Hello again forum! I asked my parents for a Wireless Access Point for Christmas. As you all know, by default these things are very insecure. I have been doing a lot of reading on how to make wireless secure and there seem to be two main ways, WEP encryption and VPN. I have an OpenBSD router and I heard that makes VPN really easy and I hear that WEP is really easy to hack. So it seems like the most easiest and best thing to do to make my Wireless Access Point secure is to firewall it behind a VPN. What do you all think? I will be using it with a laptop running Gentoo GNU/Linux.
Announcement
Collapse
No announcement yet.
Creating a secure home wireless network
Collapse
X
-
Wireless Networking Basic Security Checklist
Home User version
http://www.wardrivingcentral.org/WLAN_Sec_Home_v1.html
-
Originally posted by kidlinuxI asked my parents for a Wireless Access Point for Christmas.
I have been doing a lot of reading on how to make wireless secure and there seem to be two main ways, WEP encryption and VPN. I have an OpenBSD router and I heard that makes VPN really easy and I hear that WEP is really easy to hack. So it seems like the most easiest and best thing to do to make my Wireless Access Point secure is to firewall it behind a VPN.
I don't think you realize what a headache VPNs are to configure. There are plenty of tools out there to simplify VPN configuration, but it will still be significantly harder than configuring WEP.45 5F E1 04 22 CA 29 C4 93 3F 95 05 2B 79 2A B0
45 5F E1 04 22 CA 29 C4 93 3F 95 05 2B 79 2A B1
[ redacted ]
Comment
-
I'd go a step further and actually segment your wireless traffic off of your LAN and put it into some sort of DMZ. The simple home way of doing this would to be to wire your AP up to its own port on your *BSD firewall, then write a ruleset to govnern it. Then when you are on your wireless computers, VPN into your own LAN. This way your computer can access the resources it needs in a secure manner and your LAN is protected from anyone who happens to be hanging out on your wireless. Heck, I'd just leave the WiFi with unrestricted Inet access and deny all traffic from it into your network. You can VPN in to your LAN, and anyone who wants to 'borrow' your connection can't do anything but hit the net.
I return whatever i wish . Its called FREEDOWM OF RANDOMNESS IN A HECK . CLUSTERED DEFEATED CORn FORUM . Welcome to me
Comment
-
My Take
WEP, MAC filtering, and don't broadcast SSID.
Hiding SSID keeps those eveil frive by lan jackers like ck3k from hitting your network.
MAC filtering means only approved MAC adresses can connect.
WEP keeps everything encrypted. Its' not teh best, but combined with MAC filtering, it makes MAC hacking a lot harder becase you have two simltanious levels at the same time.
Anyone that get's past all three, has mad skills and will get past anything anyway, and has probably already owned your network from the main broadband feed.--Shatter
"People demand freedom of speech to make up for the freedom of thought which they avoid."
- Soren Aabye Kierkegaard (1813-1855)
Comment
-
Originally posted by noidI'd go a step further and actually segment your wireless traffic off of your LAN and put it into some sort of DMZ.
What I find works well as a basic set of things to do when configuring a new AP is essentially the following:
- Check for firmware updates as soon as you get the AP home, and apply them as necessary.
- Enable WEP at 128-bit only and use cards capable of 128-bit encryption.
- Enable MAC address controls so that only your wireless cards are allowed to connect to the AP.
- Change the default password, and make sure that remote administration is only enabled on the inside. If your router supports it, specify that administration should only be from the wired network.
Taken alone, none of these are particularly strong methods of protecting your AP - but in combination, they'll keep it pretty well locked down.
Comment
-
Thanks for all the great advice everyone! I will probably use combination of 128 bits WEP, MAC address filtering, and VPN technologies to keep my wireless network secure from intrusion.
As for 802.11g advices I am getting Linksys WAP11 probably, and I already have 802.11b SMC card. Besides I don't need 54mbps I will just be doing IRC and ssh and maybe a little web browsing
Comment
-
Originally posted by kidlinuxThanks for all the great advice everyone! I will probably use combination of 128 bits WEP, MAC address filtering, and VPN technologies to keep my wireless network secure from intrusion.
As for 802.11g advices I am getting Linksys WAP11 probably, and I already have 802.11b SMC card. Besides I don't need 54mbps I will just be doing IRC and ssh and maybe a little web browsing
Yeah yeah yeah...and no one will ever need more than 64k of RAM.
Anyway...this is the way to go:
http://www.linksys.com/products/prod...id=35&prid=565perl -e 'print pack(c5, (41*2), sqrt(7056), (unpack(c,H)-2), oct(115), 10)'
Comment
-
Originally posted by kidlinuxOMG Chris that costs $200 LOL my parents aren't going to get me that. Besides I already have an OpenBSD router and that would let me set up VPN firewall. WAP11 is only like $40
I will grant that the WRV54G is more than you NEED. The steps Shatter mentioned are enough on pretty much ANY home wireless network...but hey...enough isn't good enough for me. ;)
BTW, I recently replaced my WAP 11 with the WRV54G. It rocks the house...but full step by step instructions for dummies locking down the WAP 11 with screenshots can be found here:
http://www.worldwidewardrive.org/linksys/linksys1.htmlperl -e 'print pack(c5, (41*2), sqrt(7056), (unpack(c,H)-2), oct(115), 10)'
Comment
-
Originally posted by kidlinuxAs for 802.11g advices I am getting Linksys WAP11 probably, and I already have 802.11b SMC card. Besides I don't need 54mbps I will just be doing IRC and ssh and maybe a little web browsing
The main impetus for me to upgrade from the WAP11 to the WRT54G was that I have two machines that are exclusively wirelessly-networked, and moving a couple of gigabytes of data off of one of them meant that the other could barely sustain an SSH session. Remember that these things don't perform any sort of QOS, so bandiwdth hogging is an issue.
Also, while you may not want 802.11g now, there's a good chance you might in the future. At least getting the g-capable AP gives you that option without having to replace it at a later date.
Comment
-
Ya..I can tell ya, moving things over 11mb (of course, sustained throughput is much lower) is painful. I frequently download things like linux ISOs on my laptop then have to send them to the burner, sending the ISO to the burner frequently takes twice as long as it does for me to actually burn it to disk.
I return whatever i wish . Its called FREEDOWM OF RANDOMNESS IN A HECK . CLUSTERED DEFEATED CORn FORUM . Welcome to me
Comment
-
Originally posted by ck3kNow god dammit, don't make me come find you shatter ;)
You'll need a LOT of gas and tires to find my network dude...--Shatter
"People demand freedom of speech to make up for the freedom of thought which they avoid."
- Soren Aabye Kierkegaard (1813-1855)
Comment
Comment