[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[ale] WiFi Hacking
- Subject: [ale] WiFi Hacking
- From: ctcrreho at opm.gov (Hogg, Russell E)
- Date: Thu, 10 Jul 2003 15:09:19 -0400
Well,
I've honestly not done much reading on it.
But it looks to as if that's required for the full benefits in an enterprise situation.
That PDF does describe a "home" mode..
I'll cut and paste
Wi-Fi Protected Access for Home/SOHO In a home or Small Office/ Home Office (SOHO) environment, where there are no central authentication servers or EAP framework, Wi-Fi Protected Access runs in a special home mode. This mode, also called Pre-Shared Key (PSK), allows the use of manually-entered keys or passwords and is designed to be easy to set up for the home user. All the home user needs to do is enter a password (also called a master key) in their access point or home wireless gateway and each PC that is on the Wi-Fi wireless network. Wi-Fi Protected Access takes over automatically from that point. First, the password allows only devices with a matching password to join the network, which keeps out eavesdroppers and other unauthorized users. Second, the password automatically kicks off the TKIP encryption process, described above.
____________________________________________
ctcrreho at opm.gov
-----Original Message-----
From: hbbs at comcast.net [mailto:hbbs at comcast.net]
To: ale at ale.org
Sent: Thursday, July 10, 2003 3:01 PM
To: ale at ale.org
Subject: RE: [ale] WiFi Hacking
Thanks for the link - as I read this, it seems that in order to implement this WPA, you have to implement a central authentication infrastructure of some kind, e.g., RADIUS?
>
>
> Wi-Fi Protected Access is supposed to be the answer to the WEP
> problems.
>
> http://www.weca.net/OpenSection/pdf/Wi-Fi_Protected_Access_Overview.pd
> f
>
> Wether or not it is probably remains to be determined.?? Am sure
> there's plenty on the web about it.
>
> As always a good VPN would be the way to go..
>
> Russ
>
>
>
> ____________________________________________
> ctcrreho at opm.gov
>
>
>
>
> -----Original Message-----
> From: hbbs at comcast.net [mailto:hbbs at comcast.net]
> Sent: Thursday, July 10, 2003 2:26 PM
> To: ale at ale.org
> Subject: [ale] WiFi Hacking
>
>
> Looking at http://www.dlink.com.au/products/routers/di624/ I am seeing
> a number of purported "security features," to include WPA.?? Am I
> correct in assuming that, even if you use all the features of this
> particular device, it's still subject to that "sniff half a gig and
> you can be on it" attack?
>
> - Jeff
> _______________________________________________
> Ale mailing list
> Ale at ale.org
> http://www.ale.org/mailman/listinfo/ale
>
>
> -------------------------------
> --?? Even though this E-Mail has been scanned and found clean of
> --?? known viruses, OPM can not guarantee this message is virus free.
> -------------------------------
> --?? This message was automatically generated.
> -------------------------------mi
_______________________________________________
Ale mailing list
Ale at ale.org
http://www.ale.org/mailman/listinfo/ale