Crack down on unsecured wireless networks

In Australia

The Queensland Police plans to conduct a ‘wardriving’ mission around select Queensland towns in an effort to educate its citizens to secure their wireless networks.

Once found…

When unsecured networks are found, the Queensland Police will pay a friendly visit to the household or small business, informing them of the risks they are exposing themselves to.

Read more

Problems with WEP

Some people have quite a few problems connecting devices to a WEP encrypted wireless network.

One of the problems with WEP is that the actual standard relies on a 10 character HEX key for 40bit WEP and a 26 character HEX key for 128bit WEP.

In order to make things easier for people, vendors use certain algorithms to convert simple alphanumeric passwords (or passphrases) into HEX keys, thus enabling people to use simple memorable WEP password rather than lengthy HEX keys.

The problem is that different vendors use different algorithms to generate the HEX key and therefore a ASCII password on an AEBS will be hashed differently on a Netgear client and vice versa.

One thing is a 13 character 128 bit WEP password will be hashed by all vendors in the same way (if you use 40bit WEP then a 5 character password is required).

Though sometimes not even that works and the  HEX key must be used regardless.

Having said all that WEP is considered today to be insecure and not recommended (it can be broken quite easily by a determined hacker) if you can use WPA. However if you have legacy devices which don’t support WPA then WEP is sometimes all you can use.

Changing my Network Topology

Over the last week or so, I have been messing about experimenting with my network topology.

Previously I had a relatively simple network, a sole Airport Express with a lot of wireless clients. After having quite a few connectivity issues with the Airport Express, I knew I had to replace it with my newer Airport Extreme.

Once I did this, I left it in place for a few days to iron out any wrinkles or problems. I am running it in 802.11n b/g mode so that all my wireless clients can connect to it.

Yesterday I started to rearrange things, so that I could have wired clients, a pure 802.11n network and a separate 802.11g network.

My Airport Extreme now sits under my television, connected to it is my EyeHome, this should mean it can communicate to my iMac (which I use to record television via an Elgato EyeTV device) and stream video, audio and pictures without stuttering. I also intend to hardware a Mac mini as well and this will be my media centre for the moment – longer term I will replace this either with an Apple TV or another Intel based Mac mini. This Mac mini will have an Elgato USB EyeTV device attached.

I will also connect to the Airport Extreme (the third device to the third LAN port) an older 802.11g Airport Extreme which will be running a pure 802.11g wireless network for the older wireless clients. I will very likely stop using 802.11b devices, but as these are only PDAs I am not too worried and if I do need to test them I can always use the airport Express and plug that into the AirportExtreme as and when necessary.

Both wireless networks will use WPA as this is secure compared to WEP, however I will not be closing my networks, nor will I be using MAC address access control.

I am hoping that this will improve the network and make it much faster for internal file transfers and as I replace older Macs with newer ones which support 802.11n it should also be future proof as well.

The only downside I guess is the location of the 802.11n Airport Extreme does make it difficult to test USB hard drives and printers.