Wireless network (WEP security)
CLIFFORD ILKAY
clifford_ilkay-biY6FKoJMRdBDgjK7y7TUQ at public.gmane.org
Tue Sep 30 19:40:02 UTC 2003
At 01:44 PM 30/09/2003 -0400, Gardner Bell wrote:
>I've been considering moving to a wireless network system but after many
>articles I have read is it really worth it? One such article I read was
>on the
>WEP algorithm and numerous flaws found by the analysts, such as a
>dictionary-building attacks, active attack to inject new traffic from
>unauthorized mobile stations, etc. How easily could a
>hacker pull off this kind of attack on an 802.11 network?
>The initialization vector in WEP I have read is only 24-bit and is sent in
>the clear-text part of a message, with only a small amount of initialization
>vectors how often would the same key-stream be used on a rather small home
>network? A busy access point, which constantly sends 1500 byte packets at
>11Mbps, will exhaust the space of IVs after 1500*8/(11*10^6)*2^24 = ~18000
>seconds, or 5 hours. Would the time increase or decrease using wireless with
>Roger's or does it all depend on how much traffic my machines are sending?
>What measures have others here taken to secure their wireless networks if
>any of
>you have them and what specific hardware would you recommend? Any other info
>that you could provide would be greatly beneficial.
I have not gone wireless yet for security reasons. FreeS/WAN seems to be a
good option for securing 802.11x networks.
Regards,
Clifford Ilkay
Dinamis Corporation
3266 Yonge Street, Suite 1419
Toronto, Ontario
Canada M4N 3P6
Tel: 416-410-3326
mailto:clifford_ilkay-biY6FKoJMRdBDgjK7y7TUQ at public.gmane.org
--
The Toronto Linux Users Group. Meetings: http://tlug.ss.org
TLUG requests: Linux topics, No HTML, wrap text below 80 columns
How to UNSUBSCRIBE: http://tlug.ss.org/subscribe.shtml
More information about the Legacy
mailing list