Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Wireless Networking Security Hardware

CNN Notices that WiFi is Insecure 417

josh3736 writes "From CNN comes an article that makes painstakingly obvious to the public what we already knew: 802.11 security is horrible. The article points out that nearly 40% of wireless network APs haven't even been changed from defaults and as many as 80% of home APs have encryption disabled. The article goes on to say that '[t]o make matters worse, users who don't secure their networks are often the very people who don't keep their computers up to date with the latest security patches and antivirus software.' It also accuses WiFi manufacturers of disabling security measures by default to make wireless easy to the lowest common denominator. My favorite quote? 'Experts say that while Wi-Fi hardware makers have made initial setup easy, the enabling of security is anything but. Meanwhile, average users are no longer tech savvy.' Which is to say that they at one point were?"
This discussion has been archived. No new comments can be posted.

CNN Notices that WiFi is Insecure

Comments Filter:
  • by LostCluster ( 625375 ) * on Tuesday June 01, 2004 @10:22AM (#9302891)
    One major flaw I see in telling people to enable WEP on their WiFi is the first question I'm sure to get back is "How do I do that?" and, well, the instructions for doing that are different for each and every item on their network.

    What's more annoying is that people think the "passphrase" they type into their router a the WiFi key rather than what it usually really is, the random seed from which their router generates the actual keys. They type their passphrase into their other devices when they're supposed to type a key value, and then they wonder why it doesn't work anymore when it was working just fine before they tried this security stuff.

    I've had friends who I thought were tech savvy get tripped up over this stuff. I blame the router-makers for not providing software that makes this a whole lot more of a user-friendly experience. We as the IT industry are badly failing at this... and having a lot of open WiFi points will just make our other headaches such as spam and viruses worse in the end. This really needs to be addressed for the good of the Internet.
    • by Oxy the moron ( 770724 ) on Tuesday June 01, 2004 @10:31AM (#9302993)

      I own a linksys 802.11b router and it came with an 802.11b PCMCIA card. I had no problems getting WEP to work on either the router or my laptop. Linksys did a great job making the process easy with the router's web-based config and the configuration tool software that is provided in the package for the card. I came up with a passphrase and I could easily apply it across the board.

      However, when I bought a new laptop with 802.11g wireless built-in (not from Linksys) I started having all sorts of problems trying to get the new laptop connected. I have to use the default Windows XP configuration tool (which sucks, IMO) and even when I do get connected with WEP enabled, the speed is horrible. And I'm of much higher technical aptitude than those mentioned in the article.

      My point? I think the ease of configuring wireless depends totally on the manufacturer, and whether or not you have all your products from the same manufacturer. And none of them do a very good job of telling the consumer how to protect themselves.

      • by Zak3056 ( 69287 ) on Tuesday June 01, 2004 @10:53AM (#9303208) Journal
        I have to use the default Windows XP configuration tool (which sucks, IMO)

        I've often thought Microsoft should rename their "Wireless Zero Configuration" utility to "Wireless Zero Connectivity."

        Because that's what you end up with: an intermitent link that you can't troubleshoot because you just can't get enough information out of it. To make matters worse, when you have this "service" enabled, it makes multiplayer gaming impossible. It actually disconnects from and reconnects to the AP every minute or two, with predictable results (stutter, even disconnection from the server.) To make things even more fun, it prevents third party configuration tools from working (like linksys' for example, though I believe Intel's will work properly.) There aren't even any usable workarounds.

        Linux may not support nearly as many devices as Windows does, but at least YOU can decide who's tools you want to use to control them!

        • by Ummagumma ( 137757 ) on Tuesday June 01, 2004 @11:38AM (#9303831) Journal
          "It actually disconnects from and reconnects to the AP every minute or two, with predictable results (stutter, even disconnection from the server.)"

          You may want to check your hardware. Mine (on 4 different machines, home and work) does not act like this.

          "To make things even more fun, it prevents third party configuration tools from working (like linksys' for example, though I believe Intel's will work properly.) There aren't even any usable workarounds."

          You can simply uncheck 'Use Windows to configure my Wireless Settings', and third party tools work perfectly fine. As a matter of fact, Im typing this on an 802.11g network, on WinXP, using a Netgear with the Netgear utility, and not XP configuring my settings.

          I get the feeling you either have bad hardware, or don't know what you are doing.
          • by The Spoonman ( 634311 ) on Tuesday June 01, 2004 @12:09PM (#9304243) Homepage
            I get the feeling you either have bad hardware, or don't know what you are doing.

            Most likely it's that they don't know what they're doing..the people who frequent this site are mostly IT guys who'd rather complain that it's "all Microsoft's fault" rather than find a solution to the problem. I've got three wireless machines, with three different wireless cards and not a one of them has these kinds of problems.
        • I sometimes have the same problem on my laptop, but it depends on which card I have in. The Linksys 11b ver. 3 card drops the AP every few minutes but my Linksys 11g card has never dropped it. Both cards are configured by Windows. (I use the 11b one now since I can't find the 11g)

          It's quite annoying since I ditched WEP in favor of just running a VPN to the rest of my network to get some real wireless security. The wireless network itself has all of the 'security' features enabled, but once you associat

      • by Lodragandraoidh ( 639696 ) on Tuesday June 01, 2004 @11:49AM (#9303981) Journal
        This is precisely why I standardized my whole network on Linksys products. Once I did, all of my compatability problems went away - and administration is a breeze.

        I have a carboard box full of old NICs that I acquired cheaply, thinking at the time that I would be able to save a buck. What I saved in money, I lost in time trying to get all the disparate cards to work on various machine architectures and operating systems. I finally broke down and bought all Linksys - at the time a basic 10/100 ethernet NIC was only $10 (now they are $25...must have caught them on sale at the time...) I plugged them in my Linux and Windows machines - and they just worked, right out of the box.
        • standardized my whole network on Linksys products.

