Re: Protected WLAN

2011-06-04 Thread Bruno Wolff III
On Sat, Jun 04, 2011 at 09:06:56 -0700, JD wrote: > On 06/04/11 07:15, Bruno Wolff III wrote: > > Neither is illegal to export (except to a few countries the US wants to > > punish) as long as you follow the rules. You can also write it as a book > > and publish the book, which is what was done.

Re: Protected WLAN

2011-06-04 Thread JD
On 06/04/11 07:15, Bruno Wolff III wrote: > Neither is illegal to export (except to a few countries the US wants to > punish) as long as you follow the rules. You can also write it as a book > and publish the book, which is what was done. DJB also got some rulings > on whether the restrictions on p

Re: Protected WLAN

2011-06-04 Thread Bruno Wolff III
On Sat, May 21, 2011 at 17:45:53 -0700, James McKenzie wrote: > Cryptographic algorithms and making their internal workings public. > BTW, there are TWO versions of PGP, one that uses the still patented RSA > front end and the other uses IDEA. Guess which one is stronger and RSA is used fo

Re: Protected WLAN

2011-05-24 Thread Tim Smith
On Tuesday 24 May 2011 00:00:47 JD wrote: > On 05/23/11 15:41, Tim Smith wrote: > > On Monday 23 May 2011 22:26:49 JD wrote: > >> On 05/23/11 12:22, Tim Smith wrote: > >>> On Monday 23 May 2011 17:50:50 JD wrote: > On 05/23/11 09:28, Tim Smith wrote: > > On Monday 23 May 2011 16:36:00 Tim

Re: Protected WLAN

2011-05-23 Thread JD
On 05/23/11 15:41, Tim Smith wrote: > On Monday 23 May 2011 22:26:49 JD wrote: >> On 05/23/11 12:22, Tim Smith wrote: >>> On Monday 23 May 2011 17:50:50 JD wrote: On 05/23/11 09:28, Tim Smith wrote: > On Monday 23 May 2011 16:36:00 Tim wrote: > Not really. This is SSID, not BSSID (BSSI

Re: Protected WLAN

2011-05-23 Thread Tim Smith
On Monday 23 May 2011 22:26:49 JD wrote: > On 05/23/11 12:22, Tim Smith wrote: > > On Monday 23 May 2011 17:50:50 JD wrote: > >> On 05/23/11 09:28, Tim Smith wrote: > >>> On Monday 23 May 2011 16:36:00 Tim wrote: > >>> Not really. This is SSID, not BSSID (BSSID is usually the MAC of the > >>> AP).

Re: Protected WLAN

2011-05-23 Thread JD
On 05/23/11 12:22, Tim Smith wrote: > On Monday 23 May 2011 17:50:50 JD wrote: >> On 05/23/11 09:28, Tim Smith wrote: >>> On Monday 23 May 2011 16:36:00 Tim wrote: >>> Not really. This is SSID, not BSSID (BSSID is usually the MAC of the AP). >>> When you scan, you not only listen for beacons, but y

Re: Protected WLAN (802.11 and hidden SSID)

2011-05-23 Thread Tim Smith
On Monday 23 May 2011 18:08:15 Genes MailLists wrote: > On 05/23/2011 12:18 PM, Tim Smith wrote: > > When it talks about SSID IEs, however, it isn't mentioning Probe Response > > or Beacon explicity, but uses the weasel phrase "or that do not > > advertise an authorised SSID" without specifying *HO

Re: Protected WLAN

2011-05-23 Thread Tim Smith
On Monday 23 May 2011 17:50:50 JD wrote: > On 05/23/11 09:28, Tim Smith wrote: > > On Monday 23 May 2011 16:36:00 Tim wrote: > > Not really. This is SSID, not BSSID (BSSID is usually the MAC of the AP). > > When you scan, you not only listen for beacons, but you (should) send > > probe requests. If

Re: Protected WLAN (802.11 and hidden SSID)

2011-05-23 Thread Genes MailLists
On 05/23/2011 12:18 PM, Tim Smith wrote: > When it talks about SSID IEs, however, it isn't mentioning Probe Response or > Beacon explicity, but uses the weasel phrase "or that do not advertise an > authorised SSID" without specifying *HOW* that SSID is to be advertised :-) > Also note the "an au

Re: Protected WLAN

2011-05-23 Thread JD
On 05/23/11 09:28, Tim Smith wrote: > On Monday 23 May 2011 16:36:00 Tim wrote: > Not really. This is SSID, not BSSID (BSSID is usually the MAC of the AP). > When you scan, you not only listen for beacons, but you (should) send probe > requests. If you put an SSID into your probe request, you will

