[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: Encrypted wireless

Hash: SHA1

On Wednesday 28 July 2004 15:51, Frédéric Dreier wrote:

> I use it with a netgear switch (802.11g) which support the mac-address
> restrictions. I was just a little disapointed to learn that encryption
> was not so difficult to break... but it seems to be common to all
> wireless device (protocol is buggy).

A couple of things you can do with WEP (Wireless Encryption Protocol). A 
former coworker actually wrote a perl script to rotate his WEP keys every two 
hours. This is about the minimum time interval that it is possible to crack 
WEP keys sniffing "normal" amounts of traffic.

Another option would be to set up the firewall to only accept, say, vpn 
traffic,  then use something like OpenVPN (http://openvpn.sourceforge.net) 
and route all traffic from the wireless machine through the vpn tunnel. Ran 
across an article yesterday on linuxsecurity.com called Best Practices For 
Securing Your WLAN, 
Haven't had time to review it, but there it is.

- -- 
- --Brad
Bradley M. Alexander                |
SysAdmin, Security Engineer    |   storm [at] tux.org
Debian/GNU Linux Developer          |   storm [at] debian.org
Key fingerprints:
DSA 0x54434E65: 37F6 BCA6 621D 920C E02E  E3C8 73B2 C019 5443 4E65
RSA 0xC3BCBA91: 3F 0E 26 C1 90 14 AD 0A  C8 9C F0 93 75 A0 01 34
Law #10: Technology is not a panacea.
Version: GnuPG v1.2.4 (GNU/Linux)


Reply to: