X-Account-Key: account1 X-UIDL: 38854 X-Mozilla-Keys: Return-Path: os2-wireless_users-owner@2rosenthals.com Received: from 192.168.100.5 (hawking [192.168.100.5]) by 2rosenthals.com (Hethmon Brothers Smtpd) id 20041221150655-5687-7 ; Tue, 21 Dec 2004 15:06:55 -0500 (Hethmon Brothers Smtpd) id 20041221150654-30624-7 ; Tue, 21 Dec 2004 15:06:54 -0500 Received: from mx1.mailhop.org ([63.208.196.170]) by mxout3.mailhop.org with esmtp (Exim 4.43) id 1CgqHv-000Cup-91 for os2-wireless_users@2rosenthals.com; Tue, 21 Dec 2004 15:07:19 -0500 Received: from waldorf.webpack.hosteurope.de ([217.115.142.71]) by mx1.mailhop.org with esmtp (Exim 4.42) id 1CgqHv-000GL6-0P for os2-wireless_users@2rosenthals.com; Tue, 21 Dec 2004 15:07:19 -0500 Received: by waldorf.webpack.hosteurope.de running Exim 4.34 using asmtp (TLSv1:RC4-MD5:128) from p5084a3b8.dip0.t-ipconnect.de ([80.132.163.184] helo=clanganke.de) id 1CgqHo-0002v5-TT; Tue, 21 Dec 2004 21:07:13 +0100 Message-ID: <41C88220.9080906@clanganke.de> User-Agent: Mozilla/5.0 (Windows; U; Win98; en-US; rv:1.0.0) Gecko/20020530 X-Accept-Language: en MIME-Version: 1.0 References: <41C79385.7000104@2rosenthals.com> In-Reply-To: <41C79385.7000104@2rosenthals.com> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-Mail-Handler: MailHop by DynDNS.org X-Spam-Score: -2.6 (--) Date: Tue, 21 Dec 2004 21:05:52 +0100 Sender: os2-wireless_users-owner X-Listname: os2-wireless_users@2rosenthals.com Reply-To: os2-wireless_users@2rosenthals.com From: Christian Langanke To: os2-wireless_users@2rosenthals.com Subject: [OS2Wireless] OS/2 Wireless FAQ X-List-Unsubscribe: Send email to mailusers-request@2rosenthals.com X-List-Owner: mailusers-owner@2rosenthals.com Lewis, great collection of information! For now I just som minor points, I have to think about more questions later on: - AFAIK the "24-bit header" of WEP is called the initialization vector, which should be a random number forr each frame. One of the biggest vulnerabilities of the WEP protocol is that many vendors don't implemment that as a random number, but just count up from zero - Concering the dynamic 24-bit part and the static part please add a point about "open Systems" and "shared Key Systems", this topic is also referred to "authentication". If set to"shared key" on behalf of the access point, the client would need to authenticate itself, unfortunately this is done with the static parts of the keys only (!!!), without any initialization vector. The drawback of this is that alone this authetication makes the WEP method even more unsafe and easier to crack, so it strangely makes a WEP secured access point more safe when this authetication is turned of or set to "open system". - as stated in my documentation, please add something like "always use encrpytion when accessing private WLans" and "better use 64-bit or _any_ WEP encryption than none". The user should be told to change the keys periodically. The more data is sent over WEP encrypted WLAN, the quicker it can be cracked. With medium to heavy throughput WEP64 can be cracked after some hours, WEP128 may need some days. For an average user, just surfing a bit in the evening, as a rule of thumb I would suggest a week for a change of WEP128 keys, and half a week for WEP64. I don't do that myself, and I am almost certain that nobody does that, but it is important to know that it is _unsafe_ not to do so. Furthermore, in Germany it is at least illegal to get into a WEP secured private WLAN. If that is the case, it may even make sense to set any key and never change it anymore... - topic 6: there is a term of "infrastructure mode" and at least another one.I think this would fit in here - topic 7: I would turn the question around: Is an access point a router ? - topic 8: SSID is AFAIK also referred to as System Service Identifier - topic 10: please include that with certain WLAN sniffer software (either Win32 or linux ?) the SSID can still be spyed out even if broadcast is turned off. IMHO this is very important to know, else users would get a false idea of security they would establish. Nevertheless it is still a good idea to turn off SSID broadcast for a private WLAN AP, to make it not too easy for hackers. - Please include a section on MAC address filtering. Unfortunately also this can be spyed out by software like stated above for SSID, but also this should be enabled. It makes it at least not possible for a drive-by surfer to instantly get a connection. Isntead, he would need to spy out a MAC address, and come back another time to wait until this is not active while the AP is active, so that he can use this MAC addess. bye, Christian ------------------------------------------------- Christian Langanke COS2E & CWSE Team OS/2 Ruhr e.V. cla@clanganke.de =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= To unsubscribe from this list, send a message to steward@2rosenthals.com with the command "unsubscribe os2-wireless_users" in the body (omit the quotes). For help with other commands, send a message to steward@2rosenthals.com with the command "help" in the body (omit the quotes). This list is hosted by Rosenthal & Rosenthal P.O. Box 281, Deer Park, NY 11729-0281. Non- electronic communications related to content contained in these messages should be directed to the above address. (CAN-SPAM Act of 2003) =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=