a chat room. The next was to take a look at some people's emails as they were relayed through the router (including their POP3 passwords). Since that day I have not sent any password unencrypted...
Re:Wi-Fi? (Score:3, Funny)
I'm amazed that people still use unencrypted anything over the Internet (well, except http. I don't really care if someone knows I read /.)
What do you care if someone reads your spam?
Re:Wi-Fi? (Score:2)
What choice do people have? For example, my ISP only offers unencrypted POP3 access, and that ISP is the only ISP that offers broadband access in my area.
If you have some suggestions for third party mail boxes that offer encrypted IMAP4 access, well, please share them.
Need new version of WEP? (Score:5, Interesting)
If you use WEP, but everyone knows the key (e.g., at a trade show so you need to make the key public to let people on the WiFi network), I assume that's the same as unencrypted. However, why couldn't there be a RSA or symmetric encryption for 802.11[x]? So you make the public key for the access point, available, anyone with that can connect, but your PC/WiFi card encrypts every packet going out the door, so the traffic going from the client to the access point is now secure. Similarly, the client gives the access point its public key, so all the traffic coming back to the client is also secure. This probably requires a lot more overhead in the access point and client, but I don't think that it would be unreasonably so.
Re:Need new version of WEP? (Score:2)
If you are using in-the-clear protocols, then your connection is vulnerable to eavesdropping _anyway_, wireless or no wireless. Use https instead of http, and especially use ssh instead of telnet. Of course this requires the other side to support it (many web sites don't do https) but that is just as you'd expect - a connection that is secure against attackers in the middle must necessarily require cooperation from both the endpoints.
Nah/Re:Need new version of WEP? (Score:3, Insightful)
Doesn't really work in this case. It's the network at these shows that is untrustworthy not just the airwaves. The only thing the WEP (if it works right) is good for is keeping people you don't want off your network; it doesn't actually add any significant security for the user from the network. So as a user in 99% of all cases you want end-end security, not point-point; because at each of these points the traffic is unencrypted an
Bluetooth (Score:2)
Bluetooth seems to address this: its encryption does not have the weaknesses of 802.11x, and newer versions apparently allow 128bit encrypted open/ad-hoc connections.
I'll take the chance that someone sees my penis-enlargement spam.
The problem is that people also see your POP3 password, which means that they may be removing both your penis-enlargement spam and your real mail from your mailbox after getting your password.
access point security (Score:4, Interesting)
ugh (Score:3, Informative)
WEP is a horrible thing. I use it msyelf, but that's mainly to keep my non-techie neighbors from turning on their laptops one day, have windows xp realize there's a wireless connection in their range, and start using my bandwidth. I have no delusions that my data is secure since anyone could, with a little patience, use airsnort [shmoo.com] to find out what my key is.
The accesspoints of the future
Re:access point security (Score:2)
But that means that the access point needs to be able to store one key per client. Furthermore, in order to be reasonably convenient, there needs to be a protocol to do the key exchange without user intervention. Adding this on to 802.11 looks like a major headache. (I think the new Bluetoo
Use encryption! It's easy. (Score:5, Interesting)
I'll explain. Many of us run web servers and let friends have sites or mail accounts on them. Now, I'm pretty sure that in most places reading your user's mail is illegal. Suppose you're logged in on your server trying to solve some problem by looking at what's going on with a sniffer like tcpdump or ethereal. Accidentally you see a friend's private email scroll by.
Now, of course, this wasn't intentional. But what if you make a slip? The email could have been about some event you didn't know about. Then, a week later you forget where you got that information from, you ask that friend about whether his grandma got better. The friend then asks "How do you know that? You weren't reading my mail, were you?". Depending on how this person feels about you, you might get into some trouble.
This is why on my server I provide IMAP accounts only though SSL. I never look in user directories unless needed. And I tell everybody who gets an account that if they want to be completely sure their data stays confidential that they should use PGP and that I can explain how to use it.
It's not that hard to set up, anyway. Set up a mail server with SSL and you'll be able to check your mail safely from anywhere. Install SSH for administration. Install Apache SSL even if you don't need it much, to give the users who want it the ability to log in with an encrypted connection. Use an instant messenger like Jabber with a SSL connection too.
Don't worry about self-signed certificates. A certificate from Verisign provides a rather small increase of security which people tend to ignore anyway. If you just want to avoid your traffic from being sniffed, it should be enough.
Excepting web browsing, most of my data is encrypted. I even found that I can browse kuro5hin.org throught https. It's a good thing too, when I login my password won't be sent in clear text.
and? (Score:3, Interesting)
You know, it is sometimes good to be "paranoid", but often it is just that, paranoia. Do I care if someone sniffs my unencrypted "penis enlargement NOW!" emails? Security is not always the primary design factor, and sometimes is disregarded altogether in the face of getting things done.
I can't help when I think of "security" of the push/pull battle that the U.S. Army had with the Manhattan Project personal. The Army, of course, say bogeymen under every rock at Los Alamos, but the scientists soon discovered that to aid in the project, many "security" concerns had to be circumvented...
