Encrypted Wifi: Difference between revisions

From Noisebridge
Jump to navigation Jump to search
No edit summary
Line 1: Line 1:
== NoiseBridge Secure Wireless ==
== NoiseBridge Secure Wireless ==
The network at Noisebridge - like any public network - should be regarded as potentially hostile. This means that you should assume that any unencrypted communications over the network could (and most likely are) be monitored by others. Examples of vulnerable communications include POP3/IMAP email clients, most web browsing, IRC/AIM and similar chat protocols that are often not encrypted. While no issues have come up to date, and our code of conduct opposes malicious monitoring of others, it is wise to be aware of the potential. Stick to using SSL or secure tunnels or VPNs for anything that uses a password or that you otherwise wouldn't want other people to read. If you don't know how to protect your communications with encryption, many people at Noisebridge would be glad to help you out! Noisebridge Class Pwn_Your_Own is a good place to get more information about security concerns. although not as secure as SSL, Secure Tunnels, or VPN's noise bridge also has Secure Wifi available for both testing and more secure browsing, WEP, WPA, and WPA2 networks have been made available. However, it is also recommended that other precautions be taken than simply using the secured network.


Due to the insecurity of noisebridge's open network Carl is attempting to get secure networks in place to allow noisebridge patrons a secure environment for transmission of data, as well as testing. secure networks will include WEP, WPA, and WPA2. hacking is encouraged however any changed settings should be recorded on network change logs.
==Maintenance==
hacking is encouraged however any changed settings should be recorded on network change logs.
we are currently looking for 48V cisco adapters for higher grade routers and/or wireless network gear to improve our network.


Network: [[Noisebridge WEP]]  Password: noisebridge <br>
Network: [[Noisebridge WEP]]  Password: noisebridge <br>

Revision as of 00:23, 7 December 2010

NoiseBridge Secure Wireless

The network at Noisebridge - like any public network - should be regarded as potentially hostile. This means that you should assume that any unencrypted communications over the network could (and most likely are) be monitored by others. Examples of vulnerable communications include POP3/IMAP email clients, most web browsing, IRC/AIM and similar chat protocols that are often not encrypted. While no issues have come up to date, and our code of conduct opposes malicious monitoring of others, it is wise to be aware of the potential. Stick to using SSL or secure tunnels or VPNs for anything that uses a password or that you otherwise wouldn't want other people to read. If you don't know how to protect your communications with encryption, many people at Noisebridge would be glad to help you out! Noisebridge Class Pwn_Your_Own is a good place to get more information about security concerns. although not as secure as SSL, Secure Tunnels, or VPN's noise bridge also has Secure Wifi available for both testing and more secure browsing, WEP, WPA, and WPA2 networks have been made available. However, it is also recommended that other precautions be taken than simply using the secured network.

Maintenance

hacking is encouraged however any changed settings should be recorded on network change logs. we are currently looking for 48V cisco adapters for higher grade routers and/or wireless network gear to improve our network.

Network: Noisebridge WEP Password: noisebridge
Network: Noisebridge WPA Password: noisebridgewpa
Network: Noisebridge WPA2 Password: noisebridgewpa2

Router Change Log

Set user name to root. set password as toor