Re: Protected WLAN

2011-05-23 Thread Tim Smith
On Monday 23 May 2011 16:36:00 Tim wrote: > On Mon, 2011-05-23 at 13:58 +0100, Tim Smith wrote: > > One problem lies in the fact that 802.11 does not specify a particular > > means of giving a NULL SSID so different APs do it in different ways. > > Some give a zero-length SSID. Some give an SSID of

Re: Protected WLAN (802.11 and hidden SSID)

2011-05-23 Thread Tim Smith
On Monday 23 May 2011 16:03:42 Genes MailLists wrote: > (sorry I lost the threading info ... ) > > > Time Smith wrote: > > > Late to the party, but just for useful information, disabling SSID > > broadcast is NOT a violation of of 802.11 :-) It's mandatory to put > > the SSID information element

Re: Protected WLAN (802.11 and hidden SSID)

2011-05-23 Thread Genes MailLists
On 05/23/2011 12:08 PM, Genes MailLists wrote: > >This entire document (802.11i) is about WPA2 by the way ... and how > stations need to behave to talk to each other securely ... I suppose this means if you're using no encryption or just WEP then 802.11i does not apply ... however if you'r

Re: Protected WLAN (802.11 and hidden SSID)

2011-05-23 Thread Genes MailLists
On 05/23/2011 12:02 PM, Rick Stevens wrote: > > Actually it reads to me as though it can use the MLME-SCAN stuff to > identify STAs that _DO_ assert robust security and advertise their > SSID. I don't read it to say you _HAVE_ to advertise your SSID. > > "I'm not a lawyer and I've never played o

Re: Protected WLAN (802.11 and hidden SSID)

2011-05-23 Thread Rick Stevens
On 05/23/2011 08:03 AM, Genes MailLists wrote: > (sorry I lost the threading info ... ) > >> Time Smith wrote: > >> Late to the party, but just for useful information, disabling SSID >> broadcast is NOT a violation of of 802.11 :-) It's mandatory to put >> the SSID information element in your be

Re: Protected WLAN

2011-05-23 Thread Tim
On Mon, 2011-05-23 at 13:58 +0100, Tim Smith wrote: > One problem lies in the fact that 802.11 does not specify a particular > means of giving a NULL SSID so different APs do it in different ways. > Some give a zero-length SSID. Some give an SSID of length 1 consisting > of a zero octet (a C null-t

Re: Protected WLAN (802.11 and hidden SSID)

2011-05-23 Thread Genes MailLists
(sorry I lost the threading info ... ) > Time Smith wrote: > Late to the party, but just for useful information, disabling SSID > broadcast is NOT a violation of of 802.11 :-) It's mandatory to put > the SSID information element in your beacons, but there's nothing > that says you have to tell t

Re: Protected WLAN

2011-05-23 Thread Tim Smith
On Wednesday 18 May 2011 04:52:47 Genes MailLists wrote: > On 05/17/2011 12:36 PM, Frank Murphy wrote: > > Also if it's your home wLan, hide it, don't broadcast the ssid. > > So those in your neighbourhood won't even know you have a wireless. > > As many have pointed out - you should not disable

Re: Protected WLAN

2011-05-22 Thread JD
On 05/22/11 18:15, Tim wrote: > On Sun, 2011-05-22 at 16:43 -0700, JD wrote: >> Is there a tool or set of procedures that can identify >> the source of an attack before it succeeds? > It it only takes milliseconds to break in, what are you going to be able > to do about it? (If you're meaning for

Re: Protected WLAN

2011-05-22 Thread Tim
On Sun, 2011-05-22 at 16:43 -0700, JD wrote: > Is there a tool or set of procedures that can identify > the source of an attack before it succeeds? It it only takes milliseconds to break in, what are you going to be able to do about it? (If you're meaning for the device to tell YOU that it's unde

Re: Protected WLAN

2011-05-22 Thread James McKenzie
On 5/22/11 4:00 PM, Tim wrote: > On Sun, 2011-05-22 at 08:40 -0700, JD wrote: > Usually, well encrypted connections are hacked by: Guessing stupidly > chosen passwords or stealing them (copying written notes, implanting > trojans, asking someone to login to something and hoping they'll use the > s

Re: Protected WLAN

2011-05-22 Thread JD
On 05/22/11 16:00, Tim wrote: > Yay! He's got it... > > You do realise what the MAC is for? It's the name of that particular > hardware interface, it's address, it's location... So that when data > goes out on the wire, that's where it's intended for. > > As far as network switches and routers g

Re: Protected WLAN

2011-05-22 Thread Tim
On Sun, 2011-05-22 at 08:40 -0700, JD wrote: > I was referring to the use of MAC filtering which is > soundly defeated by the transmission of the MAC > in the clear. So, MAC filtering is absolutely useless > as a security measure. > If I turn off my machine, the hacker has my MAC, and > will have 1

