80% of WiFi Networks are still Insecure, Kismet Author Says 430
acz writes "The brain and guts driving the development of Kismet is Mike Kershaw alias Dragorn, who works during the day on IBM mainframes and hacks code at night. Kismet is simply the best war driving tool out there plus it's free as in GPL and can even run on your linux PDA. In a recent interview posted on HERT today, he says: 'I've become entirely jaded towards security as a whole (or rather, people's complete lack of it) and not much surprises me when it comes to open wireless networks. ... the overall percentage of unencrypted networks is still at about 80%.'"
Some on purpose to promote free WiFi. (Score:4, Informative)
Re:Some on purpose to promote free WiFi. (Score:4, Funny)
why? because I was taught to share growing up...
Re:Some on purpose to promote free WiFi. (Score:4, Insightful)
Do you share your wife, your home, your momey, your car, your cloths? Do you think nothing of getting up in the morning to find strange people sleeping in your living room? My network is my personal space, no uninvited guests allowed.
Re:Some on purpose to promote free WiFi. (Score:5, Insightful)
Re:Some on purpose to promote free WiFi. (Score:2, Funny)
yes, he does...but shhhhhh...don't tell him...
Re:Some on purpose to promote free WiFi. (Score:5, Insightful)
Do you speak in whispers and wear a mask at all times so no one hears your precious sounds or gets the pleasure out of seeing you smile?
If you have a full shopping cart, do you make sure the guy with a single item behind you stays stuck behind you?
Do you stand right in the middle of a busy crosswalk making everyone walk around you, just because you can?
Do you avoid donating to charities?
People like you are the problem with the world today. Only be nice when it's legislated. You suck.
Re:Some on purpose to promote free WiFi. (Score:5, Interesting)
Re:Some on purpose to promote free WiFi. (Score:5, Interesting)
you dont lose anything tangible if you share an internet connection properly.
its simple: IPSEC (or VPN) your own connection while letting others through unencrypted. if you use WEP, you're screwed from the start if you want privacy, so why pretend.
I plan on implementing a setup verymuch like this in the near future. the only deviance to this will be bandwith throtteling for the unencrypted packets. *GRIN* just incase i get a greedy neighbor.
Re:Some on purpose to promote free WiFi. (Score:4, Funny)
Ditto for sharing your wife properly. Who knows, she may even learn a few things.
Re: All fine and dandy until... (Score:3, Insightful)
Re:Some on purpose to promote free WiFi. (Score:3, Insightful)
I think the more appropriate approach is to ask if they were also raised to willingly and knowingly violate business agreements.
I like to promote sharing but not if the result may hinder my ability to share.
Sorry, but no. (Score:5, Insightful)
Re:Sorry, but no. (Score:3, Interesting)
Wireless is still mostly in the hands of early-adopters; many of who know what they're doing.
My wireless covers one coffee shop near my apartment complex.... someone else is covering the other one. Out of the 8 or so wireless access points I can see from right here, 5 have WEP, 2 I know are open intentionally (the two I mented), and the other one is T-Mobile (damn expensive).
Re:Sorry, but no. (Score:3, Interesting)
I disagree. The fact that you see wireless routers for sale at BestBuy seems to confirm.
Case in point: My neighbor recently bought a wireless router and did the default setup (ie: wide open). I discovered it while rebuilding a machine at home. Living in the Bay area houses are fairly close together, so I initially associated to his AP. No WEP. Broadcast. No MAC filtering.
I went over and asked him if
Re:Some on purpose to promote free WiFi. (Score:2, Insightful)
I make all my clients close their networks, scaring them with made-up horror stories of cops showing up at people's doors, yada yada. But it's for their own protection.
Re:Some on purpose to promote free WiFi. (Score:3, Interesting)
Re:Some on purpose to promote free WiFi. (Score:3, Interesting)
For free/open access points, this would be handy for two things:
1. Saying who you were and letting people know that, yes, you do know your access point is open and
Re:Some on purpose to promote free WiFi. (Score:5, Insightful)
Re:Some on purpose to promote free WiFi. (Score:5, Informative)
There was a case here in Canada last year, namely in Toronto, where the cop stopped some youth in a car going the wrong way in one-way street.
