Sunday, May 31

Home and SOHO Wireless LAN security

Level 1: Home and SOHO Wireless LAN security

Unfortunately, a lot of home users are either using a few old equipment, older drivers, or older operating systems that do not natively confirm WPA and then it's still using WEP whenever anything in the least.  WEP encryption was believed to be good since a week for easiest traffic home wireless networks because the older WEP cracking tools took 5 to 10 million packets to find a WEP key, but the latest WEP cracking methods can break down WEP in minutes.  Still if there isn't that a lot traffic, the attacker instantly has got ways to unnaturally generate traffic and speed up WEP cracking.  As of this, consumers had better keep off whatever product that doesn't support WPA TKIP mode at a minimum but rather WPA AES capable or WPA2 certified devices.

If they have got WEP single devices, check on the seller to check whenever there is any firmware and/or device driver updates that will upgrade the device to WPA mode. If not, anybody who concerns about privacy should throw away those devices.  As harsh as that may sound, it is comforting to know that newer Access Points and Client Adapters that do support WPA can be purchased for as little as $30. Customer side Wireless local area network software system (officially called Supplicants) also need to be updated to support WPA or WPA2.  Windows XP SP1 with the WPA patch can answer, but Windows XP SP2 is highly recommended.

The home or SOHO (Small Office Home Office) surroundings are really unlikely to have any rather Authentication and PKI in place.  This may change once TinyPEAP gets established, but that is currently in BETA form and isn't fix for quality time yet.  TinyPEAP puts a PEAP authentication server and PKI Certificate Authority in your home's WLAN enabled Linksys Router which was once the single area from large organizations with committed authentication servers.  For the moment, the only workable choice for this environment is WPA PSK (Wi-Fi Protected Access Pre-Shared Key) mode.

WPA mode mandates TKIP at a minimum but also has an optional AES encryption mode.  AES mode is highly recommended since it's a rock solid origin in cryptographic resistance where as TKIP may be under attack in the near later.  Annotation that AES in WPA2 (full ratified edition of 802.11i) are no more optional and are mandated nowadays.  Since most home users would be lucky if totally from their equipment and software system was TKIP capable, most homes will accept to be content with TKIP mode for now.

WPA PSK mode could be an good security system mechanism but leaves many to be desired in terms of usability.  This is because WPA PSK can be cracked on offline dictionary attacks and then them trusts on a strong random passphrase to be powerful.  Unfortunately, human race are really bad at learning long random string section from characters and will nearly always to use simple to think of words and phrases or a few slight variation from that.  This brings itself to dictionary attacks wherever a hacker will try every variation of all combination of words in the dictionary.

To create this really difficult to hack, use a 10 digit string by random characters contained of a-z, A-Z, 0-9 or apply a very long word phrase assembled by 20 or more characters.  Unfortunately, this will force a lot of users to write down their passphrases which in itself may lead to passphrase theft.  WPA PSK isn't a good long term security system solution and leaves Level 1 security system with much to be desired, but it can be secure when used correctly.

0 comments:

Post a Comment

 
 
Copyright © Wifi Antenna
Designs By Bhambank Mbambong Blog