This thread has a lot of good advice on securing Puppy in itself. However, I can't see anything about securing WiFi here. I am no expert but is it not possible that, if you are connecting to the internet via a WiFi link that is insecure, then the very best security of your computer will not prevent an attacker obtaining sensitive info, e/g/ bank account details and passwords?
I have been a bit lax about security in the past but increasing levels of computer crime is starting to worry me. What really got me concerned was when my ISP provided me with a new WIFI router/modem. Immediately after it was installed, my iPad warned me about an insecure connection, because of TKIP. My ISP is a local company and has always had very high levels of customer satisfaction in the past. They do have one peculiarity, they prefer to keep the router management to themselves, hence I cannot see or change my router settings myself, I have to ask them to do it for me. I am now getting a bit concerned about this.
TKIP is known to be insecure and has been for quite some time. As far as I have been able to find out, currently the only safe WiFI encrption schemes are WAP2, using AES and WAP3. I have seen recommendations that the best current setting for home routers, is to allow WAP2-AES and WAP3 and no other schemes. This should be fine for any machine built in the last dozen or so years.
When I asked my ISP about the iPad message, I was assured that it was nothing to worry about, it was just Apple being weird. However, I later confronted them with the fact that iwlist also showed TKIP was switched on. The support guy then admitted that was true that TKIP was active on their routers. I asked him to disable TKIP on my router and he agreed. However, the following day, I re-ran iwlist and got:
Output from "iwlist wlan0 scan"
IE: IEEE 802.11i/WPA2 Version 1
Group Cipher : TKIP
Pairwise Ciphers (2) : CCMP TKIP
Authentication Suites (1) : PSK
IE: WPA Version 1
Group Cipher : TKIP
Pairwise Ciphers (2) : CCMP TKIP
Authentication Suites (1) : PSK
It appears that iwlist is being deprecated, so I ran iw and got a slightly different output:
Output from "iw wlan0 scan"
RSN: * Version: 1
* Group cipher: TKIP
* Pairwise ciphers: CCMP TKIP
* Authentication suites: PSK
* Capabilities: 1-PTKSA-RC 1-GTKSA-RC (0x0000)
WPA: * Version: 1
* Group cipher: TKIP
* Pairwise ciphers: CCMP TKIP
* Authentication suites: PSK
Is RSN just another term for WAP2?
Is CCMP another term for AES, as I assume from my Googling?
I assume that the above output is just what the router is offering to the clients?
I am running Fossapup64 9.5 frugally installed on a Thinkpad T400. The Internet connection wizard offers SNS, Frisbee and Network Wizard. Only the Wizard allows me to force WAP2 and even it provides no way to force AES (or CCMP?). Only Frisbee reports on the encryption of the network, after Frisbee sets it up, and it connects using WAP_TKIP, not even WAP2-TKIP.
How do I force WAP2-AES in Puppy? How do I check that the set up forcing has been successful? Are there later versions of the Puppy connection helpers that do a good job in this regard and do they work in Fossapup64 9.5?
If I can only setup some of my client devices to use WAP2-AES and others are still using TKIP, will I be safe only employing the AES-using devices for sensitive work, or not?
I am surprised that a relatively recent Puppy allows the naive user to set up an insecure network. Surely, this needs fixing in all Puppies?
Of course, the best solution would be to change the router allowable encryption. I will of course be taking this up further with the ISP. If they do manage to block WAP1 and TKIP, will that break the Puppy connection apps?
The new router is a Huawei DG8245V-10. There is very little useful on the web about setting up encryption on this router but, what there is suggests to me that there may not be a WAP2-AES ony nor a WAP2-AES + WAP3 setting available in the software. Way to make spying easier I guess!