          I'm a linksys house too : except that turing WEP on with my Linksys router breaks Apple's rendevous. (No printer sharing, remote volume mounting, etc) Until Linksys starts making Macs, I can never standardize my whole network.

          Either Apple or Linksys are playng merry buggers with the WEP standard, (of course rendevous works fine with WEP enabled on an Apple Airport AP): the point is that the user shouldn't have to standardize on Linksys or Apple any single
    • I have to agree with this point. I remember setting up my wireless router, and the instructions for setting up WEP or any of the other security schemes included were basically non-existant. It took me some digging before figuring out how it was supposed to work exactly. For the time that the internet was inaccessible while I was setting everything up, I got complaints from family about when they'd be able to use the internet, so I set the router to work w/o encryption, then came back later to fix it. I
    • by Minna Kirai ( 624281 ) on Tuesday June 01, 2004 @10:42AM (#9303106)
      One major flaw I see in telling people to enable WEP on their WiFi is the first question I'm sure to get back is "How do I do that?

      So what? It's not like WEP provides security. It's a fundamentally broken protocol [berkeley.edu].

      CNN is engaging in dangerous misreporting. They spun it so that insecurity is the AP vendors' fault by making WEP difficult to activate. This will lead viewers to believe that once they manage to enable WEP, they're safe. And that's just absolutely wrong. You'd be safer with no WEP and higher-level encryption (although running secure application protocols is even further outside the imagination of typical consumers).
    • by sadler121 ( 735320 ) <msadler@gmail.com> on Tuesday June 01, 2004 @10:48AM (#9303163) Homepage
      WEP is completly insecure, and can be broken really easily, its really not worth it. I think making sure you are not broadcasting your ID, and setting up MAC address filtering, is the way to go. That would keep war drivers from 1)Finding your network, and 2) Connecting to it.

      As for war drivers sniffing passwords and stuff out of the air, all you would have to do is make an effort to use secure methods of transport, like SSL,TLS, etc, which is way stronger and harder to crack. we forget that plain text passwords, etc. are just as harmful on a wired network then on wireless network. Would you submit your CC information to a company, on a WIRED network, that sent your information with out encrypting it via SSL? Of course not! Same as with Wireless networks.
      • by pe1rxq ( 141710 ) on Tuesday June 01, 2004 @11:02AM (#9303358) Homepage Journal
        WEP can be cracked... but it requires an effort.
        The key in protecting something is to make the time needed to get in as long as possible.
        Without wep most cards will join a network within seconds, with wep you are already save for most wardrivers (they are usually not warparkers).

        MAC filtering as you mentioned is an even bigger security hole than wep. Look up the 'hwaddr' option in the ifconfig man page.

        The combination of no beacons, mac filtering and wep will make your network such a hard target that it will take a considerable effort for someone to use it.

        Jeroen
    • My in-laws just got high speed access through Comcast. Instead of a standard cable modem, they were given a Linksys wireless router (branded as Comcast). I placed the order so I know we didn't ask for this, since I went out a bought a wireless router for them already. So now I get there and they have a wireless router with WEP turned on but no key entered and no one bothered to leave the password so I could set it up properly. It took me an hour on tech support before they could get me the login and password. I can't imagine many of the non-tech savy people going through all of this.
  • by tcopeland ( 32225 ) * <tom&thomasleecopeland,com> on Tuesday June 01, 2004 @10:22AM (#9302892) Homepage
    ...I kept my Linksys WAP11 box wide open until one day I sat down at my computer to see that some fellow using the machine name "god" had joined the network and sent me a NetBIOS "net send" message. Ho ho, how clever.

    Sigh... OK, fun time's over, no more sharing, hook up USB cable, generate hex key, etc. Kind of depressing.
    • by Coos ( 580883 ) on Tuesday June 01, 2004 @10:28AM (#9302967)
      Not only depressing: Despite your shiny new WEP key, if 'god' is smart enough to use google to find a WEP crack script, and to not announce his presence in future, he's probably *still* logged into your system. There is no WiFi security at present - do it all elsewhere (firewall, encrypted protocols, VPN).
      • by ch-chuck ( 9622 ) on Tuesday June 01, 2004 @10:40AM (#9303093) Homepage
        Have you actually done it? I have been running Airsnort in my apartment with two encrypted nets visible and have had absolutely no results so far. Probably not enough traffic, but also thought THIS [oreillynet.com] article interesting. Would be nice to hear if anybody has actually been successful or just repeating the 'myth'(?).

        • by Otto ( 17870 ) on Tuesday June 01, 2004 @11:16AM (#9303553) Homepage Journal
          Couple of years ago when 802.11b was kinda new, i did some testing of this sort of thing.

          The fast crack using weak frames worked then. It doesn't work much now, if the boxes are using newer hardware.

          The slow crack where you get enough packets to figure out the key worked then and now, but in order to actually do it back then I had to set up some continous traffic to get enough packets to make it work. We're talking millions of packets here, and it just takes forever to see enough to do it, with 112/128 bit WEP.

          Can they get in? Sure.
          Will they get in? They're going to have to really want in pretty badly or live nearby and be bored enough to capture for a long period of time. And if they just want free network access, they'll find the easier target like the unsecured one down the street. Or pay the 3 bucks at the nearest hotspot for the hours worth of access.

          WEP is not secure, but in 99% of cases, it's secure *enough*.
          • The problem is (Score:3, Informative)

            by phorm ( 591458 )
            WEP is not secure, but in 99% of cases, it's secure *enough*.

            That within the 1% of cases where it isn't secure enough, the results can be scary. The issue being, you don't know what your WiFi is being jacked for. Sure, it could just be the script kiddy logging in as "god" to play a joke... it could also be a spammer. Or it could could be somebody pulling a credit-card scam. Or it could be somebody that guy that was caught driving around leeching of local WiFi's with his laptop to download kiddie pr0n.

