Latest LQ Deal: Linux Power User Bundle
Go Back > Forums > Linux Forums > Linux - Security
User Name
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.


  Search this Thread
Old 07-16-2006, 02:23 PM   #1
Registered: Jun 2005
Location: Bosie, ID
Distribution: Fedora Core 4, Kurumin,BackTrack, Slackware 10.2, IPCop
Posts: 105

Rep: Reputation: 15
required Wireless Authentication

Okay, here's the deal:
A few nights ago, I noticed that someone had connected to my wireless network and was downloading something. Well, I left the access point open and was asking for trouble (mostly because I was having some difficult getting the wireless to work and never really closed it once it was). So, in my lock down attempts, I thought about what we need to do to access the wireless at school and work. Here's that rundown:
1) upon connecting, we are redirected to a webpage
2) we need to supply login credentials
3) we are handed a valid IP and have unlimited access to the internet.

After studying a little on the vulnerabilities of Wireless Networks, I have concluded that this is, probably, the safest way to go (after implementing all the others, that is). I would like to do this with Linux, but am unsure of where to go to get it done.

My AP is a LinkSys and will point (theoretically) to a RADIUS server. I configured, somewhat, freeRADIUS on Fedora Core 4 to act as that RADIUS server, but I'm unsure as to whether it is, indeed, the way to go.

Any thoughts? Mind you I would prefer to use all Open Source for this experiment.
Old 07-16-2006, 02:47 PM   #2
Registered: Mar 2006
Location: Edinburgh, UK
Distribution: debian
Posts: 304

Rep: Reputation: 30
Can you not just put some encryption on the access point? This is a good idea anyway as at the moment others can not only join your network, but also see whatever you are doing (wirelessly).

You can also usually restrict wireless access by device - so you only allow particular machines to connect (identified by hardware MAC address), but this is not totally secure.

Can you configure the access point at all?
If you've never tried this, try pointing at:
in your web browser.
(And you could always read the linksys manual)

Your solution sounds great, but unnecessarily complicated.
Old 07-16-2006, 04:32 PM   #3
Registered: Jun 2005
Location: Bosie, ID
Distribution: Fedora Core 4, Kurumin,BackTrack, Slackware 10.2, IPCop
Posts: 105

Original Poster
Rep: Reputation: 15
Yeah, I have WEP and MAC filtering. The big thing is that those alone are enough to discourage a lot of people from attempting. But what about those that it doesn't discourage? What about a business who insists on Wireless, implements all of those, but still is hacked? I would like to add the authentication to it to discourage all but the really gun-ho of them.


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off

Similar Threads
Thread Thread Starter Forum Replies Last Post
SQUID Authentication help required killerbrain Linux - Software 0 06-23-2006 08:13 PM
"407 Proxy Authentication Required." help super_teds Linux - Networking 1 11-18-2004 04:11 AM
Authentication required connecting FTP eaglemc10s Linux - Newbie 2 08-04-2004 10:36 AM
authentication required on smtp on local lan ashfaq Linux - Software 1 02-27-2004 05:56 AM
authentication required on smtp on LAN only. ashfaq Linux - Software 0 02-25-2004 11:54 PM > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 03:40 AM.

Main Menu
Write for LQ is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Facebook: linuxquestions Google+: linuxquestions
Open Source Consulting | Domain Registration