"linksys" means free WiFi right?

Asymmetric key encryption algorithms (such as RSA) are probably the only thing going right now that offer significant security unless someone develops a quick way to factor the prime numbers that develop the key.

PGP is pretty secure, but can be pretty crappy to deal with. Have it on my laptop and have heard some horror stories.
 
MAC filtering is most useful when you're online. If you're not online, and someone spoofs your MAC address, you'll never know (unless you're monitoring logs.) If you are online, and someone spoofs your MAC address, you'll see some apparently very strange behavior.

In all reality, unless you've got something that someone on the outside actively wants, you really only need to be more secure than your neigbors. You don't need to be completely secure.
 
I know full well that there's no such thing as 100% security in any networking environment. The most that wireless encryption does for you is prevent casual attachment and/or snooping. If someone wants in, they'll get in.
Yeah. You can get pretty damn close using RSA/asymmetric key encryption like Colin (MoparManiac) said, but still, there is no such thing as 100% security.

If someone wants in to your wired network, they'll find a way in. It's easier if you're attached to the outside world (read: Internet.)
Definitely. Easier to exploit the router (usually some crappy consumer-level equipment that has been set up and immediately ignored, default password, firmware never updated)

Also, if you can tap the lines, it's fairly easy to sniff wired traffic. Would you notice if your computer said your ethernet cable was disconnected for a second, and then everything worked again? Probably not. It's trivial to find a 10/100mbit hub (must be a dumb hub, no switches need apply) and put it inline with the system targeted in under a second if you're good, and then all you need is EtherReal/Wireshark and a network card that handles promiscuous mode pretty well.

Important/sensitive data is stored offline, so you'd have to break into the house to get at anything I wanted to secure. Then break encryption on that drive. Assuming you snatched the right drive in the first place (you've got fairly good odds of grabbing a dummy drive, and it's about even odds that, assuming you've gotten a useful drive, you're going to grab something with data you can find easily on it.)
hahaha same here, though the dummy drives aren't really intentional, it's just that they happen to be sitting there.

Ok So I have a question here. How does in addition to WPA2, does Mac address filtering help out? I use it, I know that a mac address can be copied, am I being stupid in thinking that in my rather rural setting that I am not a high target here? I am in kodiak and all my neighbors have their own internet and satellite TV (we share a dish).
It's great if no one is around to check what your MAC address is, then they have 2^48 (approximate, minus a lot of non-allocated and non-usable/special purpose addresses) numbers to choose from before they hit yours. If someone can decrypt the traffic you're creating and get your MAC address, it becomes trivial to circumvent. Nothing wrong with defense in depth though.

Asymmetric key encryption algorithms (such as RSA) are probably the only thing going right now that offer significant security unless someone develops a quick way to factor the prime numbers that develop the key.

PGP is pretty secure, but can be pretty crappy to deal with. Have it on my laptop and have heard some horror stories.
X2 on all of that. We just had to upgrade all our laptops here with PGP whole disk encryption, took hours and it's annoying as hell. So far I know of no easy way to break stuff like this, once every few months someone makes an advance in quantum computing and instantly everyone says "this might be used in the distant future to break asymmetric key encryption" but nothing so far. Cyphers are easy to break though, for instance symmetric encryption (and AES/3DES if part of the key is known or the key space is limited) can be broken in a matter of hours with specialized computing hardware (google for "copacobana 3des" for more info.)

MAC filtering is most useful when you're online. If you're not online, and someone spoofs your MAC address, you'll never know (unless you're monitoring logs.) If you are online, and someone spoofs your MAC address, you'll see some apparently very strange behavior.

In all reality, unless you've got something that someone on the outside actively wants, you really only need to be more secure than your neigbors. You don't need to be completely secure.
"I don't have to outrun the bear, I only have to outrun you"... it's true.
 
X2 on all of that. We just had to upgrade all our laptops here with PGP whole disk encryption, took hours and it's annoying as hell. So far I know of no easy way to break stuff like this, once every few months someone makes an advance in quantum computing and instantly everyone says "this might be used in the distant future to break asymmetric key encryption" but nothing so far. Cyphers are easy to break though, for instance symmetric encryption (and AES/3DES if part of the key is known or the key space is limited) can be broken in a matter of hours with specialized computing hardware (google for "copacobana 3des" for more info.)

Yeah symmetric key encryption is useful only for short sessions (as in use a different key as often as each message) since it can be broken by brute force computing in a matter of minutes.

Ciphers are definitely easy to break through, since if you know two of the three (Cipher, Plain Text, Key) you can easily get the other one.

Until cryptanalyst processing becomes astronomically fast, 1024 bit asymmetric key algorithms will be suitable. Even if it catches up, again you can change the key as often as your network can handle.

EDIT: WTF am I doing. I need to stop nerding.
 
Last edited:
Honestly... "rubber hose cryptanalysis" is usually more effective than trying to break an asymmetric key encryption system :roflmao:
 
Ciphers are definitely easy to break through, since if you know two of the three (Cipher, Plain Text, Key) you can easily get the other one.

Granted, but that's a huge 'if' - especially if we're talking about one-time pads. Numbers stations are a good example of this; they can operate pretty much indefinitely provided that their operational methods remain secure.

Note that I'm not disputing what you're saying, just the practicality of it. It's another case where the human factor is (once again) the weakest link in the chain.
 
So I'm confused, big surprise, am I safe with my mac filter on and no other form of security? I have the mac #'s punched in for all my products in the house that I want using my wireless adapter. Yea or Nea?
 
No, not safe. If you were home (or any of those devices were on) I could get on your network in a matter of minutes.

EDIT: I could also watch your every move on the network (both LAN and Internet), at least the ones not using encrypted connections.
 
So I'm confused, big surprise, am I safe with my mac filter on and no other form of security?

The short answer: definitely not.

The longer answer: that depends what you mean by 'safe'. If you don't want other people using your WiFi, MAC filtering, enabling WEP, and turning off SSID broadcast may be enough. It really depends on how determined an attacker is, how attractive of a target you are to them, and how much effort you want to put into securing the wireless.

I have the mac #'s punched in for all my products in the house that I want using my wireless adapter. Yea or Nea?

It's a reasonable start, but it's really only that: a start. I'd strongly recommend using WPA2 with a randomly-generated key in addition to MAC filtering and turning off SSID broadcast. The downside is that if you have any devices that won't let you manually-specify a network to join, you may not be able to connect them to your network if SSID broadcast is off.
 
yeah the problem I was having before with password encrypted stuff was the kids and their ipod were continually getting kicked off the network and retyping in that password was hell so I bypassed in and used their mac #'s
 
You probably want to figure out why they're getting disconnected. Passwords aren't the problem, R/F is the problem.
 
Passwords aren't the problem, R/F is the problem.

Bingo.

The two most common household items that cause interference with 802.11 routers: 2.4GHz cordless phones and microwave ovens. Try repositioning the access point away from those if it's in close proximity to them and see if anything changes.

Also, it was mentioned that iPods were having trouble staying on the wireless. IIRC, the iPod touch is the only model that has onboard WiFi support - and they're not known for being the most robust wireless client. If you've got a laptop or other device you can test with, take it into the location where the iPod loses connectivity and see if the laptop has the same problem; this should help to give some idea as to how much the positioning of your access point is a factor.

One other thing that just sprang to mind: if the iPod has a power conservation setting, this may impact its ability to connect effectively back to your access point. I'm not overly-familiar with the Touch, but on my phone (Windows Mobile-based) if I set power conservation to be too biased towards saving the battery, WiFi performance takes a hit. Might want to tweak it for shorter battery life and see if that helps.
 
Back
Top