            P
      • I thought that with WEP and MAC address filtering, you could lock it down pretty tight? Not having sniffed wireless traffic yet, I don't know if it's 100% encrypted, so that even MAC addresses would be encrypted. Otherwise, if MACs are still publicly available for sniffing, then you're right, there's 0 security.
        • If you have WEP, then anybody capable of cracking into the WEP is going to be capable of sniffing your MAC and duplicating it using their card. It's not particularly difficult to do or anything.

          Now, if you're just trying to keep out the neighbors from accidently connecting to your network, MAC filtering is fine. But it should not be considered a real security measure by any means.

          I also see a lot of people thinking that turning off the SSID broadcast actually does something useful. It doesn't, really. The
    • by dilweed ( 698689 ) on Tuesday June 01, 2004 @10:28AM (#9302969) Homepage
      Are you there Kent?

      It's me, God.

      Stop Touching yourself Kent...
    • Comment removed based on user account deletion
    • by Zerbey ( 15536 ) *
      Yes, use a WEP key, yes use MAC filtering. No they're not 100% secure but they'll slow most attackers down. Next thing is to secure your local network so even if he gets in there's not much he can get into.

      Nothing is 100% secure, a determined attacker is going to get in eventually. Just don't make yourself an easy target.

      Despite my best efforts to teach him otherwise, my next door neighbour still allows the entire world to get onto his wireless network and do whatever they please. Which makes my netwo
  • Sure... (Score:3, Insightful)

    by drinkypoo ( 153816 ) <drink@hyperlogos.org> on Tuesday June 01, 2004 @10:24AM (#9302915) Homepage Journal

    Meanwhile, average users are no longer tech savvy.' Which is to say that they at one point were?"

    Of course they were. Around the time of the Apple I. Since then, the average cluefulness of computer users around the world has been plummeting because computers have been getting easier to use and the bar to entry has been lowered, with humorous results such as people using clueless people's WAPs.

    • Re:Sure... (Score:4, Interesting)

      by laigle ( 614390 ) on Tuesday June 01, 2004 @10:31AM (#9302989)
      The average WiFi user was tech savvy too, back when only us computer geeks used it. But now that Best Buy is convincing people they need WiFi to hook up their printers, things are not so secure. Once a technology goes into mass use, the onus for security and functionality rapidly shifts to the manufacturer instead of the user. Unfortunately, most companies just shrug off these problems until we start seeing catastrophic side effects.

      It would be nice if Homeland Security could take a break from trying to find terrrorists by which shoelaces they buy to enforce technological security mandates. Unsecured WiFi networks all over the country are very useful to criminals and terrorists.
      • Re:Sure... (Score:5, Insightful)

        by timeOday ( 582209 ) on Tuesday June 01, 2004 @02:21PM (#9305940)
        It would be nice if Homeland Security could take a break from trying to find terrrorists by which shoelaces they buy to enforce technological security mandates. Unsecured WiFi networks all over the country are very useful to criminals and terrorists.
        No, no, no, please don't ask for that.

        Look, the Internet is not a secured network - not just WiFi but in general. Let's keep it that way.

        I'm glad it doesn't take a license to make a telephone call or use the Internet, even though somewhere, some terrorist is making phone calls. Trying to turn the Internet into some little closed system would be cutting off your nose to spite your face.

        As for WiFi security, it's funny how we're still getting this endless deluge of "OH NO! WIFI IS INSECURE!!!" alarmists. The reason people don't care is because it doesn't matter very much. There just aren't many good horror stories about somebody's life getting ruined because their wireless network was compromised.

  • by CAIMLAS ( 41445 ) on Tuesday June 01, 2004 @10:24AM (#9302920)
    Yes, believe it or not, at one point your average user was at least marginally tech savvy.

    That point in time was somewhere around 1985, and possibly on upwards to the early to mid 1990's. Not so, since Windows became synonymous with PC, and the Internet began to define personal computing.
    • Absolutely (Score:5, Insightful)

      by Safety Cap ( 253500 ) on Tuesday June 01, 2004 @10:28AM (#9302966) Homepage Journal
      Back in the good old days of pre-Win 3.1, when people were using DOS + QEMM, the quality of calls on the old Q'Deq helpdesk were much higher. Instead of asking "what's an autoexec.bat?" the average user would be more interested in which interrupts we were tripping (for the record, int 21).

      Once the 'puter became a household appliance instead of a hacker's toy, that's when things started to go downhill.

  • It gets worse (Score:5, Interesting)

    by PktLoss ( 647983 ) * on Tuesday June 01, 2004 @10:24AM (#9302922) Homepage Journal
    Not only do WiFi equipment manufacturers disable most of the security by default. Some blame any connectivity issues you are having on the encryption (see How stable is WEP [slashdot.org]).

    Personally, I would love to see some more options when it comes to turning WEP on. Since my laptop connects in both a wired and wireless manner to my network, it would be great is some software generated a new WEP key to use each time I went wired. I see no reason that the end user would need to be involved, any weakess on the part of the pseudo-random generation of a new WEP key would be less insecure than having the same one for months on end.
    • Re:It gets worse (Score:3, Informative)

      by swordboy ( 472941 )
      Amen...

      I do a lot of side work for friends, family and other strangers who beg me for help when they find out that I have The Knack [unimelb.edu.au].

