Re: Installer inadequacies

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, 2013-01-21 at 17:15 +0100, Reindl Harald wrote:

...complete snippage of what indicates why he gets moderated...

The original topic /was/ what it was, and still is, the offshoot thread
is what /that/ is, separately.  That's how mailing lists work.  People
discuss the bits that they discuss, in the parts of the thread that they
want to.  In general, replies are *to* *the* *list*, about whatever was
written in the message, far more than specifically to a singular person,
get used to that.

You argued a point, and I replied to it specifically.  It just happened
to be you.  Previously, a message or two up the thread, it was someone
else.  Next you argue that the thread was about something else, and I
don't disagree with that.  But you had changed from the original topic,
too.  Pot, kettle, black.

The following is not specifically for you, but it's clear that you need
to understand it, as well other people reading this list need to
understand it.

                  -----------------------------------

Whether it's a bug, or not, that the <whatever> (as appropriate to many
different networking related discussions) cannot handle SSID was not
what *I* was talking about.  It's certainly a problem, though, and
people keep arguing against the easy solution, for all the wrong
reasons.  That was the main thing I touched upon.

Security by obscurity is a false belief,
it's better stated as insecurity by placebo,
or delusion by stupidity.

Hiding an SSID can "never" prevent a connection, it's just as useless as
sticking a piece of paper on a terminal with "do not hack" written on it
- completely ineffectual.  Hiding it doesn't even prevent discovery of
the access point.  It doesn't require hacking skills.  It's not even
reliable against accidents.  And networking accidents are going to be
the main experience of users with hidden SSIDs, more than hacking is.

Anyone who follows this bad advice will believe they've secured their
system, when they haven't.  And, quite rightly, will say that they've
been lied to, the moment they realise that they suffered because of it.
Placebos are not harmless, they actually do cause harm when the person
being fooled doesn't get what they actually need.

Security by layers is increasing security by stacking actual security
measures on top of each other.  A well-enforced password (choice of
password, and requiring its use in appropriate places) is a security
measure.  Strong encryption is a security measure.  Requiring both is an
example of increased, layered, security.  Tacking on another procedure
that isn't actually a security measure doesn't increase security, at
all.  And can even be more than just a waste of time.

Hiding an SSID does cause network problems.  It was a technical
requirement, and networking software was written depending on its
presence.  Even when /some/ software can work without it, because other
methods may be used to identify it, there's still a human level that
requires it.

For example, I can turn on my computer, and find that I'm surrounded by
three "unnamed access points," and I do not know which one to use.
There's nothing that tells me which one is which.  I am left with trying
each one, in turn, to see which works.  And I may well connect to the
wrong one, and keep on using it, because it seems to work.  Next time
I'm presented with the same situation, I have to go through the same
process again, because there's no clues in the list.  Nor can I rely on
the access points being listed in the same order, so I can't just choose
what I thought I chose, last time.  And I can't even tell if it's the
same access points as last time, or whether any of them are different
ones.  That information is simply not shown to me in the menu of
choices.

Yes, I may be lucky in that my software can use another identifier to
connect to the same access point as last time.  But that's just luck.
My software may not manage it, simply because of the way it was
programmed.  Or the same access point mightn't be around, or active at
the moment my computer is trying to connect.

SSID is mean as an identifier, a name, for the access point(s), and
that's all it's for.  It's not a secret.  It's not part of security.
Telling people which network is which (via SSID, or other methods) is
not part of security.  This is a cold hard fact, and no false beliefs to
the contrary can change that.

-- 
[tim@localhost ~]$ uname -r
2.6.27.25-78.2.56.fc9.i686

Don't send private replies to my address, the mailbox is ignored.  I
read messages from the public lists.



-- 
users mailing list
users@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe or change subscription options:
https://admin.fedoraproject.org/mailman/listinfo/users
Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines
Have a question? Ask away: http://ask.fedoraproject.org


[Index of Archives]     [Older Fedora Users]     [Fedora Announce]     [Fedora Package Announce]     [EPEL Announce]     [EPEL Devel]     [Fedora Magazine]     [Fedora Summer Coding]     [Fedora Laptop]     [Fedora Cloud]     [Fedora Advisory Board]     [Fedora Education]     [Fedora Security]     [Fedora Scitech]     [Fedora Robotics]     [Fedora Infrastructure]     [Fedora Websites]     [Anaconda Devel]     [Fedora Devel Java]     [Fedora Desktop]     [Fedora Fonts]     [Fedora Marketing]     [Fedora Management Tools]     [Fedora Mentors]     [Fedora Package Review]     [Fedora R Devel]     [Fedora PHP Devel]     [Kickstart]     [Fedora Music]     [Fedora Packaging]     [Fedora SELinux]     [Fedora Legal]     [Fedora Kernel]     [Fedora OCaml]     [Coolkey]     [Virtualization Tools]     [ET Management Tools]     [Yum Users]     [Yosemite News]     [Gnome Users]     [KDE Users]     [Fedora Art]     [Fedora Docs]     [Fedora Sparc]     [Libvirt Users]     [Fedora ARM]

  Powered by Linux