Wireless network (WEP security)

James Knott james.knott-bJEeYj9oJeDQT0dZR+AlfA at public.gmane.org
Wed Oct 1 10:31:22 UTC 2003


WEP is still useful, in that it will send attackers to easier targets,
rather than putting the effort into cracking it.  Also, I run a VPN over
my wireless and it and ssh are the only ways to get through my firewall.


Kareem Shehata wrote:
> WEP is useless.  I know people who have worked on either breaking it, or
> securing 802.11 using better techniques.  While the first group of people
> have had a great deal of success, the later have yet to get something
> widely accepted in hardware.
> You're best bet is to use something at a higher level than the
> Data-Link-Layer.  Freeswan has a good solution for wireless lan's from
> what I've heard.  You can also leave the IP-layer open, and secure the
> application layer with SSL or something similar.
> Good luck!
> 
> Kareem
> 
> 
> Gardner Bell said:
> 
>>I've been considering moving to a wireless network system but after
>>many articles I have read is it really worth it?  One such article I
>>read was on the WEP algorithm and numerous flaws found by the analysts,
>>such as a
>>dictionary-building attacks, active attack to inject new traffic from
>>unauthorized mobile stations, etc. How easily could a
>>hacker pull off this kind of attack on an 802.11 network?
>>The initialization vector in WEP I have read is only 24-bit and is sent
>>in the clear-text part of a message, with only a small amount of
>>initialization vectors how often would the same key-stream be used on a
>>rather small home network?  A busy access point, which constantly sends
>>1500 byte packets at 11Mbps, will exhaust the space of IVs after
>>1500*8/(11*10^6)*2^24 = ~18000 seconds, or 5 hours.  Would the time
>>increase or decrease using wireless with Roger's or does it all depend
>>on how much traffic my machines are sending? What measures have others
>>here taken to secure their wireless networks if any of you have them
>>and what specific hardware would you recommend?  Any other info that
>>you could provide would be greatly beneficial.
>>
>>thanks
>>--
>>Gardner Bell - personal site www.gamecraze.net
>>GPG Fingerprint
>>C6F5 39E1 9E9A 9FAC 9DCE  78A3 9C8B 39F4 0895 FD3F
>>
>>--
>>The Toronto Linux Users Group.      Meetings: http://tlug.ss.org
>>TLUG requests: Linux topics, No HTML, wrap text below 80 columns
>>How to UNSUBSCRIBE: http://tlug.ss.org/subscribe.shtml
> 
> 
> 



--
The Toronto Linux Users Group.      Meetings: http://tlug.ss.org
TLUG requests: Linux topics, No HTML, wrap text below 80 columns
How to UNSUBSCRIBE: http://tlug.ss.org/subscribe.shtml





More information about the Legacy mailing list