Re: Protected WLAN

2011-05-22 Thread JD
On 05/22/11 07:14, Tim wrote: > Mikkel L. Ellertson: >>> They do not usually guess. The use a program that monitors the >>> traffic, and captures the MAC address of any system that connects to >>> the router. They then use one of these to connect. > JD: >> So, the initial connection request goes in

Re: Protected WLAN

2011-05-22 Thread Tim
Tim: (regarding access points buried in the basement) >> Though you're only going by the ordinary antenna in your gear. A >> better antenna may be more than enough to still work with a muffled >> signal. So this isn't a trick that you want to rely on. Mikkel L. Ellertson: > Not a trick you want

Re: Protected WLAN

2011-05-22 Thread Tim
Mikkel L. Ellertson: >> They do not usually guess. The use a program that monitors the >> traffic, and captures the MAC address of any system that connects to >> the router. They then use one of these to connect. JD: > So, the initial connection request goes in the clear! > Now that's security!! :

Re: Protected WLAN

2011-05-22 Thread Tim
On Sat, 2011-05-21 at 20:48 -0500, Mikkel L. Ellertson wrote: > I like defense in depth - you have to crack the first layer before > you find out about the second layer. This may even give me time to > fix the first layer, depending on how long cracking the second layer > takes. And therein lay a

Re: Protected WLAN

2011-05-21 Thread Marko Vojinovic
On Sunday 22 May 2011 04:57:42 JD wrote: > On 05/21/11 20:05, Mikkel L. Ellertson wrote: > > On 05/21/2011 09:22 PM, JD wrote: > >> On routers using MAC filtering, > >> How quickly do the crackers guess a correct MAC address > >> and connect (assuming they somehow got your passphrase)? > > > > The

Re: Protected WLAN

2011-05-21 Thread Patrick O'Callaghan
On Sat, 2011-05-21 at 17:45 -0700, James McKenzie wrote: > On 5/20/11 3:54 PM, Patrick O'Callaghan wrote: > > On Fri, 2011-05-20 at 14:20 +, g wrote: > > I know it extremely well, having taught it in undergrad CS courses. > > > Most of us out here that lived through that mess are very well vers

Re: Protected WLAN

2011-05-21 Thread JD
On 05/21/11 20:05, Mikkel L. Ellertson wrote: > On 05/21/2011 09:22 PM, JD wrote: >> On 05/21/11 19:16, Joe Zeff wrote: >>> On 05/21/2011 06:48 PM, Mikkel L. Ellertson wrote: (Bad pass-phrase, no pass-phrase, or written down pass-phrase.) >>> I'd like to point out that writing down your p

Re: Protected WLAN

2011-05-21 Thread Mikkel L. Ellertson
On 05/21/2011 09:22 PM, JD wrote: > On 05/21/11 19:16, Joe Zeff wrote: >> On 05/21/2011 06:48 PM, Mikkel L. Ellertson wrote: >>> (Bad pass-phrase, >>> no pass-phrase, or written down pass-phrase.) >> I'd like to point out that writing down your pass-phrase isn't bad if >> you've written it on a pos

Re: Protected WLAN

2011-05-21 Thread JD
On 05/21/11 19:16, Joe Zeff wrote: > On 05/21/2011 06:48 PM, Mikkel L. Ellertson wrote: >> (Bad pass-phrase, >> no pass-phrase, or written down pass-phrase.) > I'd like to point out that writing down your pass-phrase isn't bad if > you've written it on a post-it note that never leaves your home. O

Re: Protected WLAN

2011-05-21 Thread Joe Zeff
On 05/21/2011 06:48 PM, Mikkel L. Ellertson wrote: > (Bad pass-phrase, > no pass-phrase, or written down pass-phrase.) I'd like to point out that writing down your pass-phrase isn't bad if you've written it on a post-it note that never leaves your home. Or, for that matter, if it's saved on a f

Re: Protected WLAN

2011-05-21 Thread Mikkel L. Ellertson
On 05/19/2011 08:53 AM, Tim wrote: > On Thu, 2011-05-19 at 08:25 -0500, Mikkel L. Ellertson wrote: >> Time to add some more confusion to the pie. > > I'm not sure that's a good idea. Probably not. >> >> Another security precaution that sort of helps for a home system, if >> you live in a house, i

Re: Protected WLAN

2011-05-21 Thread James McKenzie
On 5/21/11 6:01 PM, JD wrote: > On 05/21/11 17:45, James McKenzie wrote: >> On 5/20/11 3:54 PM, Patrick O'Callaghan wrote: >>> On Fri, 2011-05-20 at 14:20 +, g wrote: >>> I know it extremely well, having taught it in undergrad CS courses. >>> >> Most of us out here that lived through that mess

