Security Concerns

When using an open wireless network, all traffic between your laptop and the access point is sent in the clear to anyone in range. When using WEP, anyone who shares the same WEP key can listen in on your traffic as if it were an open network. How can you protect your data from prying eyes while using wireless? The best possible protection is provided by end-to-end encryption, which is provided by tools such as SSL, PPTP, and SSH. For example, browsing to an SSL-enabled web page will keep your conversation private, leaving any would-be eavesdroppers with data that looks much like line noise. The encryption and identification facilities provided by the 128-bit SSL implementation is widely regarded as “good enough” for use over untrusted networks, both wired and wireless.

SSL may be fine for web pages (and some mail clients), but what about protecting other traffic? The following is one method for securing your email using OpenSSH.[16] For a more thorough exploration of the possibilities of SSH, I highly recommend SSH, The Secure Shell: The Definitive Guide (O’Reilly).

OpenSSH is being developed for BSD, but thanks to the great work by their porting team, it compiles under many Unix-like operating systems (including Linux, Solaris, HP/UX, Mac OS X, and many others). You can even use it in Windows with the Cygwin package (check out http://www.cygwin.com and download it now, if you haven’t already; it almost makes Windows fun to use!).

Download OpenSSH and build it. ...

Get Building Wireless Community Networks, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.