Linux - SecurityThis forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
Okay, here's the deal:
A few nights ago, I noticed that someone had connected to my wireless network and was downloading something. Well, I left the access point open and was asking for trouble (mostly because I was having some difficult getting the wireless to work and never really closed it once it was). So, in my lock down attempts, I thought about what we need to do to access the wireless at school and work. Here's that rundown:
1) upon connecting, we are redirected to a webpage
2) we need to supply login credentials
3) we are handed a valid IP and have unlimited access to the internet.
After studying a little on the vulnerabilities of Wireless Networks, I have concluded that this is, probably, the safest way to go (after implementing all the others, that is). I would like to do this with Linux, but am unsure of where to go to get it done.
My AP is a LinkSys and will point (theoretically) to a RADIUS server. I configured, somewhat, freeRADIUS on Fedora Core 4 to act as that RADIUS server, but I'm unsure as to whether it is, indeed, the way to go.
Any thoughts? Mind you I would prefer to use all Open Source for this experiment.
Yeah, I have WEP and MAC filtering. The big thing is that those alone are enough to discourage a lot of people from attempting. But what about those that it doesn't discourage? What about a business who insists on Wireless, implements all of those, but still is hacked? I would like to add the authentication to it to discourage all but the really gun-ho of them.