13.01.2013 Views

Wireless Home Networking - Index of

Wireless Home Networking - Index of

Wireless Home Networking - Index of

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 9: Securing Your <strong>Wireless</strong> <strong>Home</strong> Network<br />

For most home users, this isn’t a problem (we don’t think that you have to<br />

worry about giving Nana the passphrase for your network when she’s in town<br />

visiting her grandkids), but in a busy network (such as in an <strong>of</strong>fice), where<br />

people come and go (employees, clients, customers, and partners, for example),<br />

you can end up in a situation where just too many people have your<br />

shared secret.<br />

When this happens, you’re stuck with the onerous task <strong>of</strong> changing the shared<br />

secret and then making sure that everyone who needs to be on the network<br />

has been updated. It’s a real pain.<br />

These kinds <strong>of</strong> busy networks have authentication systems that control the<br />

encryption keys for your network and authorize users on an individual basis<br />

(so that you can allow or disallow anyone without having to start from<br />

scratch for everyone, like you do with a shared secret).<br />

If you have this kind <strong>of</strong> busy network, you may want to consider securing<br />

your network with a system called WPA Enterprise and 802.1x. See the sidebar<br />

“802.1x: The corporate solution” later in this chapter, for more information on<br />

this topic.<br />

Introducing Wired Equivalent<br />

Privacy (WEP)<br />

The original system for securing a wireless Wi-Fi network is known as WEP, or<br />

Wired Equivalent Privacy. The name comes from the admirable (but, as we<br />

discuss, not reached) goal <strong>of</strong> making a wireless network as secure as a<br />

wired one.<br />

In a WEP security system, you enter a key in the Wi-Fi client s<strong>of</strong>tware on each<br />

device connecting to your network. This key must match the key you establish<br />

when you do the initial setup <strong>of</strong> your access point or wireless router<br />

(which we describe in Chapter 7).<br />

WEP uses an encryption protocol called RC4 to secure your data. Although<br />

this protocol (or cipher) isn’t inherently bad, the way that it’s implemented in<br />

WEP makes it relatively easy for a person to snoop around on your network<br />

and figure out your key. And after the bad guys have your key, they can access<br />

your network (getting into PCs and other devices attached to the network or<br />

using your Internet connection for their own purposes) or stealthily intercept<br />

everything sent across the wireless portion <strong>of</strong> your network and decode it<br />

without your ever knowing!<br />

It doesn’t take superhacker skills to do this either — anyone with a Windows<br />

or Linux or Mac PC with wireless capabilities can download free and readily<br />

available s<strong>of</strong>tware from the Web and, in a short time, figure out your key.<br />

165

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!