bikerdude on 14/4/2010 at 02:10
Quote Posted by Al_B
I tend to agree with this. On the one hand it's an additional layer of obscurity but if they've got past the encryption then the MAC filtering is only a stumbling block. Just a personal view but I assume that all WiFi connections are going to be hacked and have a proper firewall between them and any internal network.
I assumed the router was for home use... also I have a non-std fixed IPs, so assuming said hackers, breaks the wifi, and byp[asses the address filtering, they have then gotta figure out what range Im using. And yes a proper FW would be the best route, but for the average tech savvie home use this should be sufficient.
Al_B on 14/4/2010 at 06:45
Yes - of course. Even for home use it's well worth using WPA (or WPA2), changing your SSID from the default and using a strong non-dictionary password.
I've not used it myself but I believe the Kismet tool that Zerker mentioned will reveal which IP range you're using. It's not a bad idea to change it, however.
bikerdude on 14/4/2010 at 10:53
Quote Posted by Al_B
changing your SSID from the default and using a strong non-dictionary password.
You just reminded me, hiding the SSID is also a good idea.
Matthew on 14/4/2010 at 12:04
Quote Posted by Bikerdude
You just reminded me, hiding the SSID is also a good idea.
Last time I tried that I couldn't connect to the little bugger at all. :/
PS I've been using a Netgear (but not that one) without any problems for quite a while now, so it's a brand that I like. My wireless dongle is a Linksys which seems pretty decent too.
dur4nd4l on 14/4/2010 at 17:20
Quote Posted by Bikerdude
You just reminded me, hiding the SSID is also a good idea.
... also I have a non-std fixed IPs, so assuming said hackers, breaks the wifi, and byp[asses [sic] the address filtering, they have then gotta figure out what range Im using.
No, it's not. Anyone with any know how can force your router to broadcast its SSID anyway. There are also tools out there for the script kiddies that will do this, so turning off SSID broadcasting is not security. Use a strong passphrase consisting of letters, numbers, special characters, and not consisting of any dictionary words. Change the router admin name and password immediately, and preferably just shut off wireless administration completely.
IP ranges are fairly limited, and honestly, have absolutely nothing to do with security, unless you were to use an extremely small subnet with very few wasted addresses. However, were you to do this with DHCP, it would be very easy for an attacker to simply cause a DOS by exhausting your DHCP pool. Using a "non-standard" range makes no sense at all: if I'm able to get through your encryption (WPA2, I would hope), then I can easily find out what IP address range you're using. All I have to do is RARP scan your network, and your router will tell me exactly which addresses are being used. The way IP addressing works, it's impossible to hide yourself with a "non-standard" range.
MAC address filtering really doesn't work that well, but the best way to implement it would be an EXCLUSIVE setting. Make sure that it's set to block ALL MAC addresses that AREN'T on the list, and just add the addresses of the devices you want. That way it's much harder to guess the MAC address of an allowed machine, especially since you pretty much need to be in the network to sniff the unencrypted addresses.
bikerdude on 14/4/2010 at 18:20
Quote Posted by dur4nd4l
* No, it's not. Anyone with any know how can force your router to broadcast its SSID anyway.
* IP ranges are fairly limited, and honestly, have absolutely nothing to do with security,
* MAC address filtering really doesn't work that well, but the best way to implement it would be an EXCLUSIVE setting.
er....
....all of the measures I've mentioned combined(encryption, address filtering, fixed Ip, hidden ssid) make it much less inconvenient for the average drive by hacker. They will simply go look for an easier network to hack. Same for motorcycle thieves - if a bike has a disc lock, steering lock and a visible alarm, they will go and look elsewhere for an easier target.
and er...mac address filtering only works one way, by exclusion...
dur4nd4l on 14/4/2010 at 18:30
Quote Posted by Bikerdude
er....
....all of the measures I've mentioned combined(encryption, address filtering, fixed Ip, hidden ssid) make it much less inconvenient for the average drive by hacker. They will simply go look for an easier network to hack. Same for motorcycle thieves - if a bike has a disc lock, steering lock and a visible alarm, they will go and look elsewhere for an easier target.
and er...mac address filtering only works one way, by exclusion...
You make a good point, however, when you're talking about network penetration, you're more likely to have your neighbors do it than a wardriver. While opportunists look for the most easily accessible WLAN, a neighbor will look for the best possible connection. If that happens to be you, then obscurity doesn't help.
MAC address filtering, like an ACL, functions either exclusively or inclusively. Inclusive is a list that allows everyone to communicate except those on the list. Exclusive lists function the other way around: only addresses on the list are permitted to communicate/connect; all other addresses are blocked. If your MAC address filter can't do both, get a new router.
bikerdude on 14/4/2010 at 21:50
Quote Posted by dur4nd4l
MAC address filtering, like an ACL, functions either exclusively or inclusively. Inclusive is a list that allows everyone to communicate except those on the list. Exclusive lists function the other way around: only addresses on the list are permitted to communicate/connect; all other addresses are blocked. If your MAC address filter can't do both, get a new router.
Fair enough, thus far every router or FW I've come across only did exc, never inc.
Al_B on 14/4/2010 at 22:03
Old news, I'm sure - but given the discussion I decided to do some experiments. With one of my laptops with Linux on it I installed kismet and the aircrack suite and took a scan of my own router. Router configuration: non-broadcast SSID, MAC filter exclusive and on (not including my Linux laptop) and WPA2 encryption. I had another laptop connected to the router which although not actively in use - has the typical background processes that like to communicate with the internet periodically. As my Linux laptop had previously used the router I changed both the SSID and password to make sure I had no cached information.
Quote Posted by dur4nd4l
Anyone with any know how can force your router to broadcast its SSID anyway.
I expected to have to spoof de-authenticate my connected laptop - but it leaked the new SSID within a few seconds anyway. The laptop probing the network seemed to be the cause so if you have devices active then hiding the SSID wouldn't appear to be too effective.
Quote Posted by dur4nd4l
IP ranges are fairly limited, and honestly, have absolutely nothing to do with security
To be fair - this wasn't revealed by my protected network. However, I agree that if the wireless security is breached then it would be fairly easy to find the addresses in use. The reason I suggested changing this to a non-default subnet is to try to avoid possible routing clashes with a VPN.
Quote Posted by dur4nd4l
...you pretty much need to be in the network to sniff the unencrypted addresses.
I had no problem picking up unencrypted MAC addresses so perhaps I've misunderstood what you mean.
In any case, my conclusion is pretty much unchanged. Hiding your SSID or adding a MAC filter makes your life harder - not any attackers. If you've got a decent password on the network and you're using strong encryption then that's sufficient for all reasonable purposes.
Zerker on 14/4/2010 at 22:10
If Al_B wasn't convincing enough, here's some useful reading material for everyone:
(
http://blogs.zdnet.com/Ou/index.php?p=43) The Six dumbest ways to secure a wireless LAN and the follow-up (
http://blogs.zdnet.com/Ou/?p=454) Wireless LAN myths that just won't die.
Enjoy.
So at the end of the day, for your sanity, just pick a good WPA2 passkey and go with it.