The days of relying on WPA or WPA2 as your online layer of wireless security may be numbered. A new technique that makes use of NVIDIA’s newer GPU’s to do some of hte processing means that it’s possible to break “forgotten” keys about 100 times faster than was previously possible. This means a key could be broken in days or weeks instead of years. The distributed password recovery software is available here. I think there are a lot of misconceptions about WEP and WPA/WPA2 that we ought to rethink.
Tag: wpa
-
Wiring
I’ve got a home project to run more network cable here lately and found techtoolsupply to be an interesting resource for network and other cabling supplies. I don’t recall who I ordered from last time, it’s been several years (and those big spools of cable last for years unless you do a LOT of cabling.) On other notes…. There are many very good do it yourself wiring resources from electrical like this link to network wiring. Many people think that wireless means that it’s just backwards to install network cabling. (I don’t know how many people told me “why don’t you just use wireless” when I mentioned that when we built I wanted to get cat5 cable installed.) Well – here goes – wired is 1)faster and 2) more secure – yes I’ve heard of WPA for wireless, but my wired lan is between 10 and 100 times faster than my current wireless (yes, I’m running 802.11b still and an upgrade to the wireless wouldn’t get it up to the same speed yet either. then my wired network would be 2-20 times faster. (Of course that’s best case – clear line of sight to the wireless access point.)
-
Is the firmware current?
The other day I was struggling with something that should have worked “out of the box”. It was a little wireless bridge (Linksys WET54G Wireless-G Ethernet Bridge). The idea was to just connect it to the pc and it would just work. Well…. in a word NO. It “sort of worked”, the problem is the pc didn’t receive the dhcp address, so I had to manually set it. I didn’t know the correct gateway information (should it be the bridged device ip or the REAL gateway.) At one point I got dns lookups working, but routing to the internet was not working, then the access point got pulled off a shelf and EVERYTHING stopped working. Checking in on the bridge would show it was just cycling through the WPA handshake process over and over and over.
-
The D-Link DWL-800AP+ as a wireless repeater to extend wireless range – Part 4
Ok, so now I had to add the new D-Link’s MAC address to the list of authorized MAC’s in the Linksys WAP11 (v. 1.1) For this, I call on wap11gui. Used to (since I use linux), I would have to suffer through a Windows boot on the laptop and balance the laptop on the edge of the bed and connect through usb to the linksys… now I can just administer it from my desk. Nice… Anyway, I log into that and Visit the “security” tab and “Authorized Mac”, and add the d-Link DWL-800AP+ to the list.
-
Network Security guide for the home or small business network – Part 7 – Wireless Networking
OK – the last couple of entries got into some heavy lifting and some real learning on your part. Learning about what software needs to run, what services are running, updating them to keep current on security patches. We even talked about securing services listening for outside connections and limiting them to what is absolutely necessary. Now we’ll take a deep breath and get into another area… Wireless network security.
-
More on Wireless networking security
Sunbeltblog has a flurry of posts today. This one muses on wireless networking (in)security. One of the points that they make is that there are “acceptable” levels of security depending on your circumstance. In other words, if you’re miles from nowhere and feel comfortable with WEP (which is breakable) fine.