Re: Protected WLAN

2011-05-21 Thread JD
On 05/21/11 17:45, James McKenzie wrote: > On 5/20/11 3:54 PM, Patrick O'Callaghan wrote: >> On Fri, 2011-05-20 at 14:20 +, g wrote: >> I know it extremely well, having taught it in undergrad CS courses. >> > Most of us out here that lived through that mess are very well versed in > the history

Re: Protected WLAN

2011-05-21 Thread James McKenzie
On 5/20/11 3:54 PM, Patrick O'Callaghan wrote: > On Fri, 2011-05-20 at 14:20 +, g wrote: > I know it extremely well, having taught it in undergrad CS courses. > Most of us out here that lived through that mess are very well versed in the history and arrest of Phil. There was a fund to help pa

Re: Protected WLAN

2011-05-21 Thread James McKenzie
On 5/20/11 3:57 PM, Patrick O'Callaghan wrote: > Actually the previous poster seemed to be saying that it is currently > illegal to publish algorithms to *decrypt* WPA and friends. That's what > I was asking for evidence for. > Interesting. I know of no such thing. I'll have to investigate furth

Re: Protected WLAN

2011-05-20 Thread Patrick O'Callaghan
On Fri, 2011-05-20 at 07:13 -0700, James McKenzie wrote: > On Fri, May 20, 2011 at 5:27 AM, Patrick O'Callaghan > wrote: > > On Thu, 2011-05-19 at 21:30 -0700, JD wrote: > >> Gov has made it illegal to publish such algorithms, at least > >> in the USA. > > > > Evidence? > > > Not so. DES, 3DES an

Re: Protected WLAN

2011-05-20 Thread Patrick O'Callaghan
On Fri, 2011-05-20 at 14:20 +, g wrote: > On 05/20/2011 12:27 PM, Patrick O'Callaghan wrote: > > On Fri, 2011-05-20 at 09:46 +, g wrote: > >> in all of above results; > >> > >> you will find pro and con about 'ssid'. > >> you will find wpa2 can be hacked if key is weak. > > > > As I sa

Re: Protected WLAN

2011-05-20 Thread Jerry Feldman
On 05/17/2011 02:10 PM, Tim wrote: > Various computers will actually list your allegedly *hidden* device as > an "unnamed" access point, so it's not even hidden. Certainly the > numerous programs prepared to "hack your neighbours" applications > downloadable for the completely clueless will. Inc

Re: Protected WLAN

2011-05-20 Thread Jerry Feldman
On 05/17/2011 02:54 PM, Marko Vojinovic wrote: > Hiding the SSID will stop only a casual bystander getting on to your network > by accident. Those who actually want to crack into a wireless network would > use some tool like airodump-ng (yum install aircrack-ng) to list any and all > wireless ne

Re: Protected WLAN

2011-05-20 Thread Tim
On Thu, 2011-05-19 at 21:30 -0700, JD wrote: > Tim, your points are way too generalized. I've made specific points, already in this thread. > No one said not broadcasting alone will make you > safer. It is advised as part of the larger defense > scheme of choosing a strong protocol, a strong encr

Re: Protected WLAN

2011-05-20 Thread g
On 05/20/2011 02:20 PM, g wrote: <> > better yet, have a look at this; > > http://en.wikipedia.org/wiki/Pretty_Good_Privacy in addition: yes, i went back and re-read page. to me, there is are fine points between the meanings of, publishing, exporting, and making available on a web site. Phi

Re: Protected WLAN

2011-05-20 Thread jdow
On 2011/05/20 02:07, Marko Vojinovic wrote: > On Friday 20 May 2011 05:30:11 JD wrote: >> Tim, your points are way too generalized. >> No one said not broadcasting alone will make you >> safer. It is advised as part of the larger defense >> scheme > > That is a very bad advice. Hiding SSID has *no

Re: Protected WLAN

2011-05-20 Thread g
On 05/20/2011 12:27 PM, Patrick O'Callaghan wrote: > On Fri, 2011-05-20 at 09:46 +, g wrote: >> in all of above results; >> >> you will find pro and con about 'ssid'. >> you will find wpa2 can be hacked if key is weak. > > As I said before, I don't need to open any of these links to know t

Re: Protected WLAN

2011-05-20 Thread James McKenzie
On Fri, May 20, 2011 at 5:27 AM, Patrick O'Callaghan wrote: > On Thu, 2011-05-19 at 21:30 -0700, JD wrote: >> Gov has made it illegal to publish such algorithms, at least >> in the USA. > > Evidence? > Not so. DES, 3DES and AES are all PUBLISHED alogrithms and are used by the DoD/NSA (CISSP train

Re: Protected WLAN

2011-05-20 Thread Patrick O'Callaghan
On Thu, 2011-05-19 at 21:30 -0700, JD wrote: > Gov has made it illegal to publish such algorithms, at least > in the USA. Evidence? poc -- users mailing list users@lists.fedoraproject.org To unsubscribe or change subscription options: https://admin.fedoraproject.org/mailman/listinfo/users Guide

