Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Wireless (In)Security

    Scheduled Pinned Locked Moved Wireless
    13 Posts 4 Posters 2.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • ?
      Guest
      last edited by

      I was just thinking it seems stupid to allow someone to throw millions of tries at wireless passphrase for WPA2. I see alot of braggarts saying they cracked their neighbors wifi in 10 minutes.. I am saying why give them the chance. 15 tries at passphrase and lockout for 3600 minutes if unsuccessful.
      That would be righteous by me.

      1 Reply Last reply Reply Quote 0
      • ?
        Guest
        last edited by

        I would think if someone was pounding your access point with an dictionary attack it would affect the performance of your wireless network as well, if not severely degrade it. If you only had 15 passphrase tries then at least it add a layer of complication for the attacker.
        Just like any lock, with enough effort anything is possible.

        1 Reply Last reply Reply Quote 0
        • DerelictD
          Derelict LAYER 8 Netgate
          last edited by

          Ruckus controllers block MAC addresses for a short period after several consecutive join failures.  These are solved problems.  Just not using FreeBSD as your access point.

          Chattanooga, Tennessee, USA
          A comprehensive network diagram is worth 10,000 words and 15 conference calls.
          DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
          Do Not Chat For Help! NO_WAN_EGRESS(TM)

          1 Reply Last reply Reply Quote 0
          • ?
            Guest
            last edited by

            Looking at either an used Ruckus 7362 for $75 or 7982 for $250.
            Are features relatively the same? I would like 3X3 but i don't really need it. What are the implications of the EOL status of 7362. Obviously no updates…
            Are the internal antennas similar? Beamforming on both?

            Sorry to stray off topic but i need to have something to compare pfSense wireless to anyway. I really prefer the web interface versus Mikrotiks solution.

            Any Linux solutions to handling the issue of WPA2 brute forcing? They uses wpa2 supplicant as well as hostap so i doub

            1 Reply Last reply Reply Quote 0
            • DerelictD
              Derelict LAYER 8 Netgate
              last edited by

              I have no idea if you get the sort of blocking I mentioned without a controller.  nor do I have any idea what the capabilities are of the old units.  Ruckus datasheets are probably where you want to be spending your time.

              7982s are beasts.

              Chattanooga, Tennessee, USA
              A comprehensive network diagram is worth 10,000 words and 15 conference calls.
              DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
              Do Not Chat For Help! NO_WAN_EGRESS(TM)

              1 Reply Last reply Reply Quote 0
              • ?
                Guest
                last edited by

                What about FreeRadius. I see it is used in captive portal by some. Would it provide me with the ability to foil passphrase guessing? Is this level of security really as good as it looks?

                4-10 hours to hackdown really does concern me.
                http://code.google.com/p/reaver-wps/

                1 Reply Last reply Reply Quote 0
                • DerelictD
                  Derelict LAYER 8 Netgate
                  last edited by

                  No.

                  (Captive portal authentication has nothing to do with Wi-Fi/WPA password cracking)

                  Using freeradius on your Wi-Fi means you're using WPA2 Enterprise.  That completely changes the equation because you're no longer trying to crack a PSK.

                  But to use WPA2 Enterprise properly you need to deploy certificates to all your client devices, maintain usernames and passwords for everyone, etc.

                  Chattanooga, Tennessee, USA
                  A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                  DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                  Do Not Chat For Help! NO_WAN_EGRESS(TM)

                  1 Reply Last reply Reply Quote 0
                  • ?
                    Guest
                    last edited by

                    I am going to try that route. I already learned cert stuff with VPN setup. I know that WPA2 Personal -encryption causes a wireless speed hit, Will WPA2-Enterprise make it worse? How bout things like my Visio TV or other embedded wireless devices. How do i get certs there? I am guessing it is pretty much -only works with supported devices? I like the sound of EAP+TLS. I think i could rest well with that level of protection.
                    Thanks

                    1 Reply Last reply Reply Quote 0
                    • DerelictD
                      Derelict LAYER 8 Netgate
                      last edited by

                      No idea.  Doesn't much matter because it is what it is.  You either enable the crypto or you don't.  It either slows it down or it doesn't.  Probably different on all combinations of gear, distance, physical topology/construction, etc.

                      Survey your site and put in what you need to get close to expected performance and understand that wi-fi is not ever guaranteed.  Too many variables: shared medium, limited available channels, interference, etc.

                      Chattanooga, Tennessee, USA
                      A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                      DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                      Do Not Chat For Help! NO_WAN_EGRESS(TM)

                      1 Reply Last reply Reply Quote 0
                      • P
                        Placebo
                        last edited by

                        Attacks on WPA/WPA2 are performed offline.
                        You will need to wait till a client authenticates (Or send out fake deauthentication request to force the client to reauthenticate) and then capture the four way handshake.
                        This four way handshake is brute-forced offline.
                        So lookout for deauthentication request but even better just chose a 25 random character passphrase.

                        Also see:
                        http://www.smallnetbuilder.com/wireless/wireless-howto/30278-how-to-crack-wpa-wpa2

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.