The general mind state over the years has been that 802.11x technology is 
insecure,  fine so it has been for some [time] but i think the problem  that 
we face stems mainly from vendor, who are you using??  If you are to throw in 
an Extreme/cisco/Karlnet box would it be as risky as putting in say 
D-Link/Mikrotik  products  ??  i try to think such security risks that we 
face with 802.11x boil down to vendor and how they tackle the loopholes , 
some of these high end vendors really have good mitigation techniques i 
believe , but this is my own opinion dont know about the rest !!! 
 
ma 2 shs!!! 
 
 
 
 
 
 
On Tue, 14 Jun 2005 17:35:41 +0300, Ronny wrote 
> O yes your are right but your wireless card centrino enabled chip  
> won't know that it's dealing with  the evil device/rogue Access  
> point .Btw wireless is a very tricky thing.You secure your Box as a  
> linux sysadmin but ignorant about the hacks in the air space,that  
> need a wireless expert.May be I asked the wrong question to the  
> right list  ;-) .Turn off all those services and then your session  
> will be hijacked in seconds . 
>  
> /"Here's how session hijacking works. The hacker waits for someone  
> to finish successfully the authentication process. Then you as the  
> attacker send a disassociate message, forging it to make it look  
> like it came from the AP [access point]. The client [user] thinks  
> they have been kicked off, but the AP thinks the client is still out  
> there. As long as WEP is not involved you can start using that  
> connection up until the next time out, usually about 60  
> minutes.Remember you had a secure connection to your cooperate  
> servers and your Linux box had all useless services uninstalled !/  
> Looks like  fiction but works really bad!!!! :-\ 
>  
> _*Conclusion*_ 
>  
> "/If even LAN communication has its own security flaws, do we stop  
> "networking"? Of course not. We need to be aware of the benefits of  
> mobile clients communicating with one other and accessing enterprise  
> data. We also must be aware of how data and communication could be  
> compromised -- then we'll know how to lower the risks./ 
>  
> /Just as the benefits of protocols like 802.1x make us want to use  
> them, any weaknesses in those protocols should only provide an  
> invitation to companies, startups, and developers to come up with  
> better, more secure solutions. Clients, companies, the government,  
> and individuals will certainly make a market for such solutions,  
> especially with the exponential growth of mobile devices."/ 
>  
> Is  Uganda ready for this is the next question? 
>  
> EOF 
> Ronny 
>  
> Noah Sematimba wrote: 
>  
> >My post assumed that in the first place your machine is suitably secured  
> >against attacks which it should be in any case if you're running some unix  
> >variant. It is a simple matter of turning off all unneeded services. 
> > 
> >Noah. 
> >On Tuesday 14 June 2005 16:49, Ronny wrote: 
> >   
> > 
> >>Well you have covered just part of the security ,your connection to the 
> >>office .But forgotten that you are using a rogue device to access your 
> >>office.By the way the bad guy might be interested with what you have on 
> >>your machine than what you are accessing!Well there will be a VPN to the 
> >>office but not to the neighbours rite  ;-) .Am not good at VPN's but 
> >>that what I think correct me if wrong 
> >>Ronny 
> >> 
> >>Noah Sematimba wrote: 
> >>     
> >> 
> >>>Well no one in his right mind should be relying on his ISP to provide 
him 
> >>>with security. Setup some sort of VPN to your office or tunnel over ssh 
> >>>or whatever means. 
> >>> 
> >>>All UTL is doing is providing you with the road, not also fitting the 
> >>>security features in whetever car you're going to use on their road. 
> >>> 
> >>>Noah. 
> >>> 
> >>>On Tuesday 14 June 2005 15:51, Robert Lukwago Mukasa wrote: 
> >>>       
> >>> 
> >>>>With secure I suppose they mean what encryption standards are being 
> >>>>used to protect users of the hotspots from  hackers/crackers/attacks. 
> >>>>Well how will we know unless we try them out? 
> >>>> 
> >>>>rob@ 
> >>>> 
> >>>>On 6/14/05, Mark Tinka <[EMAIL PROTECTED]> wrote: 
> >>>>         
> >>>> 
> >>>>>On Tuesday 14 June 2005 14:35, Ronny wrote: 
> >>>>>           
> >>>>> 
> >>>>>>First I apologies for editing your subject am good at 
> >>>>>>that. :-) Talk of hotspots mushrooming up ihere in 
> >>>>>>UG.How secure are they. 
> >>>>>>             
> >>>>>> 
> >>>>>How do you mean, secure? In cases like these, security 
> >>>>>could be a point of view. 
> >>>>> 
> >>>>>Mark. 
> >>>>> 
> >>>>>           
> >>>>> 
> >>>>>>Should we rush to get plugged 
> >>>>>>into the matrix ;-) .Otherwise am a wireless 
> >>>>>>advocate.Congs UTL and did I hear   Infocom ? Ronny 
> >>>>>>Alright good topic 
> >>>>>> 
> >>>>>>Kiggundu Mukasa wrote: 
> >>>>>>             
> >>>>>> 
> >>>>>>>Talk about starting with a bang! 
> >>>>>>>Congrats to UTL 
> >>>>>>>Need to go to each one and see what the performance 
> >>>>>>>is like. 
> >>>>>>> 
> >>>>>>>Kiggs 
> >>>>>>> 
> >>>>>>> 
> >>>>>>>**************** 
> >>>>>>>***************************** 
> >>>>>>> 
> >>>>>>>Kiggundu Mukasa                # Computer Network 
> >>>>>>>Consultancy### 
> >>>>>>> 
> >>>>>>>KYM-NET LTD.                   # Intranets & 
> >>>>>>>Internet Solutions# 
> >>>>>>> 
> >>>>>>>Plot 80 Kanjokya Street 
> >>>>>>> 
> >>>>>>>P.O. Box 24284 Kampala, Uganda 
> >>>>>>> 
> >>>>>>>Tel:    +256 77 972255 
> >>>>>>> 
> >>>>>>>        +256 71 221141 
> >>>>>>> 
> >>>>>>>Fax:    +256 31 262122 
> >>>>>>> 
> >>>>>>>**************************************************** 
> >>>>>>>************* 
> >>>>>>> 
> >>>>>>> 
> >>>>>>>----------------------------------------------------- 
> >>>>>>>------------------- 
> >>>>>>> 
> >>>>>>>_______________________________________________ 
> >>>>>>>LUG mailing list 
> >>>>>>>[email protected] 
> >>>>>>>http://kym.net/mailman/listinfo/lug 
> >>>>>>>%LUG is generously hosted by INFOCOM 
> >>>>>>>http://www.infocom.co.ug/ 
> >>>>>>>               
> >>>>>>> 
> >>>>>_______________________________________________ 
> >>>>>LUG mailing list 
> >>>>>[email protected] 
> >>>>>http://kym.net/mailman/listinfo/lug 
> >>>>>%LUG is generously hosted by INFOCOM http://www.infocom.co.ug/ 
> >>>>>           
> >>>>> 
> > 
> >   
> > 
>  
> --  
> *************************************************************************** 
>   / ''We can't become what we need to be by remaining what we are''\ 
>   \ ,,                                                           ,,/ 
> *************************************************************************** 
 
 
Regards 
 
David Ziggy Lubowa 
 
_______________________________________________
LUG mailing list
[email protected]
http://kym.net/mailman/listinfo/lug
%LUG is generously hosted by INFOCOM http://www.infocom.co.ug/

Reply via email to