Quote:
Originally Posted by Welly Wu
Seek someone whom you can trust with a background in UNIX clones such as BSD or LINUX if you decide to go that route with an OpenBSD firewall with RADIUS and MyDNS deployed -- or train such a person yourself before you leave the site.
|
Such a person, sadly, does not exist. I live in hick central, you forget. There's exactly one person in the church who would even think of trying to learn *nix, Wi-Fi, and so on, but he's a contractor and insanely busy.
Quote:
Never let the technical details supercede the project's goals and the day to day operations required by the people in mind; the last thing you want to do is to make it so complex and hardened that nobody can manage it when you are gone (but they will remember that you were responsible for creating the infrastructure). |
Precisely my problem. I could whip up a wonderful system that'd be secure, effecient, and expandable, but no one else could fix it if it went bad.
Quote:
Stick with Windows 2000 Professional with SP-5 installed. Stick with WPA-PSK TKIP and draw up diagrams of how to lay down the infrastructure. Setup Windows so that it will automatically download the latest updates, patches, and service packs during off-peak hours because that compromise will smoothen out day to day operations. |
They're all using XP Pro. Came with the computers. I highly doubt I'm going to get them to downgrade. Besides, XP isn't all that bad. And yes, they are all kept up to date, including Spybot, Ad-Aware, and whatever A/V software is installed. (currently, a mix of McAfee and Norton. I personally hate them both, but whatever...)
As for WPA-PSK, have you ever heard of
NoCat? I found it in
Wi-Foo. (which is an excellent book if you're looking to get into Wi-Fi security) My current thoughts are to go with this. It doesn't seem to have any downsides, nor does it seem prone to security holes. It uses GPGP to sign and authenticate the logon process, so the chance of breaking the encryption is virtually nil. Someone would have to manage to break into a client that contained the private key to get anywhere.
My bigger problem currently is actually getting the network to function correctly. Roaming goes in and out. Highly annoying. Actually, more so than that (should have heard my thoughts on it last night while driving home...), but I'll leave it as such. I'm going to go back there on a day when there's no around to bug me, or who wants to use the internet.
Quote:
Enable MAC Filtering with spoofing protection and restrict any unused IP address space. |
Spoofing protection? I'm not sure what you mean by that. You could have the WAP/gateway run a RARP to match the MAC to the IP, but if someone knocked a client off the network (which is very easy to do), they'd just assume both of those, and you'd never know unless you implemented IDS. I don't care enough, nor do I wish to deal with the alarms and headaches associated with that.
Quote:
Teach them what SSID means, enable broadcasting, and stick to a single frequency channel for greater future hardware compatibility sake. |
After everything's up and running, I'm going to schedule a mandatory meeting for anyone who uses or will use the network. Teach them basic security principles, troubleshooting, and so on. They
will learn.
Quote:
Do not modify any of the advanced Wi-Fi settings as it is useless complexity for the people and project's goals. Be cautious of setting up a DMZ or port forwarding / triggering. Forget the remote login and uPNP completely as it would be tantamount to leaving the iron door ajar. Stay away from more sophisticated encryption systems and algorithms because that limits future hardware compatibility should the people at the church decide to upgrade their current network topology or add / remove hardware dependent on "traditional Wi-Fi standards." |
I haven't touched DMZ. See no reason too. As for remote administration, I would only if I set it up to run through an SSH tunnel. I might do that eventually, but for now, I'm just going to leave it disabled. I can do a fair amount with SSHing into the router. If I end up setting up a Linux/BSD (still not sure... it's not like Linux is insecure, and I know it well. Never used BSD) box, I'd definitely be using SSH on that. Of course, it also introduces the problem of keeping it up to date security wise. I could install Fedora or a similar GUI system, as they could figure that out fairly easily, but I'd prefer to keep it small and simple.