Re: doc question on private network IP allocation

2011-10-18 Thread Shane Dawalt
On 10/18/2011 08:42 AM, Tim wrote: > On Mon, 2011-10-17 at 10:32 +0200, Reindl Harald wrote: >> your understanding of security is simply broken > No, yours is, if you believe that something that has no ability to > provide any security, can actually do so. > > It's been a MYTH for quite some time t

Re: doc question on private network IP allocation

2011-10-18 Thread Joe Zeff
On 10/18/2011 05:55 AM, Tim wrote: > But taking steps that actually*are* security steps, do make a > difference. Fooling around with dumb things that aren't security steps > do not help. Of course. I told them to be sure they had a firewall and anti-virus as well because being a "moving target

Re: doc question on private network IP allocation

2011-10-18 Thread Tim
On Mon, 2011-10-17 at 13:16 -0700, Joe Zeff wrote: > Back when I did tech support for an ISP, I used to tell callers that > having a dynamic IP address made their computer more secure, > especially on dial-up. Why? Well, even if somebody managed to get > into their computer they'd never be able to

Re: doc question on private network IP allocation

2011-10-18 Thread Tim
On Mon, 2011-10-17 at 10:32 +0200, Reindl Harald wrote: > your understanding of security is simply broken No, yours is, if you believe that something that has no ability to provide any security, can actually do so. It's been a MYTH for quite some time that MAC filtering protects your network. It

Re: doc question on private network IP allocation

2011-10-17 Thread Joe Zeff
On 10/17/2011 01:32 AM, Reindl Harald wrote: > if you have 5 easy to break security barriers in front you make it > real hard for most people without enough knowledge of all these > barrieres to break them all - nobody said these are the only > preventions - these are ADDITIONAL ONES Exactly. Bac

Re: doc question on private network IP allocation

2011-10-17 Thread Reindl Harald
Am 17.10.2011 10:22, schrieb Tim: > Tim: >>> Well, in the case of MAC filtering, it's nothing to do with >>> "security." It's merely closing an unlocked door in someone's face. > > Alan Cox >> No.. security is not a boolean. MAC filtering is very useful for >> stopping inadvertent plugging in of

Re: doc question on private network IP allocation

2011-10-17 Thread Alan Cox
O> > It's not a tool to prevent deliberate attack by users, and its not > > 100% effective against a very careful attacker but tht doesn't make it > > nothing to do with security. > > I'd say the fact that it *cannot* be used to "secure" a system, means > that it does have nothing to do with secur

Re: doc question on private network IP allocation

2011-10-17 Thread Tim
Tim: >> Well, in the case of MAC filtering, it's nothing to do with >> "security." It's merely closing an unlocked door in someone's face. Alan Cox > No.. security is not a boolean. MAC filtering is very useful for > stopping inadvertent plugging in of the wrong system. It helps prevent > accident

Re: doc question on private network IP allocation

2011-10-16 Thread Greg Woods
On Sat, 2011-10-15 at 09:02 -0700, Paul Allen Newell wrote: > . > > In your usage, is it through the router(s) that you enforce wired MAC > access? No, it's through the DHCP server. Only known MAC addresses can obtain an IP address. Yes, it is true that anyone can configure a machine manually,

Re: doc question on private network IP allocation

2011-10-16 Thread Bruno Wolff III
On Sat, Oct 15, 2011 at 12:48:05 -0700, Craig White wrote: > sure - buy a layer 3 managed switch (an unlikely candidate for home > implementations) You can implement mac address filtering on consumer gear if you are willing to reflash it to use something like openwrt. -- users mailing list us

Re: doc question on private network IP allocation

2011-10-16 Thread Alan Cox
> Well, in the case of MAC filtering, it's nothing to do with "security." > It's merely closing an unlocked door in someone's face. No.. security is not a boolean. MAC filtering is very useful for stopping inadvertent plugging in of the wrong system. It helps prevent accidents and unsafe systems b

Re: doc question on private network IP allocation

2011-10-15 Thread Paul Allen Newell
On 10/15/2011 12:48 PM, Craig White wrote: > > sure - buy a layer 3 managed switch (an unlikely candidate for home > implementations) > Craig: Thanks, I was just curious why it was only wireless and not both wireless and wired. Understand the "limitations" of MAC addresses ... as I mentioned ea

Re: doc question on private network IP allocation

2011-10-15 Thread Craig White
On Sat, 2011-10-15 at 09:02 -0700, Paul Allen Newell wrote: > On 10/15/2011 08:14 AM, Greg Woods wrote: > > On Sat, 2011-10-15 at 21:41 +1030, Tim wrote: > > > >> MAC filtering is utterly pointless. > > We use it on *wired* networks, primarily to prevent visitors whose > > laptops have not been pro

