Drive-by spam hits wireless LANs

Jared Mauch jared at puck.nether.net
Wed Sep 11 17:13:52 UTC 2002


On Wed, Sep 11, 2002 at 07:08:53PM +0200, John Angelmo wrote:
> Jared Mauch wrote:
> In some way you are right, but still I think it's even worse to use WEP 
> cause then the admins might think it's safe, it takes about 15 minutes 
> to crack a wepkey, so instead of drive-by spamming you could call it 
> drive-by, have a bagle, start spamming.

	I'm not trying to fix the underlying wireless encryption
option just provide a simple way that the manufacturers can ship
a 'more secure' out-of-the-box-product.

> The most hardware/software indipendent solution I have seen so far is 
> the use of VPN, simply place the WLAN outside your own LAN.

	Absolutely.

	There are a lot of things one can do:

	1) enable wep
	2) rotate wep keys
	3) authenticate by mac-address
	4) restrict dhcp to known mac-addresses
	5) force utilization of vpn/ipsec client

	Obviously not all of these solutions are available
in all cases, but in a home or small lan-environment a subset of
these will increase security (even if it's reinforcing the screen door
with 1/16" of balsa wood)

	- jared

-- 
Jared Mauch  | pgp key available via finger from jared at puck.nether.net
clue++;      | http://puck.nether.net/~jared/  My statements are only mine.



More information about the NANOG mailing list