Re: Protected WLAN

2011-05-20 Thread Patrick O'Callaghan
On Fri, 2011-05-20 at 09:46 +, g wrote: > in all of above results; > > you will find pro and con about 'ssid'. > you will find wpa2 can be hacked if key is weak. As I said before, I don't need to open any of these links to know that a weak password gives poor security. poc -- users mai

Re: Protected WLAN

2011-05-20 Thread g
On 05/20/2011 10:17 AM, Timothy Murphy wrote: <> > Or enter > > "riemann hypothesis proof" > > about 120,000 results. > One of those MUST be right ... is that with or without quotes? -- peace out. tc.hago, g . signature.asc Description: OpenPGP digital signature -- users mailin

Re: Protected WLAN

2011-05-20 Thread Timothy Murphy
g wrote: > open a browser, log google at; > >http://www.google.com/advanced_search?hl=en&num=100 > > *leave quotes and plus sign just as they are shown*. > > > enter this in 'all these words'; > > "crack+wpa2" "cracking+wpa2" > > about 1,600 results. Or enter "riemann hypoth

Re: Protected WLAN

2011-05-20 Thread g
On 05/20/2011 04:30 AM, JD wrote: <> > Tim, your points are way too generalized. as is this whole thread has been. open a browser, log google at; http://www.google.com/advanced_search?hl=en&num=100 *leave quotes and plus sign just as they are shown*. enter this in 'all these words'; "

Re: Protected WLAN

2011-05-20 Thread Marko Vojinovic
On Friday 20 May 2011 10:10:14 Ed Greshko wrote: > On 05/20/2011 05:07 PM, Marko Vojinovic wrote: > > If you think that hiding SSID will help with security, you might as well > > add that hanging a pack of onions in front of the house will also help > > make your wireless more secure > > There's y

Re: Protected WLAN

2011-05-20 Thread Ed Greshko
On 05/20/2011 05:07 PM, Marko Vojinovic wrote: > If you think that hiding SSID will help with security, you might as well add > that hanging a pack of onions in front of the house will also help make your > wireless more secure There's your problem It should be "garlic"! :-) :-) -- Sigh

Re: Protected WLAN

2011-05-20 Thread Marko Vojinovic
On Friday 20 May 2011 05:30:11 JD wrote: > On 05/19/11 21:14, Tim wrote: > > On Fri, 2011-05-20 at 12:19 +0900, Misha Shnurapet wrote: > >> Nope, if you're a plain user like me using an applet to "scan" you'll > >> only see what's broadcast. > > > > Nope, depending on your client, you'll see them

Re: Protected WLAN

2011-05-19 Thread jdow
On 2011/05/19 21:30, JD wrote: > On 05/19/11 21:14, Tim wrote: >> On Fri, 2011-05-20 at 12:19 +0900, Misha Shnurapet wrote: >>> Nope, if you're a plain user like me using an applet to "scan" you'll >>> only see what's broadcast. >> Nope, depending on your client, you'll see them all. Even Windows

Re: Protected WLAN

2011-05-19 Thread Misha Shnurapet
20.05.2011, 13:14, "Tim" : >  6. Or, pigheaded clueless user continues to hide their SSID, and > continues to fight with WLAN and mailing list... Gladly we don't have such people around here, oink! -- Best regards, Misha Shnurapet, Fedora Project Contributor https://fedoraproject.org

Re: Protected WLAN

2011-05-19 Thread JD
On 05/19/11 21:14, Tim wrote: > On Fri, 2011-05-20 at 12:19 +0900, Misha Shnurapet wrote: >> Nope, if you're a plain user like me using an applet to "scan" you'll >> only see what's broadcast. > Nope, depending on your client, you'll see them all. Even Windows did > that. You'd see a list of *all

Re: Protected WLAN

2011-05-19 Thread Tim
On Fri, 2011-05-20 at 12:19 +0900, Misha Shnurapet wrote: > Nope, if you're a plain user like me using an applet to "scan" you'll > only see what's broadcast. Nope, depending on your client, you'll see them all. Even Windows did that. You'd see a list of *all* transmitting access points, and the

Re: Protected WLAN

2011-05-19 Thread Misha Shnurapet
20.05.2011, 11:53, "Genes MailLists" : >   If you use any tool to scan wifi networks - you'll see SSID's whether > they are broadcast or not ... Nope, if you're a plain user like me using an applet to "scan" you'll only see what's broadcast. And many people are. Do not provoke them, at least? --

Re: Protected WLAN

2011-05-19 Thread Genes MailLists
On 05/19/2011 10:43 PM, Misha Shnurapet wrote: > 20.05.2011, 03:10, "Lamar Owen" : > > Once I was out with my notebook when I came up with an urgent need for the > Internets. I saw several access points on the list. But they are all > protected and I wanted online so bad it made me want to crac

