| 1:36 pm on Sep 1, 2004 (gmt 0)|
Use any cordless phones? - try switching the channel on the router/access point, interference is not uncommon.
| 1:56 pm on Sep 1, 2004 (gmt 0)|
The phones are cordless and I have changed the wireless channel but still no difference.
| 3:01 pm on Sep 1, 2004 (gmt 0)|
I too have just gone wireless. I've not experienced the problems you have but I have read all of the information available concerning what might cause problems.
If you are connecting to a 2.4 GHz wireless network (b) which you most likely are, there may be other devices near your router that are interfering. Phones, microwaves, etc. are all listed in the user guide as devices which may cause router issues.
If you go to the Linksys website and go to the products selection, select your product and read the online user guide. There is a good chance your question will be answered there.
P.S. When it comes to gaming, there may be additional issues that need to be addressed.
P.S.S. One of the first suggestions in the online user guide is to test close to the router and then move away in increments until you start to see the problem. It could be that you are experiencing interference from something within your environment which is limiting your wireless range.
| 3:17 pm on Sep 1, 2004 (gmt 0)|
First problem is that most wireless devices are half duplex. This means that it can only send or receive data not both at the same time. It does not travel through walls very well. It does travel through them but the more it goes through the worse it is. It does not travel through metal or water at all. If your signal is strong and you are still getting problems that means there is some interference (collisions)
Your best bet is to mess with the channels. You should only try 1, 6, or 11. Donít use any other channel. That is the only way wireless can have 3 separate channels. Also if you have the security on that could be slowing it down as well. The only security you need is to only allow your MAC address. If you are truly that paranoid none of the onboard security is that good. You would need to get some third party encryption.
| 3:32 pm on Sep 1, 2004 (gmt 0)|
elgumbo, I'm delighted that you started this topic! I have lots of questions too...
|If you are truly that paranoid none of the onboard security is that good. |
ogletree, are you referring to all Linksys routers or just the one(s) you've had experience with? I just purchased their latest WRT55AG dual band wireless A+G. I've spent the last 5 days getting a new system in place at the home office. During that time I've been through every menu available for the router configuration. I've also read the online manual in regards to security and have adjusted my settings accordingly.
Can you expand on the security issues that you see so that those of us less wireless savvy have a good understanding of what to do and what not to do?
| 4:15 pm on Sep 1, 2004 (gmt 0)|
Only very expensive wireless ap's have full duplex. Yours does not. The only security that I use is to restrict the ap to only accept my MAC address. The mac address is on your card. There should be a place in the AP to restrict all MAC addresses except yours. Turn all other security off.
| 4:16 pm on Sep 1, 2004 (gmt 0)|
Hi Elgumbo. I met you at the conference in London :)
So I think I know what your problem may be. I have this every time I get a new laptop.
Some wireless access points don't handle the power save functions of the Intel Pentium Mobile chips properly.
To get around this problem you need to go to the network connection properties for your wireless adaptor, click configure, and go to advanced. Uncheck the default value for transmit power and set it to maximum.
That usually does it for me :)
| 4:21 pm on Sep 1, 2004 (gmt 0)|
>>Can you expand on the security issues that you see so that those of us less wireless savvy have a good understanding of what to do and what not to do?
My IT man tells me there are security holes in the secure wireless protocol. In the town where I live it's a common hobby to drive around sniffing for wireless networks and breaking in.
Even if you have MAC address filtering turned on they can sniff your MAC address and emulate your PC.
But is your info really that valuable? I'd only be worried about the taxman listening in :)
| 4:36 pm on Sep 1, 2004 (gmt 0)|
If you have broadcast SSID off and use MAC address security there is no way for a wardriver to break into your system without a tremendous amount of effort parked outside your house. You have to be real carefull with "computer guys" very few of them have real training and base most of their statements on things they have heard or most the time just made up. I have been in the IT industy since 97 and have known a lot of high paid idiots. Very few people in the industry have a clue of what they are doing. Basic IT is so easy that anybody that makes the smallest effort can figure it out. They and people around then think they are experts in the field. I was trained by Cisco on wireless technology and have read a lot of stuff on it.
| 5:08 pm on Sep 1, 2004 (gmt 0)|
<Can you expand on the security issues that you see so that those of us less wireless savvy have a good understanding of what to do and what not to do?>
The other security features are things like WEP, which is known to be easy to break. Someone needs only to listen to your network and collect about half a million packets of data to be able to crack the WEP key and get into the system. Collecting this many packets can take anywhere from 15 minutes to several days depending on how much traffic your wireless network produces.