Re:and? (Score:3, Informative)
Universities are the worst (Score:4, Insightful)
This all adds up to make it really easy to sniff usernames and passwords just by sitting in a campus hangout area with a packet sniffer.
I have whined at my University for IMAPS support and was told that, while they were interested, they couldn't roll it out because their servers couldn't handle the extra CPU load from all that encryption/decryption. I suspect the answer is the same in other places.
Re:Universities are the worst (Score:3, Interesting)
Re:Universities are the worst (Score:2)
What about secure IMAP? (Score:2)
Trying to get secure email has been a bugbear for me ever since my mail server started supporting secure IMAP and secure SMTP.
The hardware specifications are as follows:
Toshiba Tecra 9100, European, with built-in wireless (an orinocco under the hood)
One Netgear ME102 nice and simple mdaemon mail server (altn.com)
Outlook XP (so sue me)
A couple of revisions ago mdaemon started supporting SSL for IMAP and SMTP. Great, I thought, I'll enable that in Outlook and when I'm out and about on public APs I'll
Mail a nonissue (Score:2)
(It is a bit more worrying if someone could pretend to be me and delete all my messages from the server.)
Re:Mail a nonissue (Score:2)
You just answered your question. I'm not particularly concerned about the contents of my email, either. But, POP3 sends the password in the clear.
That password is typically also the account password, giving the interceptor access to all of your services, while masquerading as you.
There doesn't need to be a study for this! (Score:2, Interesting)
Because (Score:3, Informative)
802.11b is slow enough already.
Try streaming a DivX over wireless with encryption, it doesn't work. It barely works when you turn it off.
Re: (Score:2)
Overreaction (Score:5, Insightful)
Security isn't a major issue for home users. That's why they don't treat it as such. Sorry guys.
Re:Overreaction (Score:5, Insightful)
it's not like home users access services at work, bank accounts, online shopping, credit cards, in house file sharing, personal financial correspondence, IP phone calls, and so on... they really have nothing to worry about.
Hey.. why not stick your filing cabinet in the front yard with all the papers in it and say "free shit!" too!
Home users don't treat security as a big deal because they don't KNOW the issues, because they are a bit too technical.. because joe average doesn't have time to get into the details.. not because he doesn't care about security.
Re:Overreaction (Score:2)
You have a point. But let's be a little realistic. The fact is that you dont have malicious wardrivers in every neighborhood in every town just waiting to get your bank password, credit card, etc. I think a lot of well meaning computer security folks tone up the FEAR factor a little
Spammers (Score:2)
Re:Overreaction (Score:3, Insightful)
Fine, well, if I were to hack some corporation or person on the net I would do it through a wireless connection to some open network like yours, then hack through one of your systems and trash your system on my way out to delete as much evidence as possible. Its virtually anonymous and it doesn't matter whether your data is valuable or not. I'm not interested in your data, I'm interested in anonymity.
You can trust 99% of the people, but it only takes one like me to ruin your day. And I think that is
Re:Overreaction (Score:3, Insightful)
Sure. Until he sends some kiddie porn to his buddies, and it gets traced back to *your* network and IP address.
Prove it wasn't you.
The Power of Defaults (Score:2, Insightful)
Take it out of the box, plug it in, and it works. That's the beauty of wifi.
I'm sure we'll see a move my manufacturers towards secure-by-default (as secure as possible, that is) as we've seen Microsoft trying to do with IIS in Win2003.
That said, there is certainly a place for unencrypted open networks.
yeah, wardrive and prove it! (Score:5, Informative)
I was surprised that I was able to pick these up from the street. Also surprising was the names of some of the networks, I mean kittyNET, c'mon!
Also, it's amazing how many people have linksys.
USE WEP, PEOPLE! Or at least configure your router to only accept your computers' MAC address! jeez.
There's lots of reasons to close your network to the outside. The main one being that you don't want to give people access to your LAN. Most people don't password their computers from other machines on the LAN, since they figure it's secure, but it's not. Also, I tried the default linksys password ("admin") on a couple of the networks, and would have been able to change router settings. Imagine setting up a dreamcast w/ wifi outisde of someone's house on their external power outlets and serving warez off their connection. sheesh.
these routers should come with little pamphlets about wireless security.
Re:yeah, wardrive and prove it! (Score:4, Informative)
WARDRIVE! [sadistech.com]
Hilarious! (Score:2)
Coincidence! I am currently mootching some guys 802.11b net here in SF. Thanks for the 11mbit 80% signal quality link! My friends had been offering the telephone which I connect @~50kbis, I think I will stay on here instead.
yeah, but ... (Score:2, Insightful)
I think you should forget about WEP and use IPSeC and VPNs instead
How did they identify all tunnels? (Score:2)
Only three percent of e-mail downloads were encrypted on the first day of the conference, 12 percent on the second day.
