cellio: (avatar)
Monica ([personal profile] cellio) wrote2012-05-13 04:31 pm

but those were useful features!

A very helpful (yes, really!) technician at Verizon diagnosed our network problems as a flaky router, so he sent us a new one and we swapped it in today. The old router had two features that I found useful: I could name devices on the network, and the "my network" list showed me everything that had connected since the last router restart, not just the currently-connected devices. These, particularly in combination, were useful for monitoring my network. (Why yes, since I can be punished for anything done from my IP address even if I didn't do or authorize it, and since no security that is still usable is perfect, I do care.)

The new router lacks both of these features; it shows currently-connected devices by MAC address (and IP address), but short of my maintaining the name-MAC mappings externally, that's of limited utility. And it doesn't tell me if a neighbor found his way onto my network while I wasn't watching. Now my neighbors seem like decent folks, and in a different legal environment I'd rather be the sort of person who shares my spare bandwidth with anybody who needs it, but that's not the point.

Oh well. I guess I am now relying more strongly on decent neighbors and passwords, as I haven't found anything like router logs that tell me this stuff.

I know that some of my readers are pretty security-conscious. How do you handle this?

[identity profile] http://users.livejournal.com/merle_/ 2012-05-13 10:44 pm (UTC)(link)
This. Although whenever my Roku decides it can't see the network I have to re