What is risk to use non-encrypted wireless network? Thanks

Operating System, Common Application & ThinkPad Utilities Questions...
Post Reply
Message
Author
mike20030405
Freshman Member
Posts: 104
Joined: Mon Jul 09, 2007 5:24 pm
Location: Vancouver, Canada
Contact:

What is risk to use non-encrypted wireless network? Thanks

#1 Post by mike20030405 » Thu Aug 16, 2007 8:02 pm

I set the router only allow my wireless adapter(with MAC address) to connect, coz my SUSE10.1 on Armada M300 doesn't work with encrypted network.
Now I am gonna use T60 XP, I do worry about the safety of wireless network. Any suggestion?
T61P 14.1'' SXGA+ 100G HD 2G RAM
T60 14.1'' SXGA+ 80G HD 2G RAM
Compaq Presario 5600
Compaq Armada M300

Wiz
Junior Member
Junior Member
Posts: 474
Joined: Sat May 13, 2006 6:07 am
Location: Norway

#2 Post by Wiz » Thu Aug 16, 2007 9:51 pm

You really have to decide for yourself if that is ok or not, but mac filter is really easy to bypass. Since the mac-adresse is sent in clear-text anyone can use a sniffer to see your mac-address and use that mac-address to be able to connect to your wireless. This can easily be done in a couple of minutes or less. Of course if someone connect to your wireless at the same time you are connected with the same mac-address that would cause problems for both of you, but while you are not using the wireless they could use if for free without any problems. I would say that mac-filter is one of the least secure options.
WPA2 or WPA1 with a long pre-shared key should be pretty secure and if not supported i guess 128bits WEP is enough for most people. WEP is in theory pretty easy, but time consuming to break. 64bits WEP is much faster to break then 128bits WEP.
If you have a lot of close neighbors or others that is close enough to use your wireless it might be of your interest to secure the wireless better then using mac-filter. If you live in a house far from other people you might find it unnecessary, but you really have to decide for yourself how much security you need.

I would recommend WPA2 as explained above or WPA1 if WPA2 is not supported. Those should be pretty secure. If neither is supported by your equipment WEP128 would be the next option. Also if supported by your equipment you could decrease the signal strength. That way they have to be closer to your wireless access point for the signal to be good enough to connect. It could be used in combination with mac-filter if you want that as well, but using WPA1/2 or WEP i cannot see any good reason to use mac-filter as well since it's so easy to bypass.

Some more advanced access points have the option to use EAP/802.1x where you have to authenticate to connect and the keys are dynamic and different each time you connect. Could also be configured to change the keys at a certain interval. That way you don't have enough time to break the keys before they are changed and make it very hard to get unauthorised access. I don't think most people really need that kind of security at home though.

Toe
Freshman Member
Posts: 110
Joined: Mon Nov 22, 2004 3:34 pm
Location: PA,USA
Contact:

#3 Post by Toe » Fri Aug 17, 2007 1:13 pm

Really depends on where you live. I've setup wireless networks for friends/work in many different locations. I usually follow these guidelines:

1.)Remote location. (ie. a farm with nobody for miles) No security.

2.)Small town. (ie. 1 stop light and a sheetz) MAC address Filtering

3.)Large town/College dorm (ie. More wireless networks then you've ever seen before) 64/128 WEP,MAC filtering, Decreased Signal strength...depending on router/location

If someone really wants on your network, You can not stop them...only slow them done. I'll usually check out the other local networks, and go a step up on security compared to everyone else.

-Toe

khyew
Posts: 9
Joined: Wed Aug 01, 2007 6:13 pm
Location: Ottawa Canada

#4 Post by khyew » Fri Aug 17, 2007 1:33 pm

@Toe: Why would you set your scale your security features based on your location? It's not as if enabling WEP/WPA is a difficult task or burden on the network. If you have it, you might as well use it. Better than needing it and not having it.

As well, MAC address filtering is probably more time-consuming to set up than WPA/WEP. Sharing a password is much faster than determining and entering all of your NICs' MAC addresses into the router configuration.

As for stopping attackers, WPA does a *very* good job at stopping even determined crackers. The only method known to work reliably against WPA is a brute-force passphrase attack. Have a good passphrase with WPA and you should be fine.

@mike: MAC filtering will work adequately against casual drive-by surfers and leeching neighbors. Most people don't know how to spoof MAC addresses.

Why doesn't your Armada work with network encryption? Linux has both WEP and WPA support and all 802.11 cards support at least WEP.

Kyocera
Moderator Emeritus
Moderator Emeritus
Posts: 4826
Joined: Wed Aug 10, 2005 8:00 pm
Location: North Carolina, ...in my mind I'm going to Carolina.....
Contact:

#5 Post by Kyocera » Fri Aug 17, 2007 1:51 pm

1.)Remote location. (ie. a farm with nobody for miles) No security.

