New Wireless card and Ethics.

GEC: Discuss gaming, computers and electronics and venture into the bizarre world of STGODs.

Moderator: Thanas

What should Laird do?

Leech!
7
32%
Hax0r their routers!!!11(teach em a lesson!!111)
1
5%
Be a nice neighbour and inform them
12
55%
Other(Specify with a post.)
2
9%
 
Total votes: 22

User avatar
Spacebeard
Padawan Learner
Posts: 473
Joined: 2005-03-21 10:52pm
Location: MD, USA

Post by Spacebeard »

Arrow Mk84 wrote:
I tracked down my coworker (who's now with another company) and had him comment on my post and yours. His reply:
He is more or less correct. The amount of time that passes is not correct. And all IV’s are weak. They are just too few bits. And once you have two of the same IV’s you also have user-defined part of WEP, since the user-defined part of WEP never changes. WEP key is both the IV and the user side.
That's correct. However, there are some IVs which are weaker than others and subject the RC4 cipher to various attacks which make it easier to recover the static key.

See here, for example.

So, yes, my statement was oversimplified, but its not going to take days to break into a wireless network.
Your information is completely consistent with what I said, which was "from hours to days, depending on the amount of traffic". Note the sentence below:
A busy access point, which constantly sends 1500 byte packets at 11Mbps, will exhaust the space of IVs after 1500*8/(11*10^6)*2^24 = ~18000 seconds, or 5 hours. (The amount of time may be even smaller, since many packets are smaller than 1500 bytes.)
It might be better to express this in terms of a number of packets you must collect. Assuming that the implementation chooses a new IV after every packet, as it should, then the upper limit for the packets you need to collect is 2^24. The quotation above tells us that this will take at most five hours on a fully utilized network. If the network has very little traffic, then you will need to wait longer to collect enough packets. In the paper I cited, the author reports needing between 500,000 and 2,000,000 packets to crack WEP.
"This war, all around us, is being fought over the very meanings of words." - Chad, Deus Ex
User avatar
InnocentBystander
The Russian Circus
Posts: 3466
Joined: 2004-04-10 06:05am
Location: Just across the mighty Hudson

Post by InnocentBystander »

Dahak wrote:
InnocentBystander wrote:Personally, if they are transmitting openly, and I need a connection, I'll leech, but you know, just be nice and don't download a lot of stuff or poke around on their network. I like to leave my wireless router free, even if there were people close enough, it's a nice service to offer others at no cost to you. As long as no one is harmed, everything is cool. I'll be glad to sacrifice a small precentage of my connection so someone visiting can browse the web or play an online game while they are around. Even if someone wanted to use my connection, rather than pay for their own service, I really don't see the harm unless I'm seriously impacted.
It would bring you in a bit of legal stress if someone were using your net to do illegal stuff, wouldn't it?
I guess it's possible, but I think you are more likely to die in a plane crash, than run into troubles because someone was doing something very illegal while leeching off your wireless access point.
User avatar
Spacebeard
Padawan Learner
Posts: 473
Joined: 2005-03-21 10:52pm
Location: MD, USA

Post by Spacebeard »

InnocentBystander wrote:
Dahak wrote:
InnocentBystander wrote:Personally, if they are transmitting openly, and I need a connection, I'll leech, but you know, just be nice and don't download a lot of stuff or poke around on their network. I like to leave my wireless router free, even if there were people close enough, it's a nice service to offer others at no cost to you. As long as no one is harmed, everything is cool. I'll be glad to sacrifice a small precentage of my connection so someone visiting can browse the web or play an online game while they are around. Even if someone wanted to use my connection, rather than pay for their own service, I really don't see the harm unless I'm seriously impacted.
It would bring you in a bit of legal stress if someone were using your net to do illegal stuff, wouldn't it?
I guess it's possible, but I think you are more likely to die in a plane crash, than run into troubles because someone was doing something very illegal while leeching off your wireless access point.
It depends on what you mean by "trouble". You could easily have your account terminate by your ISP if someone sends spam through your network, for example.
"This war, all around us, is being fought over the very meanings of words." - Chad, Deus Ex
User avatar
Stark
Emperor's Hand
Posts: 36169
Joined: 2002-07-03 09:56pm
Location: Brisbane, Australia

Post by Stark »

Woo! With my newfound knowledge of cryptography, the weaknesses of WEP are pretty critical. Depending on what cipher they use, getting the key wouldn't take too long if you really wanted, and further captures just make it easier.

