Reply
 
LinkBack Thread Tools Search this Thread Display Modes
  #1   Report Post  
Old August 24th 04, 02:15 AM
Jack Twilley
 
Posts: n/a
Default

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

"N2EY" == n2ey writes:


[... wireless is cheap and portable but needs to be secured ...]

Jack If someone truly sets up their network in this manner, they are
Jack truly running a serious risk, as you describe. I've just moved,
Jack so I have to reinstall my network, and it will actually be set
Jack up with two wireless access points: one for the "inside", which
Jack will be MAC-restricted and locked down with WEP (until my
Jack operating system fully supports TKIP in which case I'll go up to
Jack that protocol), and one which is "outside" for any and all
Jack comers to sit in the nearby park and reach the internet. No
Jack traffic goes to the inside from the outside, and both sides can
Jack see the internet, so life is good.

N2EY Are WEP and TKIP sufficiently secure?

For my purposes, they are. WEP is known to be breakable, and TKIP
hasn't yet been properly tested, but those are the link-level
encrypted layers. 95% of what I do is done through a VNC session
tunneled through SSH -- the combination of WEP/TKIP and SSH is such
that I'm comfortable typing my GPG passphrase over the link.

Jack.
- --
Jack Twilley
jmt at twilley dot org
http colon slash slash www dot twilley dot org slash tilde jmt slash
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (FreeBSD)

iD8DBQFBKoi+GPFSfAB/ezgRAsx9AKDK6xFnjYZ8U27Pg28NiU9/R0YGzQCgzKc9
Roj2Viq0ikK3biziUqByKSE=
=jRtj
-----END PGP SIGNATURE-----
  #2   Report Post  
Old August 25th 04, 01:08 PM
N2EY
 
Posts: n/a
Default

In article , Jack Twilley
writes:

"N2EY" == n2ey writes:


[... wireless is cheap and portable but needs to be secured ...]

Jack If someone truly sets up their network in this manner, they are
Jack truly running a serious risk, as you describe. I've just moved,
Jack so I have to reinstall my network, and it will actually be set
Jack up with two wireless access points: one for the "inside", which
Jack will be MAC-restricted and locked down with WEP (until my
Jack operating system fully supports TKIP in which case I'll go up to
Jack that protocol), and one which is "outside" for any and all
Jack comers to sit in the nearby park and reach the internet. No
Jack traffic goes to the inside from the outside, and both sides can
Jack see the internet, so life is good.

N2EY Are WEP and TKIP sufficiently secure?

For my purposes, they are. WEP is known to be breakable, and TKIP
hasn't yet been properly tested, but those are the link-level
encrypted layers. 95% of what I do is done through a VNC session
tunneled through SSH -- the combination of WEP/TKIP and SSH is such
that I'm comfortable typing my GPG passphrase over the link.


Thanks for the advice, Jack. Will keep it in mind if I ever go to wireless
networking.

73 de Jim, N2EY
Reply
Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes

Posting Rules

Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are On


Similar Threads
Thread Thread Starter Forum Replies Last Post
BPL Powers On Phil General 0 August 26th 04 11:17 PM
What does "power up" mean? Doug Shields Boatanchors 22 September 29th 03 05:41 AM
Complex line Z0: A numerical example Roy Lewallen Antenna 11 September 13th 03 02:04 AM
Derivation of the Reflection Coefficient? Dr. Slick Antenna 104 September 6th 03 03:27 AM


All times are GMT +1. The time now is 11:48 PM.

Powered by vBulletin® Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
Copyright ©2004-2025 RadioBanter.
The comments are property of their posters.
 

About Us

"It's about Radio"

 

Copyright © 2017