      In the end, I leave all security off by default because they will inevitably:

      1) get a new PC
      2) play with the settings on the PC
      3) require a "hard reset" on the router

      If Microsoft and the hardware vendors could make this stuff easier, it wouldn't be so much of a problem. I suggest the following:

      The router redirects unsecured wireless users to a webpage that requires log-on
  • by monkeyman_67156 ( 571036 ) on Tuesday June 01, 2004 @10:26AM (#9302946)
    The very reason that Wi-Fi networks exist is that they provide simple, easy-to-use network connectivity wherever you are. Security takes a backseat to ease of use. The equipment manufacturers don't want to have to deal with the support calls if they would enable security features, such as WEP, out of the box. Adding security to Wi-Fi networks makes them harder to use and less appealing to the average consumer. Thus, it's easier for manufacturers if consumers remain blissfully unaware of the huge backdoors into their networks. But then again, anonymous internet access from my neighbor isn't that bad.
    • I do a fair bit of house-call work in my area. (Pays the bills...) I've set up a fair number of WiFi networks at homes and offices over the past few years. Most of the home networks do not have WEP enabled.

      Contrary to popular belief, WEP is quite useful. Unless you have a script, you probably won't break the key. Getting and using the script is a malicious act... And there are so many other EASIER targets.

      For businesses, I enable WEP by default. (Actually, I recommend that they stick to wired
  • They were. (Score:3, Informative)

    by GeorgeH ( 5469 ) on Tuesday June 01, 2004 @10:26AM (#9302951) Homepage Journal
    My favorite quote? 'Experts say that while Wi-Fi hardware makers have made initial setup easy, the enabling of security is anything but. Meanwhile, average users are no longer tech savvy.' Which is to say that they at one point were?

    When WiFi was just getting started only tech savvy users used it, meaning that the average WiFi user was tech savvy. Now, everyone and their mother (or at least my mother) is using WiFi, and the tech ability of the average user has gone down.
  • by binaryspiral ( 784263 ) on Tuesday June 01, 2004 @10:27AM (#9302959)
    I enjoy the fact that most idiots have wifi encryption disabled and the defaults set. It makes my life easier when I'm biking or traveling with my laptop or ipaq.

    Most residential and a lot of commercial areas give me free access to the internet - they may or may not know it, I don't really care.

    I don't check my email or browse until I vpn into my home network. Just in case someone is sniffing packets - lets not make it that easy.

    And the reason that Linksys and the rest of them don't enable it by default - tech support costs.
  • New malware vector? (Score:5, Interesting)

    by bpfinn ( 557273 ) on Tuesday June 01, 2004 @10:27AM (#9302960)
    users who don't secure their networks are often the very people who don't keep their computers up to date with the latest security patches and antivirus software

    I wonder if this would be a new, easy way for people to start a new worm/virus infection. Wardrive down the street, map a few hundred potential victims, and come back later and put the bugger in the "Startup" menu on Windows PCs. Ack.
  • We investigate -
    Claims that fire is hot,
    Reports of wet water, and later, Is it dark at Night?

    Jeez - talk about stating the obvious.
  • by Tuxedo Jack ( 648130 ) on Tuesday June 01, 2004 @10:29AM (#9302978) Homepage
    I don't regularly wardrive, because I don't own a car; I use pubtrans. Anyways, in Houston, Texas, between Gessner and I-10 and Kirkwood and Memorial, I counted no fewer than ten open networks, all running Linksys G routers. All of them had their DHCP servers up and running, and all had the default admin passwords up.

    Admittedly, it's nice to have open connections, but if people don't bother to secure them... well, people could do nasty things to the routers and screw with the connections.
  • by stratjakt ( 596332 ) on Tuesday June 01, 2004 @10:30AM (#9302981) Journal
    ... has the not surprising statistic that 90% of home users DONT GIVE A FLYING FUCK if the family PC (which they consider no more than an expensive Nintendo/source of free music) is hacked.
    • by Cruciform ( 42896 ) on Tuesday June 01, 2004 @10:42AM (#9303103) Homepage
      Don't forget those people who can claim it was "evil hackers" who put the stolen credit card info / child porn / whatever on their machines.

      Innocence is just a matter of pretending you don't know how to use your machine.

      Funny how gun owners or accident prone drivers don't get to use the same defense.
  • Bottom Line (Score:4, Insightful)

    by Effugas ( 2378 ) on Tuesday June 01, 2004 @10:30AM (#9302983) Homepage
    WiFi without security "just works".

    WiFi with security is a configuration nightmare.

    So people keep things "just working". When this becomes a problem, we'll see things change. That's how it actually works in security -- be the problem dozens of open daemons on Unix hosts, canary-less stacks in executable code, or a lack of significant checking for airline contraband, the problem is not addressed until it's exploited. When people start getting hacked through their open wireless, we'll see open wireless shut down. For the moment, they'll worry about real problems, like worms and spyware (aka corporate virii).

    Ironically enough, it was bluetooth's security model that made it such a nightmare to work with -- the whole pairing process increased the setup load by several orders of magnitude. They're finally going to fix this with Near Field, but it'll take a while for them to get it out (have they even admitted it's for secure key exchange yet?).

    Note, I've never said this is how things should be. Ought is not is.

    --Dan
  • The following three levels of security are good enough for most cases:

    1) Never broadcast SSID
    2) Use a 64 bit encryption
    3) and use MAC filters

    Most of the routers have a web-based interface for setting these things up.
  • by foxtrot ( 14140 ) on Tuesday June 01, 2004 @10:33AM (#9303011)
    The WAP I'm using is in out-of-the-box factory default insecure mode.

    I really wish I knew which of my neighbors owns it.

    -JDF
  • by Mysticalfruit ( 533341 ) on Tuesday June 01, 2004 @10:33AM (#9303013) Homepage Journal
    Yesterday while watching TV over a buddies house I saw a commerical that Verizon is going to be giving away (after you mail in the rebate) a wireless hub with all their new DSL subscribers.

    This just frightens me.

    I'm just imaging the sheeple who will order DSL, get this wireless router, follow the nice glossy fold out instructions and set the thing up, with no understanding of wireless security whatsoever.
  • Wide open in NYC (Score:5, Interesting)

    by chillmost ( 648301 ) on Tuesday June 01, 2004 @10:33AM (#9303014) Homepage
    A friend of mine moved to New York City and only kept a land line telephone so he could connect online with his modem. He used his cell for all his calls. I visited him a few months later and he had gotten rid of his telephone line because as soon as he got an Airport card he realized how many open routers there were all over the place.

