1) MAC filtering is entirely useless. It will only annoy you when you
can't figure out why things don't work properly. Likewise for SSID
broadcast, leave it on and lead a happier life. WPA with a decent
passphrase is quite strong enough for anything you're sending over your
network. Remember it's all in the clear once it leaves your cable modem
anyway...

2) Steve Gibson is, IMHO, a pompous snake oil salesman. Sorry, but it
has to be said. I know some people around here love him, but hey, if
you've read the audiophile forum you'll know there are people who will
believe anything :) I'm not going to present any evidence for my
statement, just google around if you're interested. No one in the
actual security business takes him seriously.

3) Feel free to use a 20 character passphrase if you like, it's
certainly true that the longer the better. However, I use 8 truly
random characters. It's easy to enter with an SB remote and I would be
quite happy to challenge anyone to break it, and offer a nice bottle of
something to anyone who can do so before we're both dead :) This makes
interesting reading: http://blogs.zdnet.com/Ou/?p=127. GRC seems to
have got his value of 20 from the study of attacks on the IDEA cypher
which is really unrelated to WPA. According to the authors of the best
WPA craking tool (aircrack) you can only test around 300 keys per
second (http://www.aircrack-ng.org/doku.php?id=cracking_wpa). Thus, my
8 characters would take 91 years for a single computer to break. Maybe
when computers get a little faster I'll up it to 9 chars - that's over
3000 years :)


-- 
radish
------------------------------------------------------------------------
radish's Profile: http://forums.slimdevices.com/member.php?userid=77
View this thread: http://forums.slimdevices.com/showthread.php?t=44054

_______________________________________________
discuss mailing list
[email protected]
http://lists.slimdevices.com/lists/listinfo/discuss

Reply via email to