To the cop's surprise, this guy had his pants down (i.e. naked from the waist down) in the car, and a laptop with WiFi in it. He was war driving that neighborhood.
Had he not gone against the traffic, he would not have been caught at all ...
So, the threat is real. If someone choses to open their wireless LAN to outsiders, then he should know the risks.
Same thing applies if you run a message board or web site then it becomes a mouth piece for hate speech or terrorism or whatever. If you know the risks and chose to do this regardless, then be prepared for the consequences.
how many unsecure wired boxes are there? (Score:5, Interesting)
Re:Some on purpose to promote free WiFi. (Score:5, Insightful)
Re:Some on purpose to promote free WiFi. (Score:5, Insightful)
Of course thats not true. Sure, you might be investigated... but in both cases probably cleared. The wireless case is even more clear-cut because it's easy to see that it was left open. The phone lines would be much harder to explain why you let someone on your property to tap in like that, and didn't shoot them while they were connecting alligator clips to your wires.
Re:Some on purpose to promote free WiFi. (Score:4, Insightful)
This used to be my arguement but it has one fatal flaw. The investigation itself. Sure I could weasle out whatever horrible violation that brought the feds to my door (even if I did it) by pointing out my unsecured wifi connection. But they would still seize my comp gear in the investigation. If it turns out that not all my software is licensed correctly or some of my media may not have easily accessible originals I am still fucked.
Re:Some on purpose to promote free WiFi. (Score:4, Informative)
It's the same as the random searches on the T. if they find a bomb in your backpack, you're fucked. If they find pot, they won't arrest you. They legally can't (since they couldn't legally search you).
Re:Some on purpose to promote free WiFi. (Score:3, Interesting)
Unfortunately computers and WiFi tend to fall under slightly different terms than phone lines in my opinion.
For starters, phone lines are not your responsibility, they are the responsibility of the phone company, including all security and problems arising from tapping a phone line.
Along that same line, computers and a WiFi router, are the responsibility of whoever sets them up. If you setup a WiFi router, and *willingly* leave it open to promote free WiFi net access, any infraction noted by your servi
Re:Some on purpose to promote free WiFi. (Score:3, Funny)
Re:Some on purpose to promote free WiFi. (Score:4, Insightful)
I hope you at least block outbound port 25 (SMTP). Because this will be abused by spammers otherwise.
Legitimate people can still send mail through the submission port (see RFC 2476 [faqs.org]). This is a separate port that exists for MUAs to submit new mail; typically it requires SASL authentication. So they can connect to their own ISP's server and submit mail, but not send directly to the recipient's server, as a spammer would.
Re:Some on purpose to promote free WiFi. (Score:4, Insightful)
Re:Some on purpose to promote free WiFi. (Score:3, Interesting)
I was thinking of getting someone to make me a "warchalk" sign to hang on my house, so people could see there was internet access here. Then it occurred to me that the idea might be sellable to enough people to turn a buck or two. Anyone feel like a little entrepenurship?
Re:Some on purpose to promote free WiFi. (Score:3, Insightful)
Just because someone's nice doesn't mean they want to be abused.
Re:Some on purpose to promote free WiFi. (Score:3, Insightful)
Re:Some on purpose to promote free WiFi. (Score:3, Informative)
Open wi-fi just means that the person could be across the street instead of huddled in a corner behind your house. Frankly, given a choice, I'd rather that people like this be across the street, -away- fr
Re:Some on purpose to promote free WiFi. (Score:3, Informative)
Granted, this is 30-year-old wiring, but it exists.
Unsecure? (Score:5, Funny)
Re:Unsecure? (Score:2)
Unpossible (Score:3, Funny)
Completely imbelievable.
How is that surprising? (Score:5, Interesting)
Re:How is that surprising? (Score:2, Interesting)
Regards,
Steve
Anyone know of a tool similar to AirPwn that doesn't
Re:How is that surprising? (Score:2, Interesting)
Ettercap should do the trick.
