karym6 said:it is less secure than wpa as it sends its authentication in plaintext, meaning anyone sniffing the connection can crack they key rather easily.
wpa (wifi protected access) is much more secure as it doesnt send any part of the key in plain text. Basically, it sends encrypted challenges based on the password - making it harder for someone to crack the key.
It's a matter of opinion, but I don't think MAC filtering adds anything useful to security. It's VERY easy to change a client's MAC to a valid one, and the filtering is a pain if you have lots of different clients. Just use WPA with a decent (read long and random) passphrase and that'll be all the security you need. As for WPA vs WPA2, in real terms they are secure. Technically WPA is vulnerable to some theoretical attacks which allow decryption of captured packets, but as far as I know both are secure wrt preventing access to your internet connection (assuming a good password).karym6 said:dont forget, regardless of what security you use - adding mac address filters to your ap will significantly increase your security. Most recent ap's/routers will let you do this easily and quickly.
That's just plain wrong. In WEP there are two forms of authentication, either Open or Shared. Open isn't really authentication, you just connect to an AP (access point) and start sending traffic, if you've got the same key, it will work. Shared authentication sends a cleartext message from the AP to the client, the client encrypts it and sends it back. If both the client and AP have the same (i.e. correct) key, the AP accepts the connection.
WEP is weak for a number of reasons. One of the main ones is that the 24 bit IV (initialization vector) tagged onto the key is too small, and can lead to collisions. WPA increases this to 48 bits. Also, WPA uses TKIP, which means the key changes with time.
The quickest attacks on WEP are 'replay' attacks. This is where you send and AP a packet it has previously sent out. It will re-encrypt this packet and send it back, giving out lots of information in the process. WPA prevents this by using a Message Integrity Code (MIC).
It's a matter of opinion, but I don't think MAC filtering adds anything useful to security. It's VERY easy to change a client's MAC to a valid one, and the filtering is a pain if you have lots of different clients. Just use WPA with a decent (read long and random) passphrase and that'll be all the security you need. As for WPA vs WPA2, in real terms they are secure. Technically WPA is vulnerable to some theoretical attacks which allow decryption of captured packets, but as far as I know both are secure wrt preventing access to your internet connection (assuming a good password).
karym6 said:with shared encryption, a plaintext challenge is sent to the ap, which in turn sends a plaintext challnege back to the client which then tries to encrypt the challenge using its key which it then sends back to the ap (all in clear text still) which in turn compares it to the orgianal plaintext challenge. If it can, hey presto you are in the network. If not then your out. This is the weak point of wep, and is probably the most common security model.
. WEP cracking does not rely on sniffing the initial authentication. Yes, the initial challenge is sent in plaintext, but the response can only be generated with access to the private key. This is entirely equivalent to WPA. If you have access to the WPA or WEP private key, you can generate a valid response and authenticate. The authentication procedure is NOT the weak point in WEP. In fact, most WEP networks don't bother with authentication and just allow anyone to authenticate. You are right that the key in WEP is too short, and is re-used for ALL communication. This is the problem with WEP.karym6 said:it is less secure than wpa as it sends its authentication in plaintext, meaning anyone sniffing the connection can crack they key rather easily
If you don't recognise it then I would say it's someone using your wireless, as said at the beginning of this thread set up WEP or WPA to secure your networkcan someone help please just went into my router settings and when click on the dhcp client list this comes up
192.168.2.5 Jess-PC 00:0d:f0:3a:d5:92
and I dont know who this is, can somebody help me for the best way to stop this please, is this someone on my connection?
You mean use WPA. lol.conorc said:use WEP with a good (long) password (or pass phrase) with numbers and symbols in it
dhcp will normally report all current leases: it doesn't mean that that they are still in use, just that they haven't expired yetI set up the password for security bbut when i check the dhcp that ip addy is still on it
Is there a way to stop people using your settings? I went into my router settings clicked on DHCP Client list and got the following
192.168.2.3 Macintosh 00:19:e3:02:ec:ab
192.168.2.4 DadsComputer 00:14:a5:b4:84:dd
192.168.2.5 (null) 00:17:f2:50:44:b4
Im not entirely sure who the macintosh is??!?? could this be someone using my connection and is there a way to stop this!!
yes disable SSID broadcast and also descrease the signal strenght so you the signal doesnt go outside of the house.
We use essential cookies to make this site work, and optional cookies to enhance your experience.