Besides the fact it's trivia to sniff and then spoof a MAC address AND
someone using that same sniffer can crack the WEP after about 400,000
packets (Maybe less) -- if you are running everyone through an IPSEC tunnel
over the air and have a set of firewalls between your 802.11b and your
security domain, you should be fine as long as you change your key on the
WEP every 200,000 packets or so.

This is definitely NOT something for sensitive data. And it can be sniffed
with the right equipment from distances MUCH MUCH greater than it's
operational distances.

Use Google and look for 802.11b exploits. There are a bunch of papers out
there, including ways to increase the sniffing distances with common, easy
and cheap stuff.

I use it at home for guests, but I can't think of a corporate setting that
I'd volunteer to use it and, if forced, they'd have to sign a statement
saying they understand the weaknesses and the extra man-hours necessary to
support it.

D. Weiss
CCNA/MCSE/SSP2



-----Original Message-----
From: Thomas Ullrich [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, December 04, 2001 3:58 PM
To: Security-basics
Subject: WLAN


Hello everybody,

we  made positive experiences with a "3COM access point
6000", which works according to 802.11b.

So far, I haven't heard any security doubts against this technology. The

most important issue during configuration of a WLAN seems to be to allow
only
registered MAC addresses or WLAN cards to join the network.

Are there any other points that should be considered when implementing
wireless LANs?

Thanks
Thomas


Reply via email to