Re: Protected WLAN

2011-05-19 Thread Misha Shnurapet
20.05.2011, 03:10, "Lamar Owen" : > On Tuesday, May 17, 2011 02:35:09 PM Michael Cronenworth wrote: > >>  SSID hiding is *not* secure. It is *not* a deterrent. Security through >>  obscurity is *not* security. > > SSID hiding isn't about security.  It's about being able to show that someone > who

Re: Protected WLAN

2011-05-19 Thread Genes MailLists
On 05/19/2011 02:56 PM, Joe Zeff wrote: > On 05/19/2011 11:45 AM, Genes MailLists wrote: >> So, turning off SSID broadcast is really not a good suggestion. > > If you have only one access point and no devices that insist on getting > the SSID before connecting turning off SSID broadcast does ha

Re: Protected WLAN

2011-05-19 Thread Lamar Owen
On Thursday, May 19, 2011 02:45:38 PM Genes MailLists wrote: > Still a bad idea - some things may, for anything that violates the > 802.11 standards - such as non-broadcast of SSID, choose not to connect > to your router. That means some of your client devices may no longer > work ... That's fin

Re: Protected WLAN

2011-05-19 Thread Mikkel L. Ellertson
On 05/19/2011 01:56 PM, Joe Zeff wrote: > On 05/19/2011 11:45 AM, Genes MailLists wrote: >> So, turning off SSID broadcast is really not a good suggestion. > > If you have only one access point and no devices that insist on getting > the SSID before connecting turning off SSID broadcast does ha

Re: Protected WLAN

2011-05-19 Thread Joe Zeff
On 05/19/2011 11:45 AM, Genes MailLists wrote: > So, turning off SSID broadcast is really not a good suggestion. If you have only one access point and no devices that insist on getting the SSID before connecting turning off SSID broadcast does have the same effect as a No Trespassing sign: it

Re: Protected WLAN

2011-05-19 Thread Genes MailLists
On 05/19/2011 02:10 PM, Lamar Owen wrote: > On Tuesday, May 17, 2011 02:35:09 PM Michael Cronenworth wrote: >> SSID hiding is *not* secure. It is *not* a deterrent. Security through >> obscurity is *not* security. > > SSID hiding isn't about security. It's about being able to show that someone

Re: Protected WLAN

2011-05-19 Thread Lamar Owen
On Tuesday, May 17, 2011 02:35:09 PM Michael Cronenworth wrote: > SSID hiding is *not* secure. It is *not* a deterrent. Security through > obscurity is *not* security. SSID hiding isn't about security. It's about being able to show that someone who hacked into your network intended to do so, it

Re: Protected WLAN

2011-05-19 Thread Lamar Owen
On Tuesday, May 17, 2011 02:10:21 PM Tim wrote: > Password length and wierdness increases security. You're less likely > to be hacked by lucky guesses if you don't have plain words in there. > Certainly don't use real names, phone numbers, birthdates, or anything > else that's easy for someone e

Re: Protected WLAN

2011-05-19 Thread Lamar Owen
On Tuesday, May 17, 2011 11:36:50 PM James McKenzie wrote: > I'll try to make this simple for JD. > 1. Hidden SSID. Standard practice. [snip] > 7. Changing the channel. Standard practice and it prevents interference. 8. Turn off the router and the connection when (if) you're not using it. My

Re: Protected WLAN

2011-05-19 Thread Tim
On Thu, 2011-05-19 at 08:25 -0500, Mikkel L. Ellertson wrote: > Time to add some more confusion to the pie. I'm not sure that's a good idea. > > Another security precaution that sort of helps for a home system, if > you live in a house, is to put the access point in the basement. > That way, the

Re: Protected WLAN

2011-05-19 Thread Mikkel L. Ellertson
On 05/18/2011 06:23 AM, Tim wrote: > Tim: >>> Completely pointless: >>> >>> Your device is transmitting something, this is detectable. And it >>> does so several times a second (i.e. it's continual). > > > James McKenzie: >> True. Bet you have a lock on every door to your house as well. >> Tur

Re: Protected WLAN

2011-05-18 Thread JD
On 05/18/11 20:33, charles zeitler wrote: > -- Do what thou wilt shall be the whole of the Law. On Wed, May 18, > 2011 at 12:04 AM, JD wrote: >> > On 05/17/11 21:15, Kevin J. Cummings wrote: >>> >> On 05/17/2011 11:36 PM, JD wrote:. >>> >> >>> >> I'm waiting for the next level new security tha