It all depends on where you are (Score:3, Interesting)
PRoblem is I only have wep (Score:5, Interesting)
IPSEC is the way to go but my router and older system do not support it.
Linksys supports IPSEC but guess what?
There is a default admin password that anyone can use to log in. SO whats the point?
Re:PRoblem is I only have wep (Score:2)
Re:PRoblem is I only have wep (Score:2, Informative)
Re:PRoblem is I only have wep (Score:2, Insightful)
Re:PRoblem is I only have wep (Score:5, Insightful)
Even if it could be cracked in an hour (I doubt that figure - the number of packets needed for an analysis is huge, and unless your network is very busy it will take much longer than that) - most would-be attackers (a) don't know how and (b) can't be bothered. Think about it, 99% of people looking at your AP just want free net access. Chances are there are multiple available APs (in my apartment I can pick up at least 5). If one's closed, they'll just move on to the next. It's the "don't outrun the bear, just outrun the other guy" situation.
Sure, if some ubergeek happens to live within range of you, and really wants in to your network (for some unspecified reason - to steal your pr0n?) then they could get it. What are the chances of that happening? Well it depends how think the tinfoil in your hat is. But it doesn't keep me awake at night.
Wardriving just proves it (Score:4, Insightful)
Re:Wardriving just proves it (Score:5, Insightful)
Isn't that the way it should be though?
Last time I bought a new TV, I switched it on, pressed a few buttons as indicated by the quick-start guide and it auto-tuned all the channels - same with my VCR. If I want to do something advanced such as mess about changing picture settings etc then I'll read the relevant section of the manual.
If I buy a hifi system and plug in the revelant speaker cables, popping a CD into the drive and pressing play generally results in music. Similarly, should I want to (for example) record every 2nd track on a CD to casette then I'll read the relevant section of the manual.
That's how computer technology should be - I don't need to read a manual to work my other home entertainment devices and I don't see why computer technology should be any different.
Re:Wardriving just proves it (Score:3, Insightful)
Um, no. Computers and networking gear are complex electronic systems. People WANT to treat them like a toaster, but then they complain when somthing goes wrong.
Re:Wardriving just proves it (Score:3, Insightful)
Manufacturers decided it was better for business to have it work easier out of the box than to add in a couple of steps of configuring encryption during setup.
Personally, I think they should have had a 10 step or 15 step or whatever process such that the wir
Re:Wardriving just proves it (Score:5, Insightful)
I can think of a few counter-arguments to this:
1. When was the last time someone 0wn3d your TV or VCR? Okay, I know, that's a joke, but there is a point there -- very little harm can come to you or others from a poorly set-up TV or VCR. A poorly set-up wireless router can be used to anonymously (for the crook, not for you!) break into banking computers and the like. A computer can be taken over and used to distribute pr0n, DoS some other computer, store warez, etc. That's why you need to read more instructions -- because of the amount of harm which could be caused if you don't.
I for one wouldn't want to get anywhere near a car which claimed that anyone could "just use it without reading any instructions". The potential for harm if something goes wrong is too high, even if it's unlikely to happen. The same with computer technologies.
2. More complex systems require more complex instructions. Your computer is not just a "home entertainment device", plain and simple. If there were a different button on your computer (a la "Play") for everything you could do with it, every option in every program, then the keyboard would be bigger than your living room. A computer can do much more than just play a few movies, songs or video games, and that's why more instructions are needed to use it. If you want a simple "home entertainment device" to play games, movies, music or surf the web (video consoles, DVDs/VCRs, stereos, and web terminals a la WebTV, respectively), then go get one.
3. Adding a wifi router to an existing computer setup is more akin to adding a VCR to an existing TV setup. Ever noticed how some people can never get the TV-VCR wiring right (my Mom, for one)? It's the same when you add on to your existing computer setup. Even if individual technologies are simple, using them together isn't always so simple. Computers are almost always used with additional peripherals (printers, network devices, and so on). Thus the need for more detailed instructions.