Using a combination of MAC filtering and WEP is a good idea, IMO, as it provides two layers of security. These are mainly deterants for someone trying to break into an arbitrary network and will often cause them to move on to the next. WEP takes a little bit of processing power, but all of your equipment should be able to handle it without noticable slowdown.
If you're looking for additional security, you'll want to setup something that is higher level like a VPN. Take a look at OpenVPN.. it's available for download at Sourceforge and is cross-platform. The Linksys WRT boxes are basically little computers running Linux. Linksys has opened up all of this code to the GPL, and so the source is also available from their website. You can compile and install your own customized firmware onto these boxes, including OpenVPN, which will give you security that's equivilent to that an SSL or SSH connection.
If you don't want to get into recompiling firmware, then the next best option is to setup a Linux box on your network as an OpenVPN server that will act as your wireless gateway. All wireless traffic is forced through this server, and this server only passes traffic that comes in through the VPN connection. OpenVPN supports either OpenSSL or a shared secret key.
<But is your info really that valuable?>
Most people's info is more valuable than they think, unless they don't care about identity theft :-).
<If you have broadcast SSID off and use MAC address security there is no way for a wardriver to break into your system without a tremendous amount of effort parked outside your house.>
It's actually much easier than that. While your AP is not going to broadcast itself, your SSID is going to be included in the header of every packet that your wireless network transmits. A wardriver would know your SSID the instant that your wireless network is used. And even if you're using WEP, the SSID is included in the unecrypted portion of the header. So even with WEP turned on and broadcast turned off, the SSID is readily available.
This, however assumes that you're using something like Kismet (on Linux), which will be able to get the SSID from packets sent on the network. Netstumbler (on Windows), AFAIK, cannot.
<You have to be real carefull with "computer guys" very few of them have real training and base most of their statements on things they have heard or most the time just made up. I have been in the IT industy since 97 and have known a lot of high paid idiots. Very few people in the industry have a clue of what they are doing. Basic IT is so easy that anybody that makes the smallest effort can figure it out. They and people around then think they are experts in the field.>
I've been around the computer industry for a long time and I would have to agree with you completely.
<I was trained by Cisco on wireless technology and have read a lot of stuff on it.>
I'm basing my statements on my own experiences with wifi over the past five years (I've done all of these things that I'm talking about).
| 5:08 pm on Sep 1, 2004 (gmt 0)|
I had similar problems. My laptop was located just about 10m from the wireless router, I left the two doors in between open (router in one room, me in the other, between a hallway). I am not sure anymore whether I had sight contact with the router (was installed at the ceiling).
Whenever there were people around I had to reconnect.
| 5:17 pm on Sep 1, 2004 (gmt 0)|
I understand what you are saying but it is not easy for most people. I don't know why someone would bother it would be easier and cheaper to break into someones house. Any moron can break into your house. Turn the firewall on your computer on you are then just as safe as you are on cable modem. Anybody at your ISP or any ISP you travel through can read your emails and watch your traffic.
| 6:08 pm on Sep 1, 2004 (gmt 0)|
> playing online games
Are you talking about Internet multi-player games like CounterStrike, Doom III, or WarCraft III? These type of games require fast response times ("quick pings") to perform adequately. When I bought the first LinkSys wireless router on the market, I remember the response time was unacceptable for online games. It was fine for e-mail and web browsing, but I did notice a slight delay after every request.
If you play games daily or weekly, I'd opt for an actual ethernet cable run from the router to your other computers. That is the only way for online gamers.
| 7:10 pm on Sep 1, 2004 (gmt 0)|
Unless your data is REALLY valueable, just turn off your SSID, use a MAC filter or a WEP, or both. Most times wardriver will just keep going to the next AP if yours presents any measures that will cause them to spend time breaking in.
Ever consider getting a wireless bridge? Maybe there is just too much interfearance, or your card is too weak to reach your current AP. Try adding a bridge to repeat the signal before discarding the whole idea.
| 8:45 pm on Sep 1, 2004 (gmt 0)|
You can get a couple of wired ethernet ports installed in your house for less than £150. (The cables go under the floorboards)
Fewer security issues
Online games work
And you generally have to plug laptops in to the mains anyway, so you are often wired even on a wireless network.
| 9:19 pm on Sep 1, 2004 (gmt 0)|
Ish - persuasive, but no way.
Ever since I went wireless I never went back. I can call the fixed telephone net now using Skype and I am semi-mobile because I can walk around the house with my laptop and not drop the call. The other day I took the laptop to the toilet (while I was on a phone call :))
I like to use my laptop everywhere in the house. Not just where I can plug in!
| 12:31 am on Sep 2, 2004 (gmt 0)|
>>I understand what you are saying but it is not easy for most people.