    He said, "As long as I live in this city, I'll never pay for Internet again." We'll see if that remains true when consumers with wireless routers wise up and turn on some of the security features.

  • by Yenya ( 12004 ) on Tuesday June 01, 2004 @10:33AM (#9303015) Homepage Journal
    I have intentionally left WEP off on my AP at home. I use ssh or https for anything sensitive, but I want my visitors to be able to connect via my home
    network without sophisticated configuration on their side (and of course, without telling them my WEP password).

    My home network is connected via Linux firewall, so I can cut the access or install traffic shaping when the problem occurs.
    • and of course, without telling them my WEP password

      I thought you just said you don't have WEP on.

    • I tried to get WEP going with Linux and flat out failed. My network at work and at home neither use WEP. I use my DSL Modem(s) to provide a somewhat firewall. Basically they block all incoming ports, forward a few etc... Just like you I use ssh/https for sensitive stuff. What I have done to create some sembelance of security is to turn on MAC address filtering at the wireless router. Both my LinkSYS and the Netgear at work support this. In this way only computers that I specifically allow on the network can
    • <aol>me too</aol>

      WEP is so broken that I don't see the need for it. If you happen to be within 30 feet of my house, which is on the end of a cul-de-sac filled with retired people who call me whenever a "strange" car is parked in front (just in case I'm being robbed), and manage to get a link, then you can:

      1. Connect to my password-protected Squid server
      2. SSH via RSA authentication to another machine on my LAN
      3. Make NTP requests
      4. Send an email to someone at one of my domains

      My WAP plug

  • Legit question. (Score:2, Interesting)

    by MrRuslan ( 767128 )
    Is it legal to connect to open wireless acess points ?
  • by Total_Wimp ( 564548 ) on Tuesday June 01, 2004 @10:34AM (#9303027)
    It used to take a lot of tech knowledge to even operate a personal computer so the people that used them were, by definition, tech savy.

    But in order to sell more computers the hardware and software manufactureres have perpetuated the myth that "computers are easy." The truth: operating computers is very easy, but maintaining them is still very difficult. Now the average user is not tech savy, but they have a machine that only tech savy people can maintain.

    TW
  • Did they also notice the sky is blue?
  • average users (Score:2, Insightful)

    by Anubis350 ( 772791 )
    Meanwhile, average users are no longer tech savvy

    perhaps the article means the average users of wifi are no longer tech savy, i.e. it has become mainstream. not that average users of technology are no longer tech savy....

    just my 2c
  • I just bought a wireless NAT router by linksys to replace my non-wireless NAT router made by Netgear.

    What a step down in usability!!!!

    Both products have a web site that you can go to to make changes. Neither has the address printed prominently on the outside of the unit along with the default user and pass, the first step in making it easy.

    I always found the netgear configuration easy, intuitive, and with tons of help. On the other hand the linksys configuration is horrible.

    • Security: The linksys r
  • once upon a time (Score:4, Interesting)

    by man_ls ( 248470 ) on Tuesday June 01, 2004 @10:36AM (#9303044)
    Once upon a time, the average user *was* tech-savvy.

    Back before computers put a pretty appearance on everything with Windows XP wizards, or even 98, you had to know DOS to get anything done on a computer system, you had to know keyboard commands, and a basic idea of what the ports on your PC did.

    The "average user" was more tech-savvy because there were fewer uses back then, since the learning curve was higher.

    Now, with everything plug-and-play, it's much easier to not understand what's really going on inside the magical blue-and-black or grey box with a pair of antenna sticking up from the sides of it.

    On my system, I use a Belkin 54G access point. SSID belkin54g. No crypto, no authentication, no MAC filtering. But, you're not going to get anywhere off the wireless segment if you connect to it. The firewall behind the WAP is configured to drop all traffic except the encrypted PPTP tunnels which the wireless clients actually use to connect to the wired infrastructure and the external router. Thus, anyone is welcome to try and get onto my network, but without having a valid account on the 2K3 Enterprise Server box playing router/connection master, and knowing the encryption keys, they're going to get precicely nowhere.
    • Once upon a time someone who wanted to drive really had to know everything about how their car functioned before ever setting foot in it. Now you can just hop in your car and go without giving a second thought to any of it.

      Now you can try to spin this such that people back then were safer because they were more "savy" with their cars but I call BS. Cars now are far safer than they were back then. Its all due to the engineering placed in the car. Not only are they more complex placing them out of the co
  • I have WEP turned on for my wi-fi network and turning it on is painless, effective and having no prior knowledge of wi-fi was easier than any other task that I accomplished.

    Worst part was finding all these insecure networks popping up all across my apartment community with names such as "default", "linksys", "Diablo", "Sourabh and Sonali", "choke-the-chicken", "mamasboy", "ilovematures". If these idiots can be half as creative in setting up encryption, it would be worth it. But then again, I dont want them
  • Liability Issues (Score:4, Insightful)

    by newdamage ( 753043 ) on Tuesday June 01, 2004 @10:37AM (#9303063) Homepage Journal
    I agree with some of the other posts on the main thread, I don't so much care about people trying to see what I'm doing, I have SSH, VPNs, PGP, and other mechanisms that can do that for me when I really need to send passwords and other sensitive information over the internet. My main insentive for securing my wireless AP is so that people can't use my connection for illegal purposes.

    It's a liability issues, and it doesn't seem like a big deal until one day you have to find a way to prove to the Feds and your ISP that it wasn't you sending kiddie porn to some offshore server in Eastern Europe. If your name is on the bill for that connection, I'm sure you signed a contract somewhere that states you are responsible for not allowing illegal activity on your connection.
  • Growing Pains (Score:2, Interesting)

    I think what we are witnessing is a rapid explosion in use of new technology, with the secure use of such technology slowly catching up.