Get off the high horse (Score:3, Insightful)
Actually, I hope you do realize you've just proven the other guy's point. That computers are such a fragile tool, and for a lot of people they can cause more grief than good, is precisely the _problem_.
What Joe Average wants -- or for that matter what _I_ want -- is something that just does a certain job, with a minimum of fuss. Yes, like a TV or a VCR. If I want to read my email or play a game or whatever, I should just get straight to doing that,
Varies with Geographic Location (Score:5, Funny)
Ahh... digital extortion. "I secures dis here network, see, or Clamps here breaks into yous guyses computer and steals yur credit card numbers. Capice?"
Re:Varies with Geographic Location (Score:3, Interesting)
"We were going to war-drive around Cincinnati and find unencrypted wireless access points," Corrado said. "We knocked on people's doors and asked if (they) wanted us to encrypt them, and they just got all freaked out. So we were searching for other things to do with the equipment we had just purchased."
From this story at Wired News [wired.com]...
I'm Confused Now (Score:5, Insightful)
(Yes, yes, I know, the right security for the right place)
Stuart
Re:I'm Confused Now (Score:2, Insightful)
But alas the world is full of people with less then honest intentions.
Treat WiFi access points as you would a machine connected to the net, unless you want to let every script kiddie in your neighbourhood abuse it, secure it up.
Re:I'm Confused Now (Score:5, Insightful)
seems to me that if you secure your data at the earliest possible point, it doesn't matter what sort of insecure territory (and there will likely always be insecure territory SOMEWHERE) it passes through to get to its destination.
Re:I'm Confused Now (Score:3, Insightful)
there is an added bonus to having open networks be the norm- privacy and untraceabilty. while this allows the potential for abuse, if openness is the norm it could be a viable defense in court, and i see the abuses (e.g. spam) are more of a problem with other things (open mail servers).
anonymity on the web is as vital for freedom as anonymity in r
No thanks I will stay with a wired network. (Score:2, Insightful)
'KERSH! (Score:4, Funny)
Now he's the guy behind kismet, which I use to monitor WiFi at work.
Thanks 'Kersh! I wish you much success with career and hobby, and hope you find a real-life anime chick to settle down with. Send me some tentacle-shots when you do.
Just like Windows vs. Linux (Score:5, Funny)
To assuage conspiracy theorists out there (Score:4, Interesting)
* Why aren't WAPs shipped with encryption turned on by default?
* With many well-known strong encryption schemes, why was the weak WEP made standard?
LS
Re:To assuage conspiracy theorists out there (Score:5, Insightful)
>> Why aren't WAPs shipped with encryption
>> turned on by default?
Because the power of WiFi is that it is easy to use. My neighbour could not possibly use it if it wasn't.
WEP is complicated. You need to be able to shell in (sometimes even to a port other than 80) from within the LAN. Then you need to know an admin ID/password. Then you need to know what on earth hex/ascii/etc mean, and 56/128/etc bits (and how the security ranslates to a number of characters). Then you need to set it all up using complex menus, and then you need to figure out how to set up all PC's (which call it something else).
By this time we would have lost the typical buyer, oh, 5 times over. That is why it is shipped open by default - the support would cost a fortune, otherwise. WEP is way too complex in its consumer implementation.
Michael
Re:To assuage conspiracy theorists out there (Score:5, Interesting)
By this time we would have lost the typical buyer, oh, 5 times over. That is why it is shipped open by default - the support would cost a fortune, otherwise. WEP is way too complex in its consumer implementation.
Very true.
I wonder if it would be possible to create a feature that allows you to "auto sync" a WAP and a device over a wired network. This would allow you to connect your (say) laptop to the WAP over a local wired connection and the software would automatically configure encryption to allow the laptop to access the WAP wirelessly. It could auto-generate a random key each time the sync was performed.
Basically anyone with physical access to the WAP could be authorized to use it, everyone else is locked out. Most consumers understand the concept of physically securing a box better than the intricacies of WEP.
