Dave, I use DHCPd on my home network, and assign IP only to a valid mac
address.  That ontop of the encrypted wireless should be plenty at home..  I
am not sure how the univ. runs their setup, but should give plenty
protection, alon with a firewall.

Bill Day

Linux 2.2.20-1tr i586
  8:10am  up 44 days, 13:45,  0 users,  load average: 0.00, 0.00, 0.00
We're still up at irc.openprojects.net @ #linux-users
or irc.freenode.net @ #linux-users
http://counter.li.org #83358
http://linux-sxs.org/

----- Original Message -----
From: "David Aikema" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Tuesday, February 18, 2003 2:33 AM
Subject: Wireless security


> I placed an order on an apple ibook last week and it's scheduled to be
> available for pickup midweek.  I'll be acquiring an airport (802.11b) card
at
> roughly the same time so that I can tap into the wireless network at
> university.
>
> I've been considering either acquiring one of those Linksys WAPs or a
Linksys
> wireless PCI card and hooking it up to my server so I can enjoy some
newfound
> portability around the house.  I had some rather poor experiences with
linux
> compatibility of linksys NICs before, but the drivers appear to compile on
my
> server.  Kurt: you mentioned in the Wireless networking SxS that you're
using
> some linksys wireless stuff.  Did you encounter any problems getting the
> cards to work properly?
>
> Anyways, one thing that has been bothering me is security.  Is it a little
> paranoid to be thinking that someone is likely to hack into a
WEP-encrypted
> (home) network? (WEP ain't exactly stellar encryption, but I understand
that
> you'd have to sniff the traffic for a while to be able to break through).
>
> I'm aware of NoCatAuth (http://nocat.net) which would appear to offer
> authentication support, but (a) it warns against the authenication server
and
> gateway being the same machine, and (b) ipchains support in NoCatAuth is
> borked according to the TODO file in the package and I don't feel any
urgent
> desire to update that machine.
>
> One other option that has come to mind is using some sort of (encrypted)
VPN
> tunnelling over the wireless connection.  Hopefully there's some easy way
to
> make this basically invisible to the end user after the initial setup.
Has
> anyone experimented with an approach like this?  Would something like this
> add much CPU overhead? (server is a p233 mmx).
>
> David Aikema
> _______________________________________________
> Linux-users mailing list
> [EMAIL PROTECTED]
> Unsubscribe/Suspend/Etc ->
http://www.linux-sxs.org/mailman/listinfo/linux-users
>


---
Outgoing mail is certified Virus Free.
Checked by AVG anti-virus system (http://www.grisoft.com).
Version: 6.0.449 / Virus Database: 251 - Release Date: 1/27/03

_______________________________________________
Linux-users mailing list
[EMAIL PROTECTED]
Unsubscribe/Suspend/Etc -> http://www.linux-sxs.org/mailman/listinfo/linux-users

Reply via email to