Author: Chris Gehlker Date: Subject: Guide to get cable modem working with debian
On Dec 31, 2003, at 8:59 AM, Chris Gehlker wrote:
> Where the manual isn't much help is in laying out some kind of
> decision matrix that would allow me to choose the appropriate level of
> security. I don't care if someone wants to park in front of my house
> and share my connection to the internet. I don't worry to much about
> them printing from my printer. I do care if they get into the shares
> on my desktop but I don't think the notion that some black hat is
> going to park outside house a capture every byte and then analyze them
> to discover our usernames and passwords. As another example, it is
> easy to set the MAC address of the iBook as the only one allowed on
> the network. Presumably, it is also very easy to forge MAC addresses.
> Then manual doesn't actually say that. One has to infer it from the
> fact that it goes on to discuss more expensive and presumably better
> security methods.
Duh. Responding to my own post. But sometimes the mere act of writing
down the question helps one see the answer. It dawned on me that some
of the cheap but weak security methods, like the MAC based access list,
only prevent write access to my network. It takes some pretty strong
encryption to prevent read access. The signals are *broadcast* after
all.
I still don't really know what level of security is appropriate for a
home office network.