Wireless Networks..
linmail at itab.com
linmail at itab.com
Wed Oct 31 08:57:51 PST 2001
On Tuesday, October 30, 2001, at 02:23 PM, ME wrote:
>
> There are limitations to it, and weaknesses have been found in
> implementations of it, but it does raise the bar: WEP, 40/64 bit key
> size or 108/128 bit key size and use strong keys. Require it of all
> users
> that might use your Wireless Access Point. Does not stop DoS, and
> sucking
> your wireless bandwidth, etc. but helps make access to wireless networks
> more dificult.
>
> You may also look to setting up a separate ethernet interface just for
> wireless and also enable firewall rules for that interface much like
> rules
> for the internet. Allow passage through to the default GW, and machines
> (!) not on your priate networks / your less secure ports. (I did this).
>
> -ME
>
> On Tue, 30 Oct 2001, Christopher Wagner wrote:
>> I have not experimented with wireless networking on PCs yet. I've
>> played a
>> little with wireless networking on Macs, though, that was kinda nice.
>>
>> My question is how to set-up a wireless network to protect from such
>> issues
>> as explained below. Thanks!
>>
>>
>> -----Original Message-----
>> From: Lincoln Peters [SMTP:lincoln_peters at hotmail.com]
>> Sent: Sunday, October 28, 2001 1:09 PM
>> To: talk at nblug.org
>> Subject: Re: USB and redhat 7.2 and eth0/1
>>
>> BEWARE THE WIRELESS NETWORK! I have heard of many idiots who have set
>> up
>> wireless network access points *behind* their firewalls, allowing
>> anybody
>> in
>> range to snoop around their network! I've even heard reports of
>> "war-driving", when a malicious hacker with a laptop and a wireless NIC
>> (usually an 802.11b card) drives around neighborhoods, scanning for and
>> exploiting unprotected networks.
>>
>> - Christopher Wagner
>> --
>> <chrisw at pacaids.com>
>> IS Administrator - Packaging Aids Corporation
>> San Rafael, CA
>> 415-454-4868 x116
>> http://www.pacaids.com/
>>
>>
>>
>
More information about the talk
mailing list