Wireless Networks..

linmail at itab.com linmail at itab.com
Wed Oct 31 08:57:51 PST 2001


On Tuesday, October 30, 2001, at 02:23 PM, ME wrote:

>
> There are limitations to it, and weaknesses have been found in
> implementations of it, but it does raise the bar: WEP, 40/64 bit key
> size or 108/128 bit key size and use strong keys. Require it of all 
> users
> that might use your Wireless Access Point. Does not stop DoS, and 
> sucking
> your wireless bandwidth, etc. but helps make access to wireless networks
> more dificult.
>
> You may also look to setting up a separate ethernet interface just for
> wireless and also enable firewall rules for that interface much like 
> rules
> for the internet. Allow passage through to the default GW, and machines
> (!) not on your priate networks / your less secure ports. (I did this).
>
> -ME
>
> On Tue, 30 Oct 2001, Christopher Wagner wrote:
>> I have not experimented with wireless networking on PCs yet.  I've 
>> played a
>> little with wireless networking on Macs, though, that was kinda nice.
>>
>> My question is how to set-up a wireless network to protect from such 
>> issues
>> as explained below.  Thanks!
>>
>>
>> -----Original Message-----
>> From:	Lincoln Peters [SMTP:lincoln_peters at hotmail.com]
>> Sent:	Sunday, October 28, 2001 1:09 PM
>> To:	talk at nblug.org
>> Subject:	Re: USB and redhat 7.2 and eth0/1
>>
>> BEWARE THE WIRELESS NETWORK!  I have heard of many idiots who have set 
>> up
>> wireless network access points *behind* their firewalls, allowing 
>> anybody
>> in
>> range to snoop around their network!  I've even heard reports of
>> "war-driving", when a malicious hacker with a laptop and a wireless NIC
>> (usually an 802.11b card) drives around neighborhoods, scanning for and
>> exploiting unprotected networks.
>>
>> - Christopher Wagner
>> --
>> <chrisw at pacaids.com>
>> IS Administrator - Packaging Aids Corporation
>> San Rafael, CA
>> 415-454-4868 x116
>> http://www.pacaids.com/
>>
>>
>>
>



More information about the talk mailing list