[ale] WiFi Hacking

Hogg, Russell E ctcrreho at opm.gov
Thu Jul 10 15:09:19 EDT 2003







Well,
I've honestly not done much reading on it.


But it looks to as if that's required for the full benefits in an enterprise situation.
That PDF does describe a "home" mode..


I'll cut and paste


Wi-Fi Protected Access for Home/SOHO In a home or Small Office/ Home Office (SOHO) environment, where there are no central authentication servers or EAP framework, Wi-Fi Protected Access runs in a special home mode. This mode, also called Pre-Shared Key (PSK), allows the use of manually-entered keys or passwords and is designed to be easy to set up for the home user. All the home user needs to do is enter a password (also called a master key) in their access point or home wireless gateway and each PC that is on the Wi-Fi wireless network. Wi-Fi Protected Access takes over automatically from that point. First, the password allows only devices with a matching password to join the network, which keeps out eavesdroppers and other unauthorized users. Second, the password automatically kicks off the TKIP encryption process, described above.





____________________________________________
ctcrreho at opm.gov





-----Original Message-----
From: hbbs at comcast.net [mailto:hbbs at comcast.net] 
To: ale at ale.org
Sent: Thursday, July 10, 2003 3:01 PM
To: ale at ale.org
Subject: RE: [ale] WiFi Hacking



Thanks for the link - as I read this, it seems that in order to implement this WPA, you have to implement a central authentication infrastructure of some kind, e.g., RADIUS?

> 
> 
> Wi-Fi Protected Access is supposed to be the answer to the WEP 
> problems.
> 
> http://www.weca.net/OpenSection/pdf/Wi-Fi_Protected_Access_Overview.pd
> f
> 
> Wether or not it is probably remains to be determined.  Am sure 
> there's plenty on the web about it.
> 
> As always a good VPN would be the way to go..
> 
> Russ
> 
> 
> 
> ____________________________________________
> ctcrreho at opm.gov
> 
> 
> 
> 
> -----Original Message-----
> From: hbbs at comcast.net [mailto:hbbs at comcast.net]
> Sent: Thursday, July 10, 2003 2:26 PM
> To: ale at ale.org
> Subject: [ale] WiFi Hacking
> 
> 
> Looking at http://www.dlink.com.au/products/routers/di624/ I am seeing 
> a number of purported "security features," to include WPA.  Am I 
> correct in assuming that, even if you use all the features of this 
> particular device, it's still subject to that "sniff half a gig and 
> you can be on it" attack?
> 
> - Jeff
> _______________________________________________
> Ale mailing list
> Ale at ale.org
> http://www.ale.org/mailman/listinfo/ale
> 
> 


> -------------------------------
> --  Even though this E-Mail has been scanned and found clean of
> --  known viruses, OPM can not guarantee this message is virus free.
> -------------------------------
> --  This message was automatically generated.
> -------------------------------mi


_______________________________________________
Ale mailing list
Ale at ale.org
http://www.ale.org/mailman/listinfo/ale







More information about the Ale mailing list