On Wednesday, December 31, 2003 9:31 AM, Chris Gehlker wrote:
> I still don't really know what level of security is appropriate for a
> home office network.
You may not care if someone accesses the data on your laptop or uses your
Internet connection for surfin' p0rn, but what if they use your wireless
connection for some nefarious activity (e.g. sending SPAM, or cracking
someone else's box, or launching a virus). That activity could possibly be
traced back to your IP address, and trying to explain to the authorities
that it really wasn't you that defaced John Ashcroft's web site could be an
annoying waste of time. :)
I found the following 3 articles to be interesting and enlightening:
http://www.cs.umd.edu/~waa/wireless.pdf
http://www.arstechnica.com/paedia/w/wireless/security-1.html
http://www.oreillynet.com/pub/a/wireless/2002/04/19/security.html
At the minimum, I would say that you should turn off SSID broadcast, enable
128-bit WEP and turn on the MAC address filtering. Yes, these measures can
be defeated (easily so by someone that knows what they're doing), but they
are "better than nothing." I also change my SSID once a week, and, since I
only need to use the wireless capability when I'm using my laptop in the
evening, I only enable the wireless functionality on my router when I want
to use it and turn it off when I'm done.
One thing I want to play around with is Black Alchemy's FakeAP
(
http://www.blackalchemy.to/project/fakeap/). You can turn your wireless
NIC-equipped Linux box into an access point that broadcasts 50,000 or so
fake SSIDs. The SSID of your "real" network would be hidden in plain sight
amidst all the noise. It's sort of security through obscurity, but I've
heard anecdotal evidence that this can cripple a war-drivin' script kiddie's
laptop. Looks like fun!
HTH,
~Jeff