View previous topic :: View next topic |
Author |
Message |
genfive Apprentice


Joined: 10 Nov 2005 Posts: 291
|
Posted: Mon Jul 24, 2006 2:38 am Post subject: Access points encryption modes? |
|
|
This question is not for gentoo, or linux, but rather a genral question. With iwconfig, the WEP can have two encryption modes: open and restricted. According to the /etc/conf.d/wireless.examples, open encryption is supposed to be more secure than restricted encryption. I was caught this by surprise because by looking at their names, I assumed that open means everyone can use it, and restricted means it is contained, and therefore I thought restricted is more secure. Can someone give me a quick 101 lesson here on what they are?
Also, my wireless router offers some modes called "Open Key" and "shared key"... as always, the explanations for those two modes are not helpful at all. one is said to be "allowing any computer to access" while the shared key is "shared among selected groups of computers" I somehow connect those two modes to the "open enc" and "restircted enc"... is this connection valid? Or am I completely wrong? Also, once again, if i was not too far off, which one is more secure (the explanation seems to support the view that shared key is more secure... ) |
|
Back to top |
|
 |
r4d1x Apprentice


Joined: 25 Nov 2003 Posts: 157 Location: Japan
|
Posted: Mon Jul 24, 2006 4:08 am Post subject: |
|
|
Quote: | The 802.11b standard supports two means of client authentication between the wireless NIC and the AP: open and shared key authentication. Open key authentication involves supplying the correct SSID. With shared key authentication, the AP sends the client device a challenge text packet that the client must then encrypt with the correct WEP key and return to the AP. If the client has the wrong key or no key, authentication will fail and the client will not be allowed to associate with the AP. Shared key authentication is not considered secure, because a hacker who detects both the clear-text challenge and the same challenge encrypted with a WEP key can decipher the WEP key.
With open key authentication, even if a client can complete authentication and associate with an AP, the use of WEP prevents the client from sending data to and receiving data from the AP, unless the client has the correct WEP key.
|
And more indepth -
http://www.startawisp.com/index2.php?option=com_content&do_pdf=1&id=147
I use open auth with MAC filtering on my WAP. AFAIK thats about as secure as it can get at the AP level. MAC doesnt match, you dont use it. _________________ Gentoo Linux 2.6.19.2-grsec
Dual Athlon-MP 1900
1024Mb PC2100 DDR
Radeon 9600 pro
1TB File Server / FTP |
|
Back to top |
|
 |
genfive Apprentice


Joined: 10 Nov 2005 Posts: 291
|
Posted: Mon Jul 24, 2006 4:13 am Post subject: |
|
|
ah, I see. thanks! |
|
Back to top |
|
 |
|
|
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
|