Spot on. My eyes have glazed trying to keep up. I went wireless about a year ago and had similar problems. I disconnected security altogether and bought a 5.8ghz phone. Problems solved.
| 12:56 am on Sep 2, 2004 (gmt 0)|
My laptop allows me flexibility in my home/office work space but I don't need THAT much flexibility! :)
|I took the laptop to the toilet |
After hearing numerous tails of woe about wireless connections and intrusions I chose Home Plug Power Line Adapters [homeplug.org]. They're limited to 10Mbps so far, but bulletproof reliable, and reasonably secure. After just over a year's use, I'm still pleased! And it didn't take long to develop the habit of plugging in a second plug whenever I laptop.
I could do that in the bathroom too I guess... ;)
| 1:18 am on Sep 2, 2004 (gmt 0)|
<I understand what you are saying but it is not easy for most people.>
I'm not worried about most people, because most people aren't wardrivers :-).
<I don't know why someone would bother it would be easier and cheaper to break into someones house. Any moron can break into your house.>
If someone can break into something without you knowing that it's happen, there's a good chance that it can, or already has, happened.
It's easy to break into a house by smashing a window, but then it's also very difficult to cover your tracks. We do things that are common sense like locking the doors and windows. Without those safeguards, someone could enter your house and you may never know, because they haven't damaged anything. This is the worse kind, because you don't even know that it happened.
When it comes to breaking into a network, it's very difficult to track someone, which means that it's much more likely to happen because they know they probably won't get caught. It's not simply a matter of how easy it is.
This is how things like identity theft work. You feel that your safeguards (MAC ACL alone) are sufficient.. that's probably because you've never seen anyone in your system. That either means that A) your safeguards are good enough, or B) your system is easy to enter without being seen. Why do you assume that it's the former and not even consider the latter?
Again, this is from experience. It is very easy to break MAC ACL and WEP, given that the network has any traffic. Normally someone would not do this. But if open wifi networks are scarce (depends on where you live), or if someone is targetting you specifically (probably not, though the guys that know what they're doing are always the ones that like a challenge), then it won't be passed up for the next AP.
<Turn the firewall on your computer on you are then just as safe as you are on cable modem.>
If you turn the firewall on on an individual workstation, you lose the services that you'd normally have on a LAN, like file and print sharing. If you open ports to allow those services, then you've effectively defeated your firewall, as those are the services that are easiest to exploit. The challenge is to secure the entire network without removing the desired functionality of the LAN.
However, if your machines don't send any to each other, and you have a network solely for the purpose sharing an internet connection, then this may be the way to go.
<Anybody at your ISP or any ISP you travel through can read your emails and watch your traffic.>
Well sure.. but anyone that has any common sense about email isn't going to send something through email that they want hidden or kept secret, because they should know that email is plain text all the way through and inherently insecure. As far as the rest of the traffic, I really don't care that someone at my ISP may be watching me write this message on Webmasterworld.
What I do care about is personal data (social security numbers, credit card numbers, passwords, company documents, etc). None of this is ever done unencrypted. When I access my email remotely (email over IMAP), I do so using SSL.. not because I'm concerned about the privacy of the email, but rather the login credentials to access the email.
Assume that at any time anyone can intercept anything that you send over a network (because they can).. and act accordingly. If you don't care that information leaks out, then that's fine.. just so long as it's understood that it's easier to do than most people think.
<Unless your data is REALLY valueable, just turn off your SSID, use a MAC filter or a WEP, or both.>
Most people that I know have data like credit card numbers or passwords that they don't want anyone to know -- I know I do. To me, that is REALLY valuable data. If anyone disagrees with me, and this information is not valuable, please reply with your detailed banking information :-).
<Most times wardriver will just keep going to the next AP if yours presents any measures that will cause them to spend time breaking in.>
That's true.. I live in a fairly nice neighborhood, and most times if I leave the door to my car unlocked nothing will happen to it. However, I'm not concerned with what will happen most times.. I'm concerned with what will happen every time. I want a 100% failure rate for anyone that tries to get into my network.. not just most times.
It used to be that 10 years ago, even five years ago, people considered computers a novelty item. That's just not true anymore.. they're almost a necessity for many people, like a telephone. And a lot of people are putting important information into their computers. There are more than a few blackhat hackers that know this and are more than willing to take advantage of people that don't understand proper security. It's the "it couldn't happen to me" syndrome.
