There have been lots of articles lately that explain how to secure a wireless network. Most of those articles offer at least some tips that do not have any implications on a wireless network's security. While I would not call them snake oil, they certainly do not have the desired effect that the authors of the guides think they do have.
It does not mean that the changes discussed below have a negative effect on a system's security, but most do not have any effect at all, or only a minor effect.Let us take a look at the six dumbest ways to secure a Wireless Lan.
1. Mac Filtering
Mac Filtering does not protect against the forgery of a mac address, which is terribly easy using a network sniffer. It still could be a valuable line of defense against neighbors and kids who are only able to push buttons and don't understand the concept. Attackers who know what they are doing won't be thwarted off by Mac filtering.
2. SSID Hiding
This is hiding SSID beaconing on the access point while four other mechanisms are still broadcasting your router's SSID in the open. Even worse, since the ID is hidden your laptop or mobile device probes all networks it comes into contact with for the SSID which leaks it to those networks.
3. LEAP Authentication
It relies on its users and their passwords. LEAP requires strong passwords to be relatively secure and we all know about the passwords of normal day users.
4. Disable DHCP
DHCP allows the automatic assignment of IP addresses. If you disable it you have to assign all IPs manually. Attackers have various tools available that they can use to detect the local IP range of a network, and then it is only a matter of setting the attacking device's IP address to one within range.
5. Antenna Placement
This is pretty useless as well, telling everyone to move their antenna to the middle of the room or running the antenna with low power. The antenna of the access point is not the only factor that determines if it can be reached, the antenna of the client is also a factor. What if the hacker has a bigger antenna that still reaches your access point ?
6. Just use 802.11a or Bluetooth
This has nothing to do with security, those are just different standards.
The author of the original article has published a follow-up which you should read as well. You can access it here.Advertisement
Ghacks is a technology news blog that was founded in 2005 by Martin Brinkmann. It has since then become one of the most popular tech news sites on the Internet with five authors and regular contributions from freelance writers.