Re: doc question on private network IP allocation

2011-10-15 Thread Tim
On Sat, 2011-10-15 at 09:14 -0600, Greg Woods wrote: > We use it on *wired* networks, primarily to prevent visitors whose > laptops have not been properly vetted (and may be crawling with > malware) from connecting to our internal network. It is not expected > to keep out serious bad guys. Like mos

Re: doc question on private network IP allocation

2011-10-15 Thread Paul Allen Newell
On 10/15/2011 08:14 AM, Greg Woods wrote: > On Sat, 2011-10-15 at 21:41 +1030, Tim wrote: > >> MAC filtering is utterly pointless. > We use it on *wired* networks, primarily to prevent visitors whose > laptops have not been properly vetted (and may be crawling with malware) > from connecting to our

Re: doc question on private network IP allocation

2011-10-15 Thread Paul Allen Newell
On 10/15/2011 04:11 AM, Tim wrote: > On Fri, 2011-10-14 at 18:06 -0700, Paul Allen Newell wrote: >> All I have to do is convince them to do MAC access filter list and >> I'll be happy. > MAC filtering is utterly pointless. [...] Tim: Thanks for the comments. I have let my niece and roommates know

Re: doc question on private network IP allocation

2011-10-15 Thread Greg Woods
On Sat, 2011-10-15 at 21:41 +1030, Tim wrote: > MAC filtering is utterly pointless. We use it on *wired* networks, primarily to prevent visitors whose laptops have not been properly vetted (and may be crawling with malware) from connecting to our internal network. It is not expected to keep out

Re: doc question on private network IP allocation

2011-10-15 Thread Tim
On Fri, 2011-10-14 at 18:06 -0700, Paul Allen Newell wrote: > All I have to do is convince them to do MAC access filter list and > I'll be happy. MAC filtering is utterly pointless. It *cannot* stop someone who wants to connect, it's completely impossible, because they can easily change their MAC

Re: doc question on private network IP allocation

2011-10-14 Thread Paul Allen Newell
Dave: inline comments On 10/14/2011 06:29 PM, Dave Ihnat wrote: > >> The important thing to me is that they are on WPA2 and have both a rich >> key and admin password. > Now that's a totally different can'o'worms--you're talking wireless > requirements, which is layered on top of the network

Re: doc question on private network IP allocation

2011-10-14 Thread Dave Ihnat
On Fri, Oct 14, 2011 at 06:06:38PM -0700, Paul Allen Newell wrote: > Thanks for the email replies. Thanks, always try to help. > The take I come away with from your three > emails is: > 1) assume *.0 and *.255 are reserved, Not just reserved--absolutely committed to their definition. > 2) ther

Re: doc question on private network IP allocation

2011-10-14 Thread Paul Allen Newell
Tim, Joe, and Dave: Thanks for the email replies. The take I come away with from your three emails is 1) assume *.0 and *.255 are reserved, 2) there is no standard, just personal conventions -- and that a group using a router should have a convention, and 3) let DHCP handle it if possible. If I

Re: doc question on private network IP allocation

2011-10-14 Thread Dave Ihnat
On Sat, Oct 15, 2011 at 01:32:47AM +1030, Tim wrote: > Out of the various IP ranges [1] that are available for private use, > because they are not, and will not, be used as public IPs on the > internet, ... Very specifically, look up RFC1918, where these ranges were defined. > It's common practic

Re: doc question on private network IP allocation

2011-10-14 Thread Joe Zeff
On 10/14/2011 12:59 AM, Paul Allen Newell wrote: > Can anyone point me to a website that gives good advice on how one > should alloc one's local ip addresses? Unless you need to have static IPs for port forwarding or some other specific use, just let the DHCP do it and save yourself a lot of poi

Re: doc question on private network IP allocation

2011-10-14 Thread Tim
On Fri, 2011-10-14 at 00:59 -0700, Paul Allen Newell wrote: > A long time ago when I first struggled and figured out how to set up a > LAN network, I got some advice about how I should alloc the numbers. 1) > start static address at *.*.*.10, 2) put WAPs at *.*.*.245, and 3) for a > gateway of

doc question on private network IP allocation

2011-10-14 Thread Paul Allen Newell
Hello to all: A long time ago when I first struggled and figured out how to set up a LAN network, I got some advice about how I should alloc the numbers. 1) start static address at *.*.*.10, 2) put WAPs at *.*.*.245, and 3) for a gateway of 192.168.1.1, assign your router that connects to the 3