    I'm guilty of it myself. I set up a wireless access point for my mom a couple years ago. Changed the SSID name, changed the default pw on the router and let her have at it. No problem.

    Of course, as the next year rolled on, more and more wi-fi users were born. Wireless starts becoming standard with new laptops. Almost once a week someone calls in on TechTV and asks about

  • by JessLeah ( 625838 ) on Tuesday June 01, 2004 @10:38AM (#9303075)
    CNN is an American TV network. The average American thinks that Bill Gates invented the personal computer (and that he is a national hero and a role model to be looked up to), that Excel is a general-purpose database program, that SQL is a Microsoft product ("SQL Server"), and that there is some inherent difference between Dell and Compaq. They randomly attribute any type of computer flakiness to "viruses" or "hackers", since those are the only causes for bork-ups that they understand. And just now their mass-market news network is discovering that WiFi is insecure. Is this any surprise? I'm just hoping that some day CNN will "discover" that Microsoft didn't invent the GUI, and that AOL isn't the Internet...
  • Of course. (Score:3, Interesting)

    by LincolnQ ( 648660 ) on Tuesday June 01, 2004 @10:38AM (#9303076)
    Wi-Fi out of the box is of course insecure. It can be made secure with a number of different methods (WEP not being one of them, heh, but there is WPA and other things). I believe one of the best features of Wi-Fi is its ease of setup and use -- if you have an open AP, anyone who comes over to your house can just use it with no or almost no configuration. It's incredibly easy and convenient.

    What's the drawback? Anyone in your neighborhood has access to your local network. But it's unlikely that someone who wanted to h4x0r you would drive up your street and sit in front of your house. It is of course possible, and depends on your neighborhood. If you're the type who locks the house even when you're at home, then definitely get a security protocol. If, like me, you leave the garage door open and doors unlocked, then securing your Wi-Fi isn't something I would worry about.

    So this is no surprise, but neither (in my opinion) is it a big deal.
  • by the_rajah ( 749499 ) on Tuesday June 01, 2004 @10:39AM (#9303083) Homepage
    I just love how I can take my laptop almost anywhere and get Internet connectivity. Last week I was at my mom's house doing some work on geneaology with my laptop and when I booted up, lo and behold - a wireless connection that was wide open!! It was nice to be able to check my e-mail and look at research sites online right then and there rather than either having to dial in or wait until I got home.

    I've seen the same thing lots of other places including a friend's apartment in Minneapolis where I found 3 wireless access points, only one of which was encrypted and at my own single family house, I get two open wireless connections besides my own encrypted one.

    I have to agree that setting up the secured connection are not obvious, especially when you have one manufacturer's access point and another manufacturer's wireless product in your laptop. It took me a little head scratching and trial and error before I got mine working.

    "Do the Right Thing. It will gratify some people and astound the rest." - Mark Twain
  • by Genoxide ( 633645 ) on Tuesday June 01, 2004 @10:39AM (#9303085)
    The problem is not the product, but the consumers. Now, I might be wrong about this, but I am willing to bet that all access points, WNIC's and other accessories come with something called a "manual"! If you were to actually *read* one of those, by accident or intent, you might discover how to acutally use your newly accuired product! Only thing is that people don't bother anymore... They expect everything to be so userfriendly that it will install itself and automatically know how you want the settings to be!! Maybe they could put little warnings on the packs like with ciggaretts.. "warning, the DOJ says that not properly securing your accesspoint can be hazardous to your privacy bank account, and or bandwith".. Heh
    • by Feanturi ( 99866 ) on Tuesday June 01, 2004 @11:09AM (#9303453)
      Now, I might be wrong about this, but I am willing to bet that all access points, WNIC's and other accessories come with something called a "manual"! If you were to actually *read* one of those, by accident or intent, you might discover how to acutally use your newly accuired product!

      That is so very true. The average person (not just computer user, I'm talking average PERSON) is horrified at the thought of having to read a manual in order to understand how to use a gadget. When I'm working in someone's house, I am often asked silly questions like how to hook up a stereo or how to set the time on a desk clock, or how to get picture-in-picture on their snazzy new HDTV. I like to suggest that they check the manual that came with their device, because it will certainly be in there, and then watch the look of horror on their face as they realize they have to learn something now. It's really quite amusing.

      And if they're a computer user, they're no different. They can have a nice big fold-out diagram of their new HP PC with color-coded connectors and nice pretty pictures and they still don't want to read that, they want a person who already knows how, to set it up for them. The average person wants to do the least amount of work to be able to use their tools, that's the bottom line.
  • by N8F8 ( 4562 )
    I gave up trying to work authenticated wireless. I doubt the signal even makes it out of my concrete and cinderblock house. The real pisser is the lack of drivers under Linux. Leave it up to me to buy a card that won't work under Linux.
  • I recently helped a friend setup her new SBC DSL which came with a 2Wire WAP.

    It was encrypted out of the box with a default password which was linked to the serial number on the unit!

    She did not like the long string of numbers though and we tried to change the WEP to something else, but were told it could only be a set of 10 numbers. (well, maybe it can be changed, but I didn't spend much time mucking with it...)

    So, on one hand- hurrah that it was encrypted out of the box!

    on the other hand, she had

  • by Helmholtz Coil ( 581131 ) on Tuesday June 01, 2004 @10:45AM (#9303133) Journal
    ...not really a security measure, but if it makes a potential crook look for an easier target it has done its job.

    I live in an apartment complex, and I was stunned to see not only how many people had wireless, but how many ran w/o WEP and w/o changing defaults-last count in my largish apartment complex, better than 20 visible from street level (i.e. not right under their bedroom windows) and a good 40-50% of those completely unprotected. I use WEP and I changed the defaults but I'm under no illusions that this makes me safe. What I think helps, though, is that in my case there are at least 4 other WiFi users in my apartment building alone that are wide open. So as long as there are easier targets, I think WEP's done its job as well.