I don't know enough about the TCP/IP stack to know if software can guarantee that two devices are directly physically connected. If you can, this might be a good approach.
Not secure enough for every situation, but it might overcome the current difficulty of using WEP or other encryption/security?
Re:To assuage conspiracy theorists out there (Score:3, Insightful)
Re:To assuage conspiracy theorists out there (Score:2)
* Why aren't WAPs shipped with encryption turned on by default?
Please, tell us what the default password should be...
Re:To assuage conspiracy theorists out there (Score:3, Interesting)
Becuase it would cost the manufacturer money to have to talk people through how to get their notebook to connect to the access point with WEP enabled. However it costs them nothing to leave the security turned off be default.
"With many well-known strong encryption schemes, why was the weak WEP made standard?"
At the time the cost of dedicated ASIC systems to handel encryption where too high. An encryption system with lower system requirements
Re:To assuage conspiracy theorists out there (Score:2)
So what well-known strong link-level encryption schemes would you suggest they should have used?
what does insecure mean? (Score:5, Interesting)
from the post:
from the article:
An insecure network and an unencrypted network are not the same thing. WEP is encrypted, yet insecure, while secure IMAP and SSH are secure by providing end to end encryption, instead of relying on the network to provide it.
-jim
Re:what does insecure mean? (Score:2)
Why not use both?
Most experts in physical building security will tell you that the front door of most buildings, when locked, is nothing more than a deterent - if someone really wants on the other side of that door, they'll get there somehow.
My point? WEP is pretty good at making sur
No WEP? So what! (Score:5, Insightful)
Of course, that gets you an IP that lets you ping the firewall. More specifically, you can ping the dedicated NIC on the paranoid OpenBSD server that lets through connections to my Squid server (which requires authentication), my mailserver (which requires authentication), my DNS server, and my NTP server.
If getting an IP on my WLAN counts as "insecure", then count my network as bad. However, that's a bit too broad a brush for my tastes. In my setup WEP offers no advantages whatsoever so I never bothered with it, but I guess that makes me just another dumb newbie in their survey.
Re:No WEP? So what! (Score:5, Funny)
More specifically, you can ping the dedicated NIC on the paranoid OpenBSD server that lets through connections to my Squid server (which requires authentication), my mailserver (which requires authentication), my DNS server, and my NTP server.
What????
You provide WIDE OPEN completely UNAUTHENTICATED access to NTP and DNS?!?!? Do you have any idea how much damage a serious cracker if enough people take this devil-may-care attitude about network security, and just hand out accurate time information to anyone who asks? Not to mention name service <shudder>.
You, sir, are exactly the sort that is making it possible for malicious script kiddies to ruin the Internet for everyone.
You should be ashamed.
Re:No WEP? So what! (Score:5, Interesting)
The real problem isn't that people aren't using WEP (since any blackhat with a web browser to download the tools can crack WEP in a few hours at most.)
The REAL problem is that ALL low-cost "wireless gateway" appliances treat wireless nodes as part of the LOCAL network, when, of course, the wireless segment should be treated as another WAN (Internet) link, where the bad guys live, and where you have to authenticate yourself before connecting to the LAN. As long as this remains true, wireless will continue to be a huge security hole in most networks.
Unfortunately, the "business" networking vendors are more than happy with this arrangement, since it keeps savvy business users from buying their network gear at CompUSA or Fry's. The sad fact is that security comes at a very serious cost premium today - it shouldn't, but the factis that companies that value security will pay *much* more for it, so the vendors simply "de-feature" the mass market products to help justify "enterprise" capabilities such as this common-sense approach to wireless networks.
This won't change until one of the SoHo/Home market vendors gets a clue and decides that their buyers might actually like a wireless router that can protect the rest of their network. Why that hasn't happened yet is a mystery.
BTW: If anyone knows of a low-cost wirless router device that *can* treat wireless as an "outside" network, post a reply and let us know...
