Wireless network (WEP security)

CLIFFORD ILKAY clifford_ilkay-biY6FKoJMRdBDgjK7y7TUQ at public.gmane.org
Tue Sep 30 19:40:02 UTC 2003


At 01:44 PM 30/09/2003 -0400, Gardner Bell wrote:
>I've been considering moving to a wireless network system but after many
>articles I have read is it really worth it?  One such article I read was 
>on the
>WEP algorithm and numerous flaws found by the analysts, such as a
>dictionary-building attacks, active attack to inject new traffic from
>unauthorized mobile stations, etc. How easily could a
>hacker pull off this kind of attack on an 802.11 network?
>The initialization vector in WEP I have read is only 24-bit and is sent in
>the clear-text part of a message, with only a small amount of initialization
>vectors how often would the same key-stream be used on a rather small home
>network?  A busy access point, which constantly sends 1500 byte packets at
>11Mbps, will exhaust the space of IVs after 1500*8/(11*10^6)*2^24 = ~18000
>seconds, or 5 hours.  Would the time increase or decrease using wireless with
>Roger's or does it all depend on how much traffic my machines are sending?
>What measures have others here taken to secure their wireless networks if 
>any of
>you have them and what specific hardware would you recommend?  Any other info
>that you could provide would be greatly beneficial.

I have not gone wireless yet for security reasons. FreeS/WAN seems to be a 
good option for securing 802.11x networks.

Regards,

Clifford Ilkay
Dinamis Corporation
3266 Yonge Street, Suite 1419
Toronto, Ontario
Canada M4N 3P6

Tel: 416-410-3326

mailto:clifford_ilkay-biY6FKoJMRdBDgjK7y7TUQ at public.gmane.org 

--
The Toronto Linux Users Group.      Meetings: http://tlug.ss.org
TLUG requests: Linux topics, No HTML, wrap text below 80 columns
How to UNSUBSCRIBE: http://tlug.ss.org/subscribe.shtml





More information about the Legacy mailing list