  • by jalefkowit ( 101585 ) <jason@jaso3.14nlefkowitz.com minus pi> on Tuesday June 01, 2004 @10:47AM (#9303146) Homepage

    If cheap-o consumer routers getting 0wned thanks to pathetic Wi-Fi security seems bad, consider this: at least one vendor of e-voting systems depends on WEP as the only security measure [jasonlefkowitz.net] between their voting machines and the ballot-counting system.

    Yes, that's right -- ballots are passed wirelessly, and only protected via standard 802.11 WEP. How long until someone tries to 0wn a polling place? Or, worse, just sniffs the ballots out of the air and dumps them to a log file (so much for the secret ballot), say?

    I wrote the article linked to above when the systems were being evaluated in Fairfax County, Virginia -- a wealthy and populous suburb of Washington, DC -- but they've since been approved by the county board of elections and used in two elections to date. Who knows how many other local governments have bought into similar systems?

    • by odano ( 735445 ) *
      Well this should be interesting. I am a resident of fairfax county, and on election day I will keep my laptop in the front seat and packet sniff for the time I am inside voting.

      Then we can see how secure this voting stuff really is.
  • by thedillybar ( 677116 ) on Tuesday June 01, 2004 @10:50AM (#9303174)
    Why does wireless encryption matter anymore? You should be using end-to-end encryption for everything sensitive, whether it's wireless or over-the-wire. Whether it's TLS/SSL, VPN, or something else.

    If you trust every router between you and your destination with a plaintext password, you are crazy. The IETF is moving towards encryption for everything, and people are following. Most universities now don't allow passwords to ever be sent plaintext over the wire.

    Quit blaming wireless, the same security issues exist with wired connections.

  • by dioscaido ( 541037 ) on Tuesday June 01, 2004 @10:51AM (#9303189)
    My upstairs neighbor (apt. building) has an unencrypted Wireless Linksys router hooked up to his Broadband connection. If I wasn't hosting my domain's e-mail from one of my home machines, I would have cancelled my broadband a long time ago.
  • You're joking. C'mon, I mean... like, no way. It all makes sense now... if CNN is this far behind on technology, which moves pretty fast, then they are probably a good 25-30 years behind on their political reporting and viewpoints.

    Damn hippies.

  • by stecker ( 263711 ) on Tuesday June 01, 2004 @10:52AM (#9303195) Homepage
    I have two WiFi APs at home. One of these has a WEP key, and is the one all of my devices use. It bridges directly to my "real" network. The other one I leave open just out of the goodness of my heart. I have a dedicated NAT router behind it, and connections coming in on the open access point are the only things that use that router.

    So far, no problems, and people have thanked me heartily for giving them internet access in a pinch.

    Given this setup, what risks do I run? The only one I can think of is that someone has a bunch of kiddie porn torrents just waiting to start up in a server in a van somewhere. Does that really happen? If Osama Bin Laden walks down my street (he'd probably strut, actually), and uses my "free" WiFi to send threatening emails to major governments, do I go to Guantanamo Bay?

    How is this different from NYC offering free WiFi access in Bryant Park?
  • Clueless (Score:3, Funny)

    by Anonymous Coward on Tuesday June 01, 2004 @10:52AM (#9303198)
    My brother got a call a few months ago. They were having trouble with their Internet connection dropping all the time. He went to the site and found a brand new Dell with a wireless card. When he asked where the access point was, they looked at him like he was from Mars.

    They had ordered their machine with a wireless card and thought that was all they needed. They were obviously piggy-backing onto a neighbor's wireless LAN but when my brother tried to explain that to them, they accused him of lying to them.
  • by fleener ( 140714 ) on Tuesday June 01, 2004 @10:54AM (#9303227)
    > average users are no longer tech savvy.'
    > Which is to say that they at one point were?

    I knew DOS, Windows 3.1 and Windows 95 inside and out. As the OS interface and glitches have lessened (yeah yeah, no really, there simply are fewer conflicts in recent versions of Windows), my need to understand how the OS functions has diminished. I'm just another dumb Windows user now. When I need to futz with my wireless router, I grab the manual to remember how the damn thing works.

    In the end, I prefer it this way. Life is easier when technology just works and I don't need to understand why. Geeks aside, that's how most people want to live their lives.

  • by MythoBeast ( 54294 ) on Tuesday June 01, 2004 @10:57AM (#9303261) Homepage Journal
    I have to agree with this. A few years ago, nobody would even think of setting up a network in their house unless they already worked as a system administrator, or other heavy-duty IT professional. Nowadays everyone who owns more than one computer wants to hook them together.

    It's not that the overall level of savy has decreased, it's that the definition of "average user" has spread to the technopeasant masses.
  • So open or not? (Score:3, Insightful)

    by Ambush_Bug ( 106102 ) on Tuesday June 01, 2004 @11:09AM (#9303447)
    Obviously you should change your password on the router itself so that random drivebys don't screw with your settings.... but if you're running ssh, ssl, etc. how dangerous is it to leave your access point open? There seems to be a group of people in the thread that are like "geeze idiots, my AP is like fort knox". The other crowd says "I leave mine open INTENTIONALLY".

    I'm sort of one of these people that dreams of the day when we have a huge community mesh and people can tell their cell phone carriers to piss off.... but I don't want to leave my access point open if some bonehead is going to hack my box.

    Anyway, I've never seen anybody tell me the difference between 1) plugging your machine into your cable modem directly and walling up your machine by shutting ports down, etc. and 2) having a wireless access point. Is having a machine on an insecure access point any more dangerous than having a machine hooked up to the open internet on a cable modem or some such?