Solution on the cheap (Score:5, Informative)
All local machines go behind the non-wireless router. That router's WAN port is connected to one of the LAN ports of the wireless router, and the wireless router's WAN port goes to the Internet. Now you have the public Internet (unsafe), a wireless purgatory (unsafe in a different way), and a secure LAN (as safe as the non-wireless router/firewall box allows it to be).
Alternately, the non-wireless router can be a wireless router with the wireless features turned off.
The whole Broadcom thing sucks. (Score:5, Interesting)
Unencrypted data-link does not mean insecure! (Score:5, Insightful)
As WEP isn't that robust there seems to be little point in deluding oneself - thus many networks will be unencrypted at that layer by design rather than by default.
Tell me how many wireless networks you can associate with and actually use.
Not surprised... (Score:4, Interesting)
Myth's about WEP (Score:5, Informative)
Re:Myth's about WEP (Score:5, Interesting)
The will to pay and be forced to (Score:5, Interesting)
The lack of security over WI-FI is a good thing. Ever thought about the democratization of communications, WI-FI can bring you that, unsecure WI-FI WILL bring you that. With file encrytion files are safe (mostly) anyways, that's what we need to promote. Leaving your network open will just make it accessible by other people which, if they get the hardware themselves will make this network availlable to more and more people and so on.
In a few years when you wanna call someone you basically open iChat, MSN messenger, whatever, turn on rendez-vous or equivalent find your contact name and double-click. Get it?
Security isn't always a good thing, making everything locked just make sthe world harder to travel, some doors need to be opened.
In the very unllikely event that I win a huge amount of cash, dream number one is to get several WI-FI routers and configure them to enable a neibourhood network, hoping to change it into a city network and so on. I dream of the day communication will be democratized, free, for everyone.
Instead, as of now, the technology exist, it's there for everyone to grab, but they all stare at it, telling themselves: "too complicated and the router is around 200$CAN, it's expensive, I'd rather pay 30$ a month plus long distance and service fees for the rest of my life"...
Re:The will to pay and be forced to (Score:3, Insightful)
Let's say everyone leaves their APs open. Now I don't need to pay for my cable bill, I can just leach off someone else's. Then they figure that out too, so we both have to leach from somewhere. Do you see where I'm going with this?
I think you spell it out very well yourself...
In the very unllikely event that I win a huge amount of cash, dream number one is to get several WI-FI routers and configure them to enable a neibourhoo
Not my WiFi. (Score:3, Funny)
Tried it myself. (Score:2)
Was messing around with my new wireless router yesterday. The thing has the ability to use WEP, which is decent enough to stop el-random-fuckwad from screwing up my network and abuse my internet connection. Anyways, I decide to check it out and I try to set up a random WEP keyphrase.
Turns out I need to cough up a random 10 character hex number. And remember it, too. Then I looked at 128bit WEP ecryption which required a 26 character hex number. I can't use my normal ( secure ) password because it contai
Re:Tried it myself. (Score:3, Insightful)
So much for the whitelist.
NYC (Score:2)
So far, 452 WAPs, maybe 100 or so of them are encrypted
Quite sad, really.
Missing option... (Score:3, Funny)
80% insecure? Not around here ... (Score:2)
Last April (April 2004) I did it again ... and found about 66% of the networks DID use WEP. I guess I should go out and try it again -- I'll bet even more use it now.
Perhaps Austin is just more saavy?
Not that WEP automatically makes your network secure, but it makes it much much much more difficult to abuse, and pretty much guarantees that somebody will just go
Why... (Score:2, Interesting)
It IS possible to have an OPEN AP on the same connection as your ENCRYPTED wired environment, and the quick and dirty way costs about
In related news.... (Score:2, Funny)
The Myth of Easy WEP Cracking (Score:5, Interesting)
Unencrypted != Insecure (Score:5, Interesting)
Many folks seem to launch into the misinterpretation that 'unencrypted' == 'insecure'. It does not. Just because your box can talk at layer 2 or layer 3 on my wireless network doesn't mean it's going to be of any earthly use to you.