I am not familiar with the tool they used. It doesn't say how many different kinds of encrypted connections they looked for (since there are a wide variety from https to ssh that are easily applied to email, not to mention products that support content-based rather than connection-based encryption and more). Does their claim to have counted all encrypted tunnels really mean they are om
The overall scope of security is more important (Score:5, Insightful)
As I see it, there are two very fundamental reasons for this: lack of awareness and lack of comprehension. The average day-to-day user doesn't even know what a firewall is..what are the chances that they'll have a clue about encryption? I mean, c'mon..we're living in a world of users who largely think that SSL means that they're safe as can be, that security is something you purchase, and the only difference between wireless and a traditional connection is a lack of cables.
Awhile back, I was going on a pretty big BSD advocacy kick..y'know what finally made me give it up and shut my mouth? One girl had a bunch of questions, so I tried to answer them as best I can. I also wanted to make sure that I made clear the differences between Windows and BSD, as most MS users aren't accustomed to the file system, configuration, etc. So, naturally, I bring up firewalls, and how you essentially write your own rules for it by hand (in this particular instance, I was covering ipfw).
Rather than take my advice, she immediately became defensive, ranting off about how she's not some AOL kid, and how she already has ZoneAlarm, so she won't need to worry about a firewall on BSD. I could go on and on with stories like this.
I realize that this isn't just about wireless, but I don't think the issue is that limited in scope. Computer security is taboo to a lot of people, and unfortunately, it's a problem that needs to be addressed...or taken advantage of by those with a greater sense of what the fuck is up.
smells like... (Score:2)
Security vendor AirDefense set up two of its commercial 'AirDefense Guard' sensors
I guess they're terrorists. Guards, seize them!
WiFi Worm Challenge? (Score:3, Interesting)
Someone could cause chaos by strolling through a downtown with an infected system.
How to add WEP to your WAP (Score:5, Informative)
1. Visit this [random.org] page -- it will generate 13 random hexadecimal digits that you will use for a 128-bit key.
2. Copy the resulting digits into a text editor and strip out all of the whitespace between the characters.
3. Log into your WAP router and go to the Wireless configuration settings. Select the "128-bit encryption" option, and enter the generated key into the WEP key field.
4. The last step is OS-dependent... In OS X, you would log on to the WAP as usual, except that now it will ask for a password. Select the dropdown box labeled "password" and change it to "128-bit Hex", then enter in the generated key. I believe OS 9 users will need to enter a "$" before their hex key for it to work properly. It won't let you paste the key in, so you will need to type it carefully. I don't run my Linux box via WAP, so I'm not exactly sure how Linux users would do this -- feel free to reply to this post and add other OS instructions...
Possible solution for the average home user (Score:5, Insightful)
Home users want to take their notebooks anywhere in the house and be able to surf. Business travel through airports (interoperability) may not even be their priority.
Why should they be concerned about mac addresses or hex keys? Firmware upgrades to make things more compatible?
Lets make it easy for them. Vendors should sell wireless home networking kits that have all the encryption turned on in advance by default, with drivers that assume this also by prompting for the prepackaged keys at install time.
Joe user could buy a box containing an access point with two pcmcia wireless nics. By default those two nics will be the only onces that can access the access point. The shiny box that says "easy install" will be what clinches the purchase.
Of course an advanced user could still change the defaults to suit their needs.. but that requires effort.
Joe User will always assume the defaults are good enough for him, and they should be.
Doesn't bother me. (Score:5, Insightful)
Even if you do care, IPSec is probably a better choice than WEP is.
Re:That's it! (Score:3, Insightful)
If people don't think wireless security is imporant and we make a law that forces them to implement it then respect of law will suffer. Just like how it's happening with p2p. And do you really want to waste police resources to triangulate source of wifi signal? And even if they do that they'll still have to get a warrant to make sure the signal comes from the place they think it's coming. Whoops, you can't get a warrant for a crime that only has
Default Mode: Authenticate (Score:2)
Maybe the next version of 802.x will make this happen.
Re:How can they tell? (Score:4, Insightful)
The WiFi links were unencrypted, having been provided by vendors at the show that set up open access points.
The question was whether the users implemented their own end-to-end encryption with their email servers, etc. via SSL, SSH, IPsec, or whatever. That's pretty easy to recognize.
Re:How can they tell? (Score:2)
Ah, I see your point. There are some well-known ports for SSL encyption of IMAP, SMTP, and POP3, but it's not always obvious that web access would be for webmail. However, the IP's are not encrypted by SSL, so they could have checked the server being referenced.
On the other hand, SSL/SSH tunneling and IPsec would conceal the IP addresses outside the tunnel, so it wouldn't be poss
Re:Interesting... (Score:4, Informative)
Its about people using an insecure method to access their mail.
The wireless access points were ment to be open to the public.
Jeroen
Wireless or not -- secure email on the road (Score:3, Informative)
Agreed. Anytime you are checking your email on the road it should be secure. ssh tunneling is one method, secure webmail is another.
What amazes me is that so few firms understand that their "road warriors" are their weakest link in their security. You frequently see firms where engineers are told they cannot work from home, even with ssh tunneling, "for security reasons", but the companies' road warriors are zipping in and out of airports with detailed business plans and spreadsheets sitting on their un
Re:Interesting... (Score:3, Insightful)