<My eyes have glazed trying to keep up.>
I love Jeeps.. and I've always wanted one. Several months ago, I finally got my first (1994 Grand Cherokee).. and it had a bit of damage to the CV joints. I don't know much about vehicles.. except how to drive them and fill them with gas (well, a little more than that, but you get the idea). My mechanic told me that the joint would be fine if I didn't do any offroading. Apparently a lot of people drive around with bad joints and don't even know it because they stay on paved surfaces.
A few weeks later, my family and I went camping, and I couldn't resist. Two days later, I heard clunking noises coming from the front of the vehicle. It drove just fine, but I was very paranoid to ride it with the excessive amount of noise it was making. So I took it in.
My mechanic looked at it, he spent some time explaining to me what had happened and what needed to be done and why.. during this one-way conversation I had a look in my eyes very similar to the one you probably had when you read my previous post. The only thing I really remember from the conversation is $1,100. However, he did show me the damage to the joint and it was apparent that it needed fixing.
The moral here is that while many people may not understand the details of how something works, it's a good idea to understand the reason for them. I don't expect everyone in the world to become technical security experts and how to customize syslogd to function on their Linksys WRT. However, I do think it's reasonable to expect, (if not today, hopefully sometime soon), the reason why it's important. Unfortunately, this is a the kind of thing that a lot of people will have to get bitten by before they get it.
<I disconnected security altogether>
I'm sure you've had more than one intruder into your network. Most likely, they've all simply been looking for bandwidth. That's not always the case.
<and bought a 5.8ghz phone>
This was a good move, however :-).
| 1:59 am on Sep 2, 2004 (gmt 0)|
Wow, lots of information to assimilate here. You guys/gals have me searchin' all over the place for those initialisms, abbreviations, acronyms, etc. Their all new to me. ;)
The Wired Equivalent Privacy (WEP) algorithm is part of the 802.11 standard.
MAC (Not a Macintosh)
Media Access Control Address
A hardware address that uniquely identifies each node of a network.
The Service Set IDentifier is a token which identifies an 802.11 (Wi-Fi) network.
The Access Control List is a set of data that informs a computer's operating system which permissions, or access rights, that each user or group has to a specific system object, such as a directory or file.
Now, there was mention of the 5.8 GHz phone. What about my router that has the 5GHz band?
Would a service like that from GRC (https://grc.com/x/ne.dll?bh0bkyd2) be sufficient for testing a wireless network from a security standpoint? My system(s) have always shown stealth mode for all services and they still do today.
| 8:18 am on Sep 2, 2004 (gmt 0)|
The Wired Equivalent Privacy (WEP) algorithm is part of the 802.11 standard.>
Unfortunately, (or fortunately, depending on your perspective), WEP is easily crackable with free tools that can be found online. But it is good to use this to deter novice hackers.
<MAC (Not a Macintosh)
Media Access Control Address
A hardware address that uniquely identifies each node of a network.>
Yes, this information is hard-coded into the network device by the manufacturer. Every network interface, whether it's a wired or wireless NIC (network interface card) in your PC, networked printer, or even a router has a MAC address that is unique from any other network device in the world.
With Linux, it's fairly easy to spoof your MAC address. With Windows, I'm not sure if it's possible.
The Service Set IDentifier is a token which identifies an 802.11 (Wi-Fi) network.>
This is essentially the network name, and is used to connect a set of clients to an AP (access point). You tell your computer the SSID to connect to when configuring it (or it detects ones within range and presents a list to you for you to choose). Most APs by default will broadcast their SSID so they can be picked up, which makes it easier for you to connect to them. In the same way, someone else with a wifi-enabled laptop can also see that your network exists by receiving this SSID broadcast.
Each packet that is sent over a network includes the SSID in the header. For a novice hacker, the network may appear invisible. For an expert, it'll add about 10 seconds to the total amount of time required to break into a network.
The Access Control List is a set of data that informs a computer's operating system which permissions, or access rights, that each user or group has to a specific system object, such as a directory or file.>
In this context, it's referring to an access control list that contains a list of MAC addresses that the AP is allowed to communicate with. If your network card's MAC is not on this list, it will not accept communications from you.
Here are the downsides. First, it's easy to spoof a MAC address. All you would need to do is listen for a few packets and find a MAC address that is being used, then pretend to be that computer. Second, MAC addresses only prevent the router from accepting packets from a non-authenticated host. It does not prevent a non-authenticated third-party from eavesdropping.. they can still see everything if you're using MAC ACL only (without encryption).
<Now, there was mention of the 5.8 GHz phone. What about my router that has the 5GHz band?>
That would depend. If your router is A-only (802.11a), then you'd want to find the begining and ending of the 5.8GHz phone's range (might be something like 5.8GHz - 5.9GHz). While B and G only have 11 channels ranging from 2.4GHz to 2.485GHz, A has many more channels. You'll want to choose one that is not within range of what your phone uses.
