Steve,

I actually offered two but maybe I made it sound like one. Cisco offers a
product that use EAP extentable autentication protocol (Dynamic WEP keys).
The problem with this product is that like a lot of things it is based on a
standard but is still proprietry so unless you made all of your customers by
cisco cards it will not work. This becomes hard as a lot of laptops are
coming out with wifi cards built in. You will have to excuse me a few things
may have changed it was a few months ago now that I had to do all my work
with wifi. Anyway I believe lucent had a feature that was in their new
firmware that checked the IV of the RC4 key before it sends any packet so
that it does not use any of the weak IV making its WEP more secure (airsnort
wepcrack attacks) this was compatabile with all other cards but as you can
guess if they aren't using the right card then transmission back to the base
station may still use the weak IVs. This also does not elimanate brute force
attacks and a few of the replay attacks. When I was talking to the vendors
one made mention of the fact that Windows XP supported EAP in the software
not in the firmware of the card. I have not test this but this might allow
for al vendors cards to be able to get dynamic wep keys.

There was also talk of wifi fixing up wep to make it more secure an I have
seen a few articles about WEP2 but I haven't read enough to comment on these
developments. The biggest problem we found was that all the vendors are
trying to fix the wep problem but in their own way and only seem to be
focusing on the AP style products not any of the point to point (base
station to base station) situation which I see as more of a problem as these
device normally are futhur a part and travel well outside organisations
property where many would be attackers could be listening. Where I live
there are a few ISP that use Wifi links to connect to their upstream
providers across the heart of the central business district. The scary thing
is they do not do any for of ipsec tunnel (or wep) and some of there well
know customers would be none the wiser that their traffic can be seen so
easily. But does it become the customers problem to look after security as
once those packets hit the internet people will be about to sniff them or
MIM.

Last note I have seen ISPs that use VPNs over the wireless segment

Ashley Woodbridge
CCNA CCNP
Network Systems
Stratagem Concepts

----- Original Message -----
From: "Steve Sobol" <[EMAIL PROTECTED]>
To: "Ashley Woodbridge" <[EMAIL PROTECTED]>
Cc: <[EMAIL PROTECTED]>
Sent: Friday, January 18, 2002 04:10
Subject: Re: Arp Spoofing with wireless networks


>
> At 07:11 AM 1/17/02 +1000, you wrote:
> >until we finish testing of Cisco ACS as this provides random dynamic WEP
> >keys that rotate regularly to over come some of the wep problems. But for
> >the total solution (if you don't have to worry about things like IPX)
would
> >be to run vpn client from the desktop to a vpn concentrator which is
> >correctly firewalled. This should make it as a secure as ipsec is any
where
> >else(probably no need to run wep at all if you run ipsec over the top).
>
> I should have clarified. You offered one solution, but at consumer ISP,
> vpns may not be the answer. are there any other good solutions?
>
>
>
> --
> JustThe.net LLC - Steve "Web Dude" Sobol, CTO      ICQ:
56972932/WebDude216
> website: http://JustThe.net  email: [EMAIL PROTECTED]  phone:
216.619.2NET
> postal: 5686 Davis Drive, Mentor On The Lake, OH 44060-2752  DalNet: ZX-2
>


Reply via email to