Josh++<div><br></div><div>He's right - WEP is stupid simple to crack now days... open a program, pick a wifinet, and wait. Scary sometimes how fast it can be done, too; a few hours... sometimes less. Regardless, if you're not worried about it, and they aren't worried about, then okay; you have the right to know I think is all Josh is getting at. (and judging by his sig, I think his advice is qualified) :)</div>
<div><br></div><div>If your friend's heart is set on wireless, they should probably swing for a better card. A decent card might set them back $50-$100, but that's minuscule in comparison to what could be spent on a lawyer and/or fines if someone were to gain access to and use the service for dirty deeds. <DONE DIRT CHEAP /></div>
<div><br></div><div><br></div><div><br><div class="gmail_quote">On Wed, Jun 9, 2010 at 4:07 PM, Josh More <span dir="ltr"><<a href="mailto:MoreJ@alliancetechnologies.net">MoreJ@alliancetechnologies.net</a>></span> wrote:<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex;">They can crack the key. That means that they can read all non-encrypted traffic (i.e., HTTP is readable, HTTPS is not). They can also authenticate to the WAP (by providing the key) and be on your network. From there it depends on network design.<br>
<br>
If you're using MAC filtering, they can usually bypass it. If you're using DHCP, they can usually statically assign something in that range and have it work. None of this, of course, matters much if your wireless traffic goes to a DMZ and then out to the Internet*... especially if you're doing egress filtering. However, if you're like most people and just slap a WAP on your internal network and trust WEP with a key of "Password123" to keep your stuff secure, you have a problem.<br>
<br>
Not as big a problem as running a node of the Global Linksys Mesh Network, but a problem nonetheless.<br>
<br>
* Unless you're being targeted by someone who downloads illegal stuff using your wifi to get you into trouble with the authorities.<br>
<div class="im"><br>
<br>
-Josh More, CISSP, GIAC-GSLC, GIAC-GCIH, RHCE, NCLP<br>
<a href="mailto:morej@alliancetechnologies.net">morej@alliancetechnologies.net</a><br>
515-245-7701<br>
<br>
________________________________________<br>
</div>From: <a href="mailto:cialug-bounces@cialug.org">cialug-bounces@cialug.org</a> [<a href="mailto:cialug-bounces@cialug.org">cialug-bounces@cialug.org</a>] on behalf of Todd Walton [<a href="mailto:tdwalton@gmail.com">tdwalton@gmail.com</a>]<br>
Sent: Wednesday, June 09, 2010 16:02<br>
<div class="im">To: Central Iowa Linux Users Group<br>
Subject: Re: [Cialug] DI-634M<br>
<br>
</div><div><div></div><div class="h5">On Wed, Jun 9, 2010 at 3:55 PM, Josh More<br>
<<a href="mailto:MoreJ@alliancetechnologies.net">MoreJ@alliancetechnologies.net</a>> wrote:<br>
> 1) WEP can be cracked easily these days.<br>
<br>
Question: What exactly is cracked? Is it just that a person will be<br>
able to read traffic to and from the router? Or could they also<br>
connect to the router and get Internet access by cracking WEP?<br>
<br>
--<br>
Todd<br>
_______________________________________________<br>
Cialug mailing list<br>
<a href="mailto:Cialug@cialug.org">Cialug@cialug.org</a><br>
<a href="http://cialug.org/mailman/listinfo/cialug" target="_blank">http://cialug.org/mailman/listinfo/cialug</a><br>
_______________________________________________<br>
Cialug mailing list<br>
<a href="mailto:Cialug@cialug.org">Cialug@cialug.org</a><br>
<a href="http://cialug.org/mailman/listinfo/cialug" target="_blank">http://cialug.org/mailman/listinfo/cialug</a><br>
</div></div></blockquote></div><br><br clear="all"><br>-- <br>EdwardMeacham - <a href="http://www.edmeacham.com">www.edmeacham.com</a><br>AIM: E472155 GoogleTalk: <a href="mailto:emeacham@gmail.com">emeacham@gmail.com</a><br>
ph. 641.744.2069 c. 515.480.5033<br>
</div>