If your AP is A/G or A/B/G, and you are not using A mode (meaning that your wifi network is operating in the 2.4GHz range), then your phone will not cause any problems.
<Would a service like that from GRC (https://grc.com/x/ne.dll?bh0bkyd2) be sufficient for testing a wireless network from a security standpoint?>
Nope.. this tests the link over the internet from GRC to you, so it's basically testing out your router. Most likely your AP is either inside the LAN (either by being built-in to the router or being plugged into a LAN port on the router), which means that anyone connected to the wireless interface is not subject stealth to the rules implemented by your firewall.
| 8:40 am on Sep 2, 2004 (gmt 0)|
We have three computers and three laptops with on ADSL connection. This thread has been a great help as we are planning to go wireless with in the next month.
| 9:04 am on Sep 2, 2004 (gmt 0)|
Thanks for all the replies - it seems that a lot of people have a lot of questions about going wireless ;)
In my case I know there is no obstruction between the router and the adapter (it's sat on top of it at the moment) but I'm still not downloading files over 10Meg so I will speak to Linksys about this as it seems this should not be happening.
The problem with online games (Call of Duty, etc) seems like it is the norm, which is disapointing and would have persuaded me to drag cables all over the house (despite my wife's protests). I'm stuck with the wireless option for the time being but I may wireup my pc and just use the wireless for laptops etc at some point in the future.
I did understand a little about the security implications of going wireless but it shocked me how little was said was about it when installing the router. It was more like, "...well there are some security features if you want to use them but we won't tell you what the differences are". Considering they are now selling these routers in Staples I would have thought there are a lot of unsecured networks out there.
ps: Sly Old Dog - Good to speak to you again :) Hope business is good for you and you're dodgy brother ;)
| 10:18 am on Sep 2, 2004 (gmt 0)|
Investigate WPA. Its simple to setup, and good. Just use a preshared key of > 20 random characters (preferrably as long as the box allows) and it should be more than adequate for most people's needs. It doesn't have the same problems WEP does.
| 3:39 pm on Sep 2, 2004 (gmt 0)|
|but I'm still not downloading files over 10Meg |
I can't find it now, but I know when I was setting up my wireless LAN at home, I saw something on a web site about checking the default speed on the router. Seems that some are defaulted at the factory to a slower speed.
I'll keep digging to see if I can find the specifics...
| 5:39 pm on Sep 2, 2004 (gmt 0)|
Remember, theoretical max under best conditions for 802.11b is 11 Megabits Per second (1.375 Megabytes per Second).
802.11g is 54 Megabits Per Second (6.75 Megabytes per Second).
| 6:02 pm on Sep 2, 2004 (gmt 0)|
Best case scenario is 5Mbps because of the overhead in 802.11b in windows. Linux is a little better because of the way the 2 different os's handle networking. There is a lot of redundantly in 802.11b. The same signal is sent out over several channels for reliability. I think G is faster because they took some of that out. The original spec overdid the redundancy.
| 7:18 pm on Sep 2, 2004 (gmt 0)|
<Considering they are now selling these routers in Staples I would have thought there are a lot of unsecured networks out there.>
Tons! I'm building a device that allows me to connect to wireless networks on-the-fly and passes that connection from network to network while in transit.. similar to the way a cellphone hops from tower to tower when you're talking on the phone and driving. It's all dependent on the many thousands of open wireless networks :-).
<Investigate WPA. Its simple to setup, and good. Just use a preshared key of > 20 random characters (preferrably as long as the box allows) and it should be more than adequate for most people's needs. It doesn't have the same problems WEP does.>
I agree.. WPA is better than WEP. One of its biggest advantages now is that it's rather new and so only a small percentage of equipment out there supports it. The best way to take full advantage of WPA is to use an authentication server that provides RADIUS service, as opposed to using PSKs (pre-shared keys) as most consumers will end up doing.
| 9:32 pm on Sep 2, 2004 (gmt 0)|
I'm just thinking about about WEP and WPA2, etc, and I was wondering if WEP is built into the hardware?
I was thinking a while ago of setting up a FreeBSD box as a Wireless Access Point, but stopped short when I started reading about the vulnerabilities in WEP Keys.
That got me to wondering whether you can "Switch" to WPA2 when the protocol is fully developed, or is it built into the cards themselves, so you're either on WEP or WPA2?
| This 38 message thread spans 2 pages: 38 (  2 ) > > |