On Sun, 28 Sep 2003, Shachar Shemesh wrote:


  Hi,



   This is eactly the reason why I answered `depends on the
implementation'. There are a few ways to implement a wireless network, and
there is a set of reasonable requirements for security @home, this set is
different than the requirements on a corporate network, and yet different
than those required on a military or similar network.

   One always needs to weigh the possible threats with what actually we
are protecting, the possible damage, and counter that with the investment
we need to make, and see what is the price/"performance", and where we
draw the line.

   In the case of home security for WiFi, I wouldn't invest in a VPN
device, be it a firewall (Checkpoint/Cisco/Netscreen SOHO) or any similar
device, and add the complexity of VPN clients. Also, I don't know how
Linux implements connecting to such entities. On the other hand, I don't
know how well (if at all) the Linux wireless driver supports the WiFi
security module (key exchange, etc), and in this case, it may be possible
that while the WiFi security would be optimal for home usage, one may get
pushed into using VPN due to lack of Linux support.

   There are other options, but they are more annoying to implement,
including ssh tunnels for a certain set of ports, and similar stuff.


--Ariel

> That depends on how secure you want to get. WEP (Wire Equivalent
> Privacy) is "quite secure" in the sense thatit takes several minutes to
> crack. This applies to the 56bit as well as the 128bit modes.
> WEP was broken on every concievable level, and on several inconcievable
> levels. If you are trying to defend against an occasional sniffer, it
> may be enough. You will find, however, that a moderately determined
> attacker will see no difference between WEP turned on or not.
>
>         Shachar
>
> --
> Shachar Shemesh
> Open Source integration consultant
> Home page & resume - http://www.shemesh.biz/
>
>

--
Ariel Biener
e-mail: [EMAIL PROTECTED]
PGP(6.5.8) public key http://www.tau.ac.il/~ariel/pgp.html


=================================================================
To unsubscribe, send mail to [EMAIL PROTECTED] with
the word "unsubscribe" in the message body, e.g., run the command
echo unsubscribe | mail [EMAIL PROTECTED]

Reply via email to