Re: Protected WLAN

2011-05-18 Thread charles zeitler
-- Do what thou wilt shall be the whole of the Law. On Wed, May 18, 2011 at 12:04 AM, JD wrote: > On 05/17/11 21:15, Kevin J. Cummings wrote: >> On 05/17/2011 11:36 PM, JD wrote:. >> >> I'm waiting for the next level new security that is unbreakable before >> buying my next new home wireless

Re: Protected WLAN

2011-05-18 Thread Tim
On Wed, 2011-05-18 at 14:20 +0100, Ian Malone wrote: > Another possible application is if you have a number of devices in a > department and you want to revoke access for one for some reason, but > you don't want to change passwords every time you do this, so you can > temporarily disable access un

Re: Protected WLAN

2011-05-18 Thread Ian Malone
On 18 May 2011 12:23, Tim wrote: > Really MAC filtering is only barely useful as the most basic of > management tools.  e.g. You have a video game or mobile phone that > automatically tries to log into a nearby network, and it's a pain to > configure (or you can't).  So you blacklist it, and hav

Re: [OT] My paranoia and skype, was Re: Protected WLAN

2011-05-18 Thread Fernando Cassia
On Wed, May 18, 2011 at 09:39, Rick Sewill wrote: > My paranoia causes me to believe the back doors don't stop with text chat. > My paranoia causes me to believe multiple governments demanded back doors. http://en.wikipedia.org/wiki/Lotus_Software "Prior to that year, Lotus had been restricted fr

[OT] My paranoia and skype, was Re: Protected WLAN

2011-05-18 Thread Rick Sewill
On Wednesday, May 18, 2011 07:01:53 AM Marko Vojinovic wrote: > Except for skype, of course... ;-) But that's old news. And now that > Microsoft took it over, they will probably trade with the nsa for a > backdoor... :-) > I apologize for the off topic remarks I am about to make. I would be ver

Re: Protected WLAN

2011-05-18 Thread Marko Vojinovic
On Wednesday 18 May 2011 06:04:49 JD wrote: > On 05/17/11 21:15, Kevin J. Cummings wrote: > > I'm waiting for the next level new security that is unbreakable before > > buying my next new home wireless router. B^) > > I do not think there is one, nor will there be one > (for public use). > The g

Re: Protected WLAN

2011-05-18 Thread Tim
Tim: >> Completely pointless: >> >> Your device is transmitting something, this is detectable. And it >> does so several times a second (i.e. it's continual). James McKenzie: > True. Bet you have a lock on every door to your house as well. > Turning off the SSID is a deterent. Make them go so

Re: Protected WLAN

2011-05-17 Thread JD
On 05/17/11 21:15, Kevin J. Cummings wrote: > On 05/17/2011 11:36 PM, JD wrote: >> TKIP is the feeble one. >> Two researchers in Japan busted TKIP in less than one minute >> using an ordinary PC. > You are correct. I just went and looked at my wireless router, and I'm > using AES. I remember hea

Re: Protected WLAN

2011-05-17 Thread Patrick O'Callaghan
On Wed, 2011-05-18 at 03:55 +, g wrote: > On 05/18/2011 03:09 AM, Patrick O'Callaghan wrote: > <> > > > WEP is known to be vulnerable. WPA has some weaknesses in some > > circumstances. WPA2 however is thought to be secure if you use a > > hard-to-guess password. > > as you say *thought to be

Re: Protected WLAN

2011-05-17 Thread Kevin J. Cummings
On 05/17/2011 11:36 PM, JD wrote: > TKIP is the feeble one. > Two researchers in Japan busted TKIP in less than one minute > using an ordinary PC. You are correct. I just went and looked at my wireless router, and I'm using AES. I remember hearing about how feeble TKIP was 4 years ago, and imme

Re: Protected WLAN

2011-05-17 Thread g
On 05/18/2011 03:36 AM, James McKenzie wrote: <> > The first part of security is knowing what NOT TO do, not what TO do. this is one point that too many fail at, and in such, set up a weak system. once you *think* you have a secure system, it is time to test with all the tools you have available

Re: Protected WLAN

2011-05-17 Thread g
On 05/18/2011 03:09 AM, Patrick O'Callaghan wrote: <> > WEP is known to be vulnerable. WPA has some weaknesses in some > circumstances. WPA2 however is thought to be secure if you use a > hard-to-guess password. as you say *thought to be secure*. > A quick look at Wikipedia could have told you

Re: Protected WLAN

2011-05-17 Thread Genes MailLists
On 05/17/2011 12:36 PM, Frank Murphy wrote: > > Also if it's your home wLan, hide it, don't broadcast the ssid. > So those in your neighbourhood won't even know you have a wireless. > As many have pointed out - you should not disable SSID broadcast. Disabling it offers zero security benefit

Re: Protected WLAN

2011-05-17 Thread James McKenzie
On 5/17/11 6:20 PM, Marko Vojinovic wrote: > I didn't say that cracking wpa2-ps/aes is easy. I was saying that, > whatever > the security algorithm you are trying to crack, having a hidden SSID and > filtered MAC is not going to make it *any* harder than having a public SSID > and > no MAC filter