Case in point: wander around pretty much anywhere in the Haymarket, Ultimo and Broadway areas at the south end of the City of Sydney, Australia - you'll find literally dozens of open, unencrypted wilress access points, all with SSID "UTS WLAN". Natural next step for a geek is "Whoah! open wlan! I'm there!", fire up laptop, connect...
It's shortly after that that you realise that you've just helped yourself to an open, unencrypted, and completely useless wireless network [uts.edu.au] belonging to the University of Technology, Sydney [uts.edu.au]. You know this because no matter *where* you point your web browser, you always get the same page: "Welcome to UTS WLAN, enter your username/password to continue". If you manage to guess a username/password, then you'll get the same page, with red writing, saying something to the effect of "oops, no IPSEC tunnel, no cigar".
That network is opened, unsecured in that you can get your machine to talk on it without authentication, but you can't talk off of it without additional rights.
Now granted, there's holes in my story. One day, some clever kid is going to figure out that he can use the wlan as his own private routed trunk from one side of the city to the other, and then the owners of the network will have to block that. Second, how hard can it be to get a username/password pair out of a drunk undergraduate? Third, this lot isn't *really* in the spirit of the story - I've built the chinese [orcon.net.nz] cookware [slashdot.org], I've found, literally, hundreds of wireless nets that really are open for all to see, most of them quite likely unintentionally so.
So yes, there are a lot of unencrypted wireless networks out there, but they're not all unsecured.
This fact... (Score:5, Funny)
Networks are insecure because WEP does not work (Score:3, Insightful)
If you want us to use security, make it simple. Make is to that I can type in a phrase for EVERY implementation, and that it generates acceptable keys. I don't want to type in a phrase for one vendor, and then have to hack out what the keys are for another. Then, just make it work. I don't want any one vendors card different than any other. When I use a Base-T cable, it works, regardless of vendor. That's what we want, folks.
Why Should People Secure Their Wireless? (Score:5, Insightful)
For me I'm of the school that you shouldn't depend on your network for security for your computer. This view recently discussed by Jeff Schiller, MIT's Network Manager at Syllabus http://www.syllabus.com/article.asp?id=9193 [syllabus.com]. I think he makes some great arguments.
Recently, it seems that people have just jumped on the bandwagon that YOU MUST secure your network, and I guess for the bevy of Windows users out there, with little options for ever successfully securing their computer, this is probably true and one way to get around it. But I find wireless network security to be the antithesis of what wireless connectivity promotes--freedom. So it makes great sense that people would not secure their networks.
Wired Networks by their nature are someone closed off, insuring their security or closing them off further is no big deal. You would expect to have to handle 2, 3, 5, 10 random clients on a wired network. Sure with laptops it happens more, but typically a wired network is somewhat more static in design. You have switches, ports, hubs--it's all very physical. So sure secure it.
But wireless networks promote freedom--you can use your laptop anywhere (anywhere with wireless). But security warps that message. Freedom has always had its limitations, but now the limitation is that someone else owns the air you need to use. What's the point of going to a coffee shop, an administrative building or even sitting on your neighbors porch with your laptop if you still can't get internet access when wireless connectivity is available.
Sure their should be tools to prevent abuse. I don't want someone to start downloading movies off my wireless network, but WHY WOULD SHOULD I CARE if they just use it. I expect the same reciprocity if I'm in the town square or at a coffee shop or just down the street at a friends.
Securing your network has become synonymous with securing your computer and its not. Someone decided that it was impossible to secure their computer, with all the software with bugs and wholes, with various operating systems working against your efforts. So the rallying cry became secure your network.
So fine. Secure your landline, but leave your wireless alone. Sure change the default settings, after all one neighborhood really shouldn't have 50 linksys access points. I'm all for letting people know whose wireless access point they're using. I'd don't want someone taking over my access point, but with various hacking tools, the effort is the same regardless if I've secured my access point.
But if Sue next door wants to use my wireless, go ahead. Don't ask me. Don't make me add you to an exception list or hand over a password. Just use it dammit and be respectful. It's there, and it doesn't really cost me anything more than what I'm currently paying to have you or 20-30 other guest using it.
