[ale] Wireless access and WEP

Bob Toxen bob at verysecurelinux.com
Sun Feb 29 18:01:52 EST 2004


On Sun, Feb 29, 2004 at 01:32:19PM -0500, Trey Sizemore wrote:
> I understand that WEP is not the end all/be all when it comes to 
> securing a wireless internet connection, but wondered what I can do.  I 
> have a Netgear 802.11g wireless router to which I have my desktop 
> physically connected, but wanted to have a WAP for my Dell notebook with 
> Centrino.
Wired Equivalent Privacy (WEP) is a Trademarked name, not a true statement
as to its security level.  Even the lying sleazebags (in my opinion)
who own the trademark say on their web site that if you want good security
use a VPN on top of it, such as IPSec.

The U.S. Federal Gov't's NIPC notes:

     Successful exploitation of the vulnerability [in WEP] has been
     simplified to getting within range to intercept the broadcast.

(Real World Linux Securty, Second Edition p153-155.)

> What is the best way to set up the system to provide the best possible 
> security setup.  If anyone has Netgear, I'd like to know how you have 
> yours setup (WEP, limit by MAC address, etc.).
Limiting my MAC address also is almost worthless as WEP sends MAC addresses
in clear text.  Thus, an attacker can take over an existing system's
MAC address and simply crash the legitimate system to get it out of
the way -- if it is Windows.

> Thanks.

Best regards,

Bob Toxen, CTO
Fly-By-Day Consulting, Inc.
"Your expert in Firewalls, Virus and Spam Filters, VPNs,
Network Monitoring, and Network Security consulting"
bob at verysecurelinux.com (e-mail)

My recent talks on Linux security include:

-> at Southeast Cybercrime Summit in Atlanta             on Mar. 2-5 2004
-> at the FBI's Atlanta headquarters                     on Mar.  10 2004
   at IBM's Linux Competency Center in New York City     on Mar.  06 last year
   at the Atlanta SecureWorld Expo in Atlanta            on May   22 last year
   at the Enterprise Linux Forum in Silicon Valley       on June  04 last year
   at Computer Associates' Atlanta Linux Security Summit on Sep.  16 last year

Author,
"Real World Linux Security: Intrusion Detection, Prevention, and Recovery"
2nd Ed., Prentice Hall, (C) 2003, 848 pages, ISBN: 0130464562
Also available in Japanese, Chinese, and Czech.

If you spend more on coffee than on IT security, you will be hacked.
What's more, you deserve to be hacked.
-- White House cybersecurity adviser Richard Clarke

http://www.verysecurelinux.com       [Network & Linux/Unix Security Consulting]
http://www.realworldlinuxsecurity.com [My 5* book: "Real World Linux Security"]
http://www.verysecurelinux.com/sunset.html                    [Sunset Computer]
Quality Linux, UNIX and network security and software consulting since 1990.



More information about the Ale mailing list