Berkeley CSUA MOTD:Entry 10167
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2025/05/24 [General] UID:1000 Activity:popular
5/24    

2003/9/12 [Computer/Networking] UID:10167 Activity:nil
9/12    I asked this further down in the motd, but I'm really at a loss:
        how do you secure your 802.11b WAP?  Seems like MAC address limiting
        isn't that effective, because people can just sniff a working MAC
        address.  Also, WEP doesn't seem very good either.  Is it impossible
        to effectively secure one's WEP without doing something like IPSEC
        or installing your own firewall?
        \- so some smart people say it isnt enough to do end2end sec
           with insecure wireless. i am not quite sure what the threat
           is. it may be something along the lines of DoS the hub you think
           you are talking to, then masquerade as it [and dump traffic
           to break session keys offline] ... but this seems to be pretty
           high effort. anyone have an answer to 'what is wrong doing ssh
           over so-so security wireless" --psb
           \_ The WAP itself is still open to outsiders using your line.
        \_ My answer at home is simply put the wireless outside my firewall
           and treat machines on that net as foreign/hostile/untruster to my
           internal hosts.  Short of VPN/IPSEC, etc I haven't found a secure
           way I'd trust to put the wireless AP inside my firewall.  Please
           post if you or anyone else finds a non-VPN/IPSEC solution.
        \_ I think WEP should be fine.
           \_ Yes, I agree.  And changing it every so often augments the
              effectiveness.  There's no such thing as perfect security.  You
              just have to make it reasonably strong to make yourself a less
              attractive target and accept the tradeoffs.  If you think your
              MAC has been spoofed, will you still be able to get on the
              network if someone else is using your MAC?  If not, you know
              you've been compromised, so you know it's time to change your WEP
              key.  And yes, put up a firewall on each of your boxes connecting
              to the WAP if you don't have a dedicated firewall behind it.
2025/05/24 [General] UID:1000 Activity:popular
5/24    

You may also be interested in these entries...
2011/11/8-30 [Computer/SW/Security, Computer/SW/OS/Windows] UID:54218 Activity:nil
11/8    ObM$Sucks
        http://technet.microsoft.com/en-us/security/bulletin/ms11-083
        \_ How is this different from the hundreds of other M$ security
           vulnerabilities that people have been finding?
           \_ "The vulnerability could allow remote code execution if an
               attacker sends a continuous flow of specially crafted UDP
	...
2009/8/18-9/1 [Computer/SW/Database, Computer/SW/Languages/Perl] UID:53283 Activity:low
8/18    trying to write an intentionally slow regex.
        what is your worst regex ever?
        this is using MySQL regexp but I'll also accept
        perl format         --brain
        \_ you need to know how regex is implemented internally in order to
           have a worst regex in terms of running time. Something that uses
	...