Re: Protected WLAN

2011-05-17 Thread JD
On 05/17/11 20:16, Kevin J. Cummings wrote: > On 05/17/2011 09:53 PM, JD wrote: >> Well, I hate to disappoint anyone, but until >> I see a credible security researchers/professors >> show in a scientific publication that they >> were able to crack wpa2-psk/AES using PC's >> and in reasonable time (

Re: Protected WLAN

2011-05-17 Thread g
On 05/18/2011 01:53 AM, JD wrote: <> > Well, I hate to disappoint anyone, but until I see a credible security > researchers/professors show in a scientific publication that they > were able to crack wpa2-psk/AES using PC's and in reasonable time > (say a few days), then I would believe it. Youtu

Re: Protected WLAN

2011-05-17 Thread James McKenzie
On 5/17/11 2:01 PM, JD wrote: > On 05/17/11 12:23, Marko Vojinovic wrote: >> On Tuesday 17 May 2011 19:47:24 JD wrote: >>> On 05/17/11 11:23, Steve Searle wrote: Around 07:16pm on Tuesday, May 17, 2011 (UK time), JD scrawled: > Right. Also, it is not necessarily "neighbours" that are adjac

Re: Protected WLAN

2011-05-17 Thread Kevin J. Cummings
On 05/17/2011 09:53 PM, JD wrote: > Well, I hate to disappoint anyone, but until > I see a credible security researchers/professors > show in a scientific publication that they > were able to crack wpa2-psk/AES using PC's > and in reasonable time (say a few days), then > I would believe it. Youtube

Re: Protected WLAN

2011-05-17 Thread Patrick O'Callaghan
On Wed, 2011-05-18 at 01:07 +, g wrote: > On 05/17/2011 11:44 PM, JD wrote: > <> > > > You call youtube a credible publication? > > yes/no. > > they do have all different ways of cracking wep, wpa, and wpa2 > that are mentioned in this thread. WEP is known to be vulnerable. WPA has some wea

Re: Protected WLAN

2011-05-17 Thread Joe Zeff
On 05/17/2011 09:30 AM, Misha Shnurapet wrote: > 18.05.2011, 00:39, "Joe Zeff": >> > Just out of curiosity, how would a phrase in a language that's not >> > natively written in the Latin alphabet do? > It didn't work at all. I mean it didn't even take it as a setting. Don't try to enter it in it

Re: Protected WLAN

2011-05-17 Thread Joe Zeff
On 05/17/2011 09:20 AM, JD wrote: > Good question. You have to ask a computer > geek who speaks that language :) > > But seriously, just about all languages have > an alphabet and they use computer with the > locale set to that alphbet. Probably some alphabets > are coded in UTF8 and others in UTF1

Re: Protected WLAN

2011-05-17 Thread JD
On 05/17/11 18:07, g wrote: > On 05/17/2011 11:44 PM, JD wrote: > <> > >> You call youtube a credible publication? > yes/no. > > they do have all different ways of cracking wep, wpa, and wpa2 > that are mentioned in this thread. > > just a few from my bookmarks, which where easy to find via a littl

Re: Protected WLAN

2011-05-17 Thread Marko Vojinovic
On Tuesday 17 May 2011 22:01:11 JD wrote: > On 05/17/11 12:23, Marko Vojinovic wrote: > > On Tuesday 17 May 2011 19:47:24 JD wrote: > >> On 05/17/11 11:23, Steve Searle wrote: > >>> Around 07:16pm on Tuesday, May 17, 2011 (UK time), JD scrawled: > Right. Also, it is not necessarily "neighbours

Re: Protected WLAN

2011-05-17 Thread g
On 05/17/2011 11:44 PM, JD wrote: <> > You call youtube a credible publication? yes/no. they do have all different ways of cracking wep, wpa, and wpa2 that are mentioned in this thread. just a few from my bookmarks, which where easy to find via a little google time; http://www.youtube.com/wa

Re: Protected WLAN

2011-05-17 Thread JD
On 05/17/11 15:29, g wrote: > On 05/17/2011 09:01 PM, JD wrote: > <> > >> Too much bluster here. >> >> Show us any credible publication that claims wpa2-ps/AES has been >> easily cracked or even cracked at all. > so, you say you have not been on youtube lately? > > You call youtube a credible publi

Re: Protected WLAN

2011-05-17 Thread Alan Cox
> Obtaining a MAC takes seconds - i.e. no more 'work' than it is to find > your 'hidden' SSID. > > These snake oil methods of wireless security need to simply die. Seconded, and the arguments about it needing technical knowledge don't really work any more because tools for old style wireless, a

  1   2   >