[Cialug] [NEWS] War driving reveals vulnerable wireless networks

Dave J. Hala Jr. cialug@cialug.org
Mon, 10 Jan 2005 09:29:35 -0600


You could leave your network unencrypted and use some type of hot spot
software to control who uses it.  That is a fairly common practice.

I've been experimenting with a neighborhood hotspot idea as of late. At
the moment I'm waiting for the next firmware release candidate of the
sveasoft linksys firmware. It will have some hotspot functionality.

On Mon, 2005-01-10 at 09:20, Claus wrote:
> On 1/10/2005 7:15 AM, reinstall hell wrote:
> > http://www.wcfcourier.com/articles/2005/01/09/news/top_story/ee43d35dbbb5671786256f830083ce55.txt
> 
> One problem is end-user education.  I just bought my first wireless 
> access point and the documentation of it really doesn't mention what 
> security protocol is best but instead it says to hide the SSID which 
> from my limited knowledge doesn't really provide any security.
> 
> My question also is why the AP manufacturer don't enable encryption by 
> default with a random preshared password string.  That way the end user 
> at least has to go in and read the key before being able to use it. 
> Most people live with the rule "if it works don't touch it" which also 
> applies to APs and those do work out of the box without touching them.
> 
> Finally one also has to accept the option that some people actually want 
> to give people a chance to access the Internet for free to check e-mail 
> and such.  I'm considering something in that regards.  Of course if that 
> should happen the speed would need to be throttled so I still get most 
> of the bandwidth.  Also I'm not sure what my neighbors would think of 
> all the parked cars in front of my house. :)
> 
>    Claus
> _______________________________________________
> Cialug mailing list
> Cialug@cialug.org
> http://cialug.org/mailman/listinfo/cialug
-- 

Open Source Information Systems (OSIS)
Dave J. Hala Jr. <dave@osis.us>
641.485.1606