Who thought I'd learn anything new at university? :)
User avatar
InnocentBystander
The Russian Circus
Posts: 3466
Joined: 2004-04-10 06:05am
Location: Just across the mighty Hudson

Post by InnocentBystander »

Spacebeard wrote:
InnocentBystander wrote:
Dahak wrote: It would bring you in a bit of legal stress if someone were using your net to do illegal stuff, wouldn't it?
I guess it's possible, but I think you are more likely to die in a plane crash, than run into troubles because someone was doing something very illegal while leeching off your wireless access point.
It depends on what you mean by "trouble". You could easily have your account terminate by your ISP if someone sends spam through your network, for example.
I had something like that happen acutally, I was playing around with a linux machine acting as server and during a vacation someone had hijacked it and was using it to send out spam. My ISP told me about it, I put a stop to it and everything was cool.
User avatar
Spacebeard
Padawan Learner
Posts: 473
Joined: 2005-03-21 10:52pm
Location: MD, USA

Post by Spacebeard »

Stark wrote:Woo! With my newfound knowledge of cryptography, the weaknesses of WEP are pretty critical. Depending on what cipher they use, getting the key wouldn't take too long if you really wanted, and further captures just make it easier.

Who thought I'd learn anything new at university? :)
The cipher is RC4.
"This war, all around us, is being fought over the very meanings of words." - Chad, Deus Ex
althornin
Youngling
Posts: 60
Joined: 2004-06-30 12:00am

Post by althornin »

Pu-239 wrote:
althornin wrote:
Pu-239 wrote:I hope those of you leaving your network open are using IPSEC...
Bah.
I just have a captive portal page, with terms, and they are bandwidth limited and can only use a few ports.
Free to all, but heavily restricted. And firewalled off from my lan - getting to my lan from my wireless is the same as getting to my lan from the internet. VPN, or nothing :)
IPSEC==VPN
not really. IPSEC can be used in a vpn, but they are not equal (i interprett "==" as "identical", where VPN has many possible technology methods, from OpenVPN using SSL to MS PPTP, or whatever...). Anyways, i know that. My "Bah" was directed at you because i felt you were saying that ALL you need is VPN...

But just using a vpn won't save you from all the problems.
you need a legal recourse for illegal network use, just in case (hence captive portal with TOS) and you need to make sure your wireless is firewalled off from your regular network.

Sorry if i wasn't clear...
User avatar
Laird
Friendly Neighbourhood Asshole
Posts: 1707
Joined: 2002-09-16 04:33am
Location: Canada

Post by Laird »

Update: I got two of my neighbours to lock down their routers; however, one says I'm being paranoid.

Image
"LairdCorp, where total dominion is our number one goal!"-LairdCorp's Motto
Image
User avatar
Faram
Bastard Operator from Hell
Posts: 5271
Joined: 2002-07-04 07:39am
Location: Fighting Polarbears

Post by Faram »

Laird wrote:Update: I got two of my neighbours to lock down their routers; however, one says I'm being paranoid.
Not that I recomend that you do anything illegal, but here is some nice tools for all sorts of network woodoo.

http://www.gfi.com/lannetscan/
Kickass network scanner

http://www.netstumbler.com/
Much better wireless network analyzer that than netgearthingy.

http://www.ethereal.com/
Ethereal the ultimate network protocol analyzer, if you don't know wthat that is don't bother with this one.
[img=right]http://hem.bredband.net/b217293/warsaban.gif[/img]

"Either God wants to abolish evil, and cannot; or he can, but does not want to. ... If he wants to, but cannot, he is impotent. If he can, but does not want to, he is wicked. ... If, as they say, God can abolish evil, and God really wants to do it, why is there evil in the world?" -Epicurus


Fear is the mother of all gods.

Nature does all things spontaneously, by herself, without the meddling of the gods. -Lucretius
Post Reply