Encryption, Authentication, and Authorization, and common sense work well enough for keeping the information I need to be secure, relatively secure. I'd rather have someone distracting by the beauty of playing Doom from their front porch using my access point, then banging on my access point try to hack my setup security so they can get free access, when I could have just offered it.
So I say, "Offer It!" Secure what you need secure and open everything else. It makes life easier, and produces good karma as well.
d i g i t a l (Score:4, Interesting)
If it was easier to implement WEP between different vendors' products more people would use it. Unfortunately the product lifetime of WiFi products is a whopping 6 months so drivers and firmwares are rarely updated significantly. If you want to switch from WEP to WPA, which is easier to work with between vendors, you usually have to buy a number of new devices. I'm not apt to plunk down $100+ every year on new WiFi equipment just to get it talking to other equipment. Vendors have no impetus to increase interoperability because they want you buying from a single source.
Opportunity knocks... (Score:5, Interesting)
When not job-hunting, I made a modest living helping the local businesses secure their open access points (which expiated some of the guilt over leeching on open WAPs). This led to more business as a tech support consultant, which kept me afloat and paid my motel bills until I found a permanent position.
Using NetStumbler and a DeLorme Earthmate GPS on a laptop, I identified open access points. Then I would approach the business and offer to secure their connection for a modest fee (usually $100). Only two businesses turned me away, but the rest were glad to have my services.
I've read some comments from people who intentionally leave their access points open. While I don't advise this, that's entirely up to you, and I'm sure that you understand the consequences. These small business owners that I worked with were not so aware of the ramifications. They bought a WAP, hooked it up, and were pleased with themselves when it worked. And with two exceptions, they were all horrified that someone 500 feet away from their office or store had access to their network and data.
Some tips if you want to do this:
I wouldn't want to do this full time, but for a few months I made a pretty decent living at this, enough to stay in a nice motel, eat lobster, and drink good scotch. When I was hired by a company that provided contract network administration services I had a nice stack of references (and new business for the firm, something that clinched the deal).
k.
Running an insecure network can be deliberate (Score:3, Interesting)
Indeed, if you have a wireless network and your outbound Internet link isn't congested, there is not much reason not to share it. You do of course use SSH and other secure protocols for your networking...
Re:fuXck 4 Mare (Score:2)
If you want really good Markov Trolls, I'd recommend a seed length of three; for a more schizophrenic feel, go for two.
Re:Can anyone enlighten me? (Score:2)
You could set up a WAP to give a web page when people first open up a web browser: "This free wireless internet connection is provided by _______. Please do not use it to send spam or do anything illegal. I would appreciate it if you would sign my guestbook. Thank you."
Re:Can anyone enlighten me? (Score:3, Insightful)
It seems to be that simply sniffing for open WAPs is more akin to driving down the street and looking for open doors with little red spinny lights in front and neon signs saying "We're Not Watching! We're Not Watching!".
Actually testing that connection is different; that would be like walking into one of those buildings to see if it
Re:Ho w To Lie With Statistics (Score:4, Insightful)
I'm saying that the author of Kismet is lying. In fact, he makes the effort of saying where he is getting his 80% from, at least.
My point is that the Slashdot post is overly sensational (as usual) quoting the 80% stated in the article, without giving the sample size, which is what the book "How to Lie With Statistics" is about.
My statistics are that 100% of access points have very strong WEP, given that the sample size of that 100% is the 3 access points in my building, which I set up myself. Here's another example:
"90% of all houses are white"*
(*note: all houses within my line of sight, from my apartment, right now)
Now, I'm not trying to be a wiseass. I'm trying to point it out because people see those Slashdot headlines, don't bother to read the article, and think that the world is coming to an end of wireless security. I live in San Francisco, and as of 2 months ago, I only stumbled within about 4 blocks, 2 WAPs that didn't have WEP turned on, out of about 30 or so that my Zaurus (kismet) sniffed out, which is not 80%.