    I mean, the wired internet really is one big network after all, and there are risks associated with being on it. If you're not behind a firewall, wired or wireless, what's the difference?
  • by Dun Malg ( 230075 ) on Tuesday June 01, 2004 @11:22AM (#9303628) Homepage
    '...Meanwhile, average users are no longer tech savvy.'

    Which is to say that they at one point were?

    The average computer user in 1970 could probably figure out how to turn on WEP, were he/she transported to the present day. This is the same thing that happened with automobiles. In the early days, automobile owners had to be adept at mechanical repairs. If you read "The Grapes of Wrath" , at one point one of the characters is honing the valve seats on his truck in a campground. That was the 30's. By 1960 you'd be hard pressed to find a car owner that could do a valve job on his car. Computers have become a commodity item, just as cars did.

  • by xutopia ( 469129 ) on Tuesday June 01, 2004 @11:24AM (#9303652) Homepage
    Say I have my WIFI router opened up to the world and that I give free access to the person next door. So long as my personal computer is firewalled why should I care if he piggy backs my WIFI? I've got more than enough bandwith and really couldn't care less.
  • by jdreed1024 ( 443938 ) on Tuesday June 01, 2004 @11:50AM (#9303989)
    as many as 80% of home APs have encryption disabled.

    So? I don't have WEP enabled. WEP is not the be-all and end-all. WEP is crap, and introduces horrible cross-platform issues. Not to mention that vendors can't agree on how to specify it - 40 bit vs 56-bit vs 64-bit vs 128-bit - (hint: some of those refer to the same thing).

    I have MAC address restriction enabled on my AP. And it works pretty well. Additionally, unknown clients to my DHCP server do not get an address from it. And there's only a /28 routed on the interface my AP is on.

    So yes, it's unsafe in that someone can park outside my house, wait until I log on, sniff my MAC address, set his MAC address to that, and get bandwidth. Except that one of my devices will notice, since duplicate MAC addresses on the same segment can cause problems. Not to mention the reception outside my house is crap, so he'd have to park directly in front of my house, and if I notice the traffic indicators on my switch start going nuts, and look outside and see some nerd with a Pringles can, I can go kick his ass.

    And the article is short on details. "40% had the defaults configured". What defaults? Passwords? If so, boo CNN for connecting to other people's APs without permission ("The door was unlocked" is not a valid reason for being in someone's house, no matter how stupid you think the homeowner is). If it's SSIDs, that's totally useless. My network name is "default", because I was feeling uninspired when I got my AP. Doesn't mean it's not secure. A friend of mine still has "linksys" for the same reason, yet he has WEP enabled.

  • by mrm677 ( 456727 ) on Tuesday June 01, 2004 @11:51AM (#9304006)
    I just asked my brother-in-law, who is computer savvy, why he doesn't have encryption enabled on his home access point.

    His answer: "unless some guy decides to enter my property and sit on my front porch with his laptop, my weak signal is all the security I need". He claims he's tested it with several laptops and the signal is too weak to be used beyond 10 feet away from his house.

  • by JRHelgeson ( 576325 ) on Tuesday June 01, 2004 @11:51AM (#9304010) Homepage Journal
    Technology used to be the domain of technologists.. then it became popular and that's when "Joe Sixpack" got online.

    Nothing wrong with Joe Sixpack, per se, he's a good guy but he doesn't know the first thing about his car, except where to put the gas, and he doesn't know the first thing about his computer, except how to surf the net. And the scary part is that he doesn't *want* to know anything more.

    When things go wrong, he hasn't the first clue of what to do, with the car or the comptuer. All he knows is that he wanted to surf the net at high speed from his Lay-Z-Boy. Ever since he and his cronies got on board, the technological per capita IQ on the internet plummeted.

    There has been a long standing computer security axiom that states: "There is no such thing as absolute anonymity, in real life, or on the web."

    Well, now there's a caveat to that axiom that I have coined, that states: "Unless you use someone else's unsecured wireless network."

    Joe Sixpack is not only providing the foothold that spammers need to purvey their ilk, but also the perfect foundation from which criminals can perpetrate fraud and theft.
  • Is this a bad thing (Score:5, Interesting)

    by magicsloth ( 73914 ) on Tuesday June 01, 2004 @11:55AM (#9304054)
    I run an open access point and my neighbor does as well. Anything (and I mean anything) more than computer games and unimportant chat sessions I tunnel through ssh/ssl or something similar.

    Why do I leave my access point open then? Because on average I only use maybe 3% of my bandwidth and I don't see any reason that one of my neighbors shouldn't be allowed to use some of it when I don't need it. When I first moved in and didn't have my own broadband yet I was very happy one of my neighbors left his router unsecured.

    I'm actually quite suprised that more people on /. aren't in favor of open access points. They seem to fit very well into the whole 'information should be free' value system that many geeks have.
  • Clarify (Score:3, Informative)

    by eatenn ( 572604 ) <enntee&localgod,net> on Tuesday June 01, 2004 @12:11PM (#9304265) Homepage
    'Meanwhile, average users are no longer tech savvy.' Which is to say that they at one point were?

    I think what they're saying is that popularity has grown to the point that the average users of 802.11 are no longer geeks, as Mom and Pop are using it now as well.

    It was just badly worded.

  • by mabu ( 178417 ) on Tuesday June 01, 2004 @12:48PM (#9304676)
    The other day I got a call from my broker/investment banker. This is unfortunately not a joke. He tells me he got a strange call from some kid at the coffee shop around the corner telling him his wireless network was wide open as well as the hard drive on his machine. Apparently this guy's office is around the corner from a coffee shop and he just plugged in a wireless router and didn't do any configuration to it and everyone at the coffee house has been slurping down their drinks while slurping down his hard drive at the same time.

    What pisses me off is that I'm not so stupid as to use wireless, but the integrity of my own personal information is often compromised because of stupid people who may have access to my information and aren't responsible with technology.

Those who can, do; those who can't, write. Those who can't write work for the Bell Labs Record.

Working...