Re: F-13 new wireless routers -

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



JD wrote:
>   On 08/14/2010 07:43 PM, James McKenzie wrote:
>   
>> Wolfgang S. Rupprecht wrote:
>>     
>>> Bill Davidsen<davidsen@xxxxxxx>  writes:
>>>
>>>       
>>>> Wolfgang S. Rupprecht wrote:
>>>>
>>>>         
>>>>> Bob Goodwin<bobgoodwin@xxxxxxxxxxxx>  writes:
>>>>>
>>>>>           
>>>>>>      Yes  I have been running WEP 'cause I have one old device that can
>>>>>>      do no more than that, and I usually admit only certain [18 or 19]
>>>>>>      MAC addresses that I have listed. Add to that the fact that I am in
>>>>>>      a rural area surrounded by cotton and soy beans, the distance to the
>>>>>>      road is about 200 meters, I don't think LAN security is a major
>>>>>>      worry. I can't detect any other systems when I scan.
>>>>>>
>>>>>>             
>>>>> Well, WEP will keep out the casual person looking for an open wifi.  To
>>>>> be honest, I think that is good enough unless you have a bored and
>>>>> highly talented kid living next door.
>>>>>
>>>>>           
>>>> I live across the street from a college. My security is better than theirs,
>>>> thankfully.
>>>>
>>>>         
>>> Reminds me of the joke about the two hikers preparing for a bear
>>> encounter.  One hiker is removing his hiking boots and putting on
>>> sneakers.  The other points out how useless this is because you can't
>>> outrun a bear.  The first retorts, "I don't have to outrun the bear I
>>> only have to outrun you."  In the same vein, you don't need great
>>> security, you just need something better than the school next door. ;-)
>>>
>>> Personally, I still believe in WPA2-only with CCMP-only and hex
>>> passwords pulled from /dev/random.  It's not that much more work to set
>>> up that way and give the attackers something very substantial to chew
>>> on.
>>>
>>>
>>>       
>> Sort of like why there are locks on wooden doors.  Keeps the honest ones
>> out.  The shotgun deals with the rest (and 10 gauges are really LOUD and
>> do a good job of blowing a 200 lb person out into the street.)  That is
>> what happens when some folks hit a few of the systems that I worked on.
>> One of the 'Honey Pots' had a time bomb download.  If you were running
>> WinBlows you got a shock about 14 days later.....(and a completely dead
>> system to boot if you had flash eeproms in your hard
>> drives/motherboard.)  After that, the number of attacks dropped
>> greatly.  BTW, the file had nothing in it to point back to where it came
>> from :)
>>
>> Of course, after legal advice, the file was pulled and replaced with a
>> nicer file.
>>
>> Securing Wireless is like damming a river.  Works well until you get a
>> flood, then all bets are off.
>>
>> James McKenzie
>>
>>     
> Actually, it is impossible to secure wireless. That's because the
> publicly available crypto systems being used were deliberately
> designed to be broken in real time by parties with very keen
> interest in such ability. The how of such methods of course remain
> in the sole domain of the keenly interested parties :)
>   
If you own a Cray, you can do wonderous things (there is one at NSA and 
one at the Russian equivalent.)  Otherwise, it will take years 
(distributed.net is still trying to break 3DES3EDE.)

James McKenzie

-- 
users mailing list
users@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe or change subscription options:
https://admin.fedoraproject.org/mailman/listinfo/users
Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines


[Index of Archives]     [Current Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite News]     [Yosemite Photos]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux