OT: unathorized network user.

Tim ignored_mailbox at yahoo.com.au
Sun Jan 27 07:46:39 UTC 2008


Tim:
>> NB and NB well:  MAC filtering so your neighbour doesn't accidentally
>> connect is NOT a SECURITY issue.  It doesn't matter, at all, if they try
>> and connect when you've got good encryption.
   

Bob Goodwin:
> Encrypt what?  Where do I start implementing encryption?

The traffic.

You can use WPA2 encryption on the wireless hardware, with good
passwords/encryption keys.  I haven't recently gone looking to see if
there's an easy crack for this, it's a while since I had to deal with
securing someone else's network.  We cable things.  But going on prior
examples, I don't hold much faith in it being uncrackable.  Lesser, and
older, schemes are definitely no good, though (e.g. WEP).

Or, you can tunnel.  In this case, you need your access point to only be
*between* the remote wireless devices and some controllable network
device.  That other "controllable" part of your network is where you
apply the restrictions.  If your access point is also your internet
router, they'd have unfettered access to the internet.  You use an
encrypted tunnel through unencrypted networks.

-- 
(This computer runs FC7, my others run FC4, FC5 & FC6, in case that's
 important to the thread.)

Don't send private replies to my address, the mailbox is ignored.
I read messages from the public lists.




More information about the fedora-list mailing list