2.)Small town. (ie. 1 stop light and a sheetz) MAC address Filtering

3.)Large town/College dorm (ie. More wireless networks then you've ever seen before) 64/128 WEP,MAC filtering, Decreased Signal strength...depending on router/location
this is actually a pretty good general guideline. If you live far enough out like I do, no one receives your broadcast. Change your channel from the default. But just for the heck I do use a wep key. Anywhere people can access you need to lock it down, the level of encryption is up to you, also change your default workgroup, and of course there are more ways than just the wireless router to secure your network. Don't use admin account, change the name of your admin account, blah, blah, blah, any mcse manual goes over this stuff, or do a google.

Some people may use your AP briefly just to check their email if they are driving by, used to do this a lot myself, but as a network guy i have gone into places like lawyers, doctors, real estate co. that were wide open and had no idea what was going on, pretty amazing.

khyew
Posts: 9
Joined: Wed Aug 01, 2007 6:13 pm
Location: Ottawa Canada

#6 Post by khyew » Fri Aug 17, 2007 2:10 pm

Does your router support SSID hiding? You can use that to mask your network to all but those persistent enough to use packet sniffers.

Toe
Freshman Member
Posts: 110
Joined: Mon Nov 22, 2004 3:34 pm
Location: PA,USA
Contact:

#7 Post by Toe » Fri Aug 17, 2007 2:28 pm

khyew wrote:@Toe: Why would you set your scale your security features based on your location? It's not as if enabling WEP/WPA is a difficult task or burden on the network. If you have it, you might as well use it. Better than needing it and not having it.
Thought the whole "farm" comment would have given it away. :wink: If I setup for someone, its because they can't do it themselves. If they can't setup a wireless access point.....no chance of adding a key to each new machine they add.

I'm not being lazy at their expense, if the extra steps are needed, they get it. (and I get called when they need another machine added)
this is actually a pretty good general guideline.
Thanks. Its not 100% accurate (like the 802.11N router I found in an old folks home before the standard was popular).......but overall works fine.

-Toe

Wiz
Junior Member
Junior Member
Posts: 474
Joined: Sat May 13, 2006 6:07 am
Location: Norway

#8 Post by Wiz » Fri Aug 17, 2007 3:38 pm

Toe wrote:If someone really wants on your network, You can not stop them...only slow them done. I'll usually check out the other local networks, and go a step up on security compared to everyone else.
Based on what information do you say that? It's not like i'm saying it's completely impossible to break because that i cannot say, but if you really know that WPA2 can be broken as easily as it sounds you seems to know something most security people missed. Unless you know for sure and can explain or refer to some documentation about security issues with WPA2/AES and how they can be exploited you cannot make such a statement. I presume WPA2/AES it's setup correctly of course when using this as an example of a secure wireless network. I work with this for a living and most security people i know or talked to cannot make a statement like yours that a wireless network cannot be secure and only slow down the hackers. Neither have i ever read something to confirm such a statement. I'm not saying it's completely impossible though because that i could never prove and you cannot really use the word impossible for anything related to network security.

Also in theory things is often a bit different. Like WEP is not defined as secure anymore, but could be pretty secure using dynamic keys. Also using a static 128bit WEP key it could easily be broken in less then 20 minutes in theory, but i never seen anyone do it that fast and never managed to do it that fast myself. I wasn't even close to the theoretically 15-20 minutes. Even if WEP is defined as not secure very few people actually know how to break the WEP key and is only able to do it because there are software available that do the job for them. I have never seen any software that break WPA2/AES that is confirmed to be working and also able to finish the job before i die of age.

Also for the mac filter you normally doesn't need to know how to spoof a mac adress since a lot of network cards have this option from device manager in windows where you can simply specify a new mac address. That way almost no knowledge is required ot change the mac.

arni
Sophomore Member
Posts: 244
Joined: Wed Sep 13, 2006 6:44 am
Location: Germany

#9 Post by arni » Sat Aug 18, 2007 7:32 am

I would say that every unsecured wireless lan is a potencial risk and i would suggest everybody to turn on and use WPA or WPA2 protection (go with WEP when there are devices that cannot handle these two encryptions). It's not only that there might me someone trying to get on your network but overall security measures but the confidence that your data will stay safe! Think about this analogy: Would you leave your doors open all the time so everybody can enter your house, just because you live on a farm and there's nobody near you?

I don't know how it's handled in the US but here in Germany you can get into big trouble and get sued if you willingly don't secure your wireless network and someone breaks in.

And forget about all the myths with WEP, MAC filtering and other stuff. At this time the only secure method to prevent you from attacks is WPA.

Kyocera
Moderator Emeritus
Moderator Emeritus
Posts: 4826
Joined: Wed Aug 10, 2005 8:00 pm
Location: North Carolina, ...in my mind I'm going to Carolina.....
Contact:

#10 Post by Kyocera » Sat Aug 18, 2007 1:38 pm

wiz wrote:Based on what information do you say that? It's not like i'm saying it's completely impossible to break because that i cannot say, but if you really know that WPA2 can be broken as easily as it sounds you seems to know something most security people missed.
Wiz, I don't believe Toe is implying that at all, but the fact does remain that wired is far more secure than wireless, it's a no brainer, if no one can physically access a network then there is zero margin for error. If someone can access your network, they can crack it.
From an Article wrote:Wireless networking has also been deemed too risky for the 2008 Olympics. There will be no wireless used among the core systems of the Olympic Games, said Leon Xie, director of Olympic technology and sponsorship at Lenovo. All networking will take place over wire lines, including the backup system.

Wiz
Junior Member
Junior Member
Posts: 474
Joined: Sat May 13, 2006 6:07 am
Location: Norway

#11 Post by Wiz » Sat Aug 18, 2007 3:39 pm

Kyocera wrote:Wiz, I don't believe Toe is implying that at all, but the fact does remain that wired is far more secure than wireless, it's a no brainer, if no one can physically access a network then there is zero margin for error. If someone can access your network, they can crack it.
Well maybe i didn't really understand what he tried to say, but his exact words: "If someone really wants on your network, You can not stop them...only slow them done.". That make it sound far less secure then it actually is. Using WPA2/AES setup correctly my opinion is that you can stop and not only slow them down.....until someone prove me wrong :) But i'm well aware of the difference between wireless and wired which will always make wireless less secure because of the physical requirements....at least in theory. Maybe someone find some issues with WPA2 as well some day so they prove that WPA2 isn't that secure after all, but now there is really no such proof. Also if you hear about someone that manged to get unauthorised access to a wireless network it's important to check the deails before claiming that wireless isn't secure. A lot of companies use 802.1x authentication to access the wireless network integrated with active directory and use a very weak password policy. In that case you cannot really blame it on the wireless if they got access using brute-force or lucky guess.....a chain is no stronger than its weakest link. So using WPA at home the pre-shared key/password is important and should preferable be long and cryptic.

From an Article wrote:Wireless networking has also been deemed too risky for the 2008 Olympics. There will be no wireless used among the core systems of the Olympic Games, said Leon Xie, director of Olympic technology and sponsorship at Lenovo. All networking will take place over wire lines, including the backup system.
I can fully understand that the olympics prefer the most secure option even if they cannot really prove why wireless isn't secure enough when setup correctly. I can only imagine what would happen if they used wireless and someone managed to get access and caused damage. That would be a scandal, but not many people can compare them self to the Olympics when we talk about security requirements/needs. A lot of companies neither want wireless because the risk is so much higher then the requirements/need for wireless.

GomJabbar
Moderator
Moderator
Posts: 9765
Joined: Tue Jun 07, 2005 6:57 am

#12 Post by GomJabbar » Sat Aug 18, 2007 6:50 pm

From an Article wrote:Wireless networking has also been deemed too risky for the 2008 Olympics. There will be no wireless used among the core systems of the Olympic Games, said Leon Xie, director of Olympic technology and sponsorship at Lenovo. All networking will take place over wire lines, including the backup system.
The statement above can be taken two ways. Either wireless networking is too risky from a security point of view or to risky from a reliability and compatibility point of view. The absence of surrounding text or a citation leaves some doubt.
DKB

Kyocera
Moderator Emeritus
Moderator Emeritus
Posts: 4826
Joined: Wed Aug 10, 2005 8:00 pm
Location: North Carolina, ...in my mind I'm going to Carolina.....
Contact:

#13 Post by Kyocera » Sat Aug 18, 2007 7:00 pm

dave wrote:The statement above can be taken two ways. Either wireless networking is too risky from a security point of view or to risky from a reliability and compatibility point of view. The absence of surrounding text or a citation leaves some doubt.

Correct, and in my experiences setting up wireless networks and tearing them (figuratively) out for companies, it's both :) Naive business owners look to wireless to avoid costly cable run fees, after numberous calls (to people like me) to get their poorly configured wide open access network back on line they eventually go to hardwire.

I'll reread the article, I kind of glaze over things sometimes :beer: :beer:

edit: after re reading there is no real context to draw from other than the discussion of instability of Vista, so I can't interpret the word "risky" via anything, so it is open for interpretation. I have to go with my experience, it's risky in both aspects, security and stability.

Toe
Freshman Member
Posts: 110
Joined: Mon Nov 22, 2004 3:34 pm
Location: PA,USA
Contact:

#14 Post by Toe » Mon Aug 20, 2007 1:00 pm

Wiz wrote:
Kyocera wrote:Wiz, I don't believe Toe is implying that at all, but the fact does remain that wired is far more secure than wireless, it's a no brainer, if no one can physically access a network then there is zero margin for error. If someone can access your network, they can crack it.
Well maybe i didn't really understand what he tried to say, but his exact words: "If someone really wants on your network, You can not stop them...only slow them done.". That make it sound far less secure then it actually is. Using WPA2/AES setup correctly my opinion is that you can stop and not only slow them down.....until someone prove me wrong :)
I suppose my statement goes back to the old thief comparison, "If they really want to break into your house...no security system will stop them". (Goes well with cars too) Basically the same as my quote above. Now I'm not trying to say its hopeless! Just that there is no way to have 100% protection. Given the reaction, I'd say that statement was outside the bounds for this topic...and I withdraw it.

And for the record, Yes we do sometimes leave our doors unlocked in PA. :wink:

-Toe

tomh009
Moderator Emeritus
Moderator Emeritus
Posts: 3021
Joined: Wed Feb 23, 2005 3:30 pm
Location: Kitchener, ON

#15 Post by tomh009 » Mon Aug 20, 2007 2:21 pm

Wiz wrote:I can fully understand that the olympics prefer the most secure option even if they cannot really prove why wireless isn't secure enough when setup correctly. I can only imagine what would happen if they used wireless and someone managed to get access and caused damage. That would be a scandal, but not many people can compare them self to the Olympics when we talk about security requirements/needs. A lot of companies neither want wireless because the risk is so much higher then the requirements/need for wireless.
For the olympics, I expect that the main reason they are using wired networking is not security, but, rather, guaranteed availability. You just can't lose your network connection while judging platform diving -- there is no second chance. :)

As for security, there is no guarantee that someone won't snoop on your wired network as well, although it's considerably more difficult, meaning that you'd have to have some high-value data to make it worth someone's while to attempt that.
X220 (4287-2W5, Windows 8 Pro) / X31 (2672-CXU, XP Pro) / X61s (7668-CTO, Windows 8 Pro)

LB_BlueVue
Posts: 33
Joined: Sun Jul 08, 2007 6:41 pm
Location: Los Angeles, CA

#16 Post by LB_BlueVue » Tue Aug 21, 2007 2:38 am

Wiz wrote:I can fully understand that the olympics prefer the most secure option even if they cannot really prove why wireless isn't secure enough when setup correctly. I can only imagine what would happen if they used wireless and someone managed to get access and caused damage. That would be a scandal, but not many people can compare them self to the Olympics when we talk about security requirements/needs. A lot of companies neither want wireless because the risk is so much higher then the requirements/need for wireless.
Also consider that an attacker could take out a wireless network simply by jamming the frequencies of the network; it wouldn't matter how secure the encryption.
T60p - 15.4" WSXGA+ - T7200 Core2 Duo - 3Gig/100Gig - Atheros a/b/g/n - XP Pro - TPfancontrol

Wiz
Junior Member
Junior Member
Posts: 474
Joined: Sat May 13, 2006 6:07 am
Location: Norway

#17 Post by Wiz » Tue Aug 21, 2007 10:19 am

LB_BlueVue wrote:Also consider that an attacker could take out a wireless network simply by jamming the frequencies of the network; it wouldn't matter how secure the encryption.
Of course wireless is more vulnerable because it's radio so that is a possibility and pretty easy with the right equipment. I don't think i ever heard about any case where someone used such equipment to take down a wireless network though (I'm not saying it never happened) so it's pretty hypothetical. Like if you know what you are doing it's pretty easy to take out the power in a building or take down the phone lines. There is no limits what you can worry about if you are paranoid enough.
Also unless i'm wrong mike that started this thread is using wireless at home so the chance that someone would like to spend that much time breaking his wireless network is not very likely. I have the impression that he is most concerned about securing the network so no one could access his network and the equipment connected to his network at home. If someone attack a wireless using such equipment i think they do it for a purpose like to cause damange for a company or steal data.....i don't think mike would be a target for such an attack. If his home network is that critical to secure he would probably never used just mac-filter in the first place.
For the Olympics though it more likey that someone could do such an attack and absolutely something they should consider before they use wireless at the Olympics.

Post Reply
  • Similar Topics
    Replies
    Views
    Last post

Return to “Windows OS (Versions prior to Windows 7)”

Who is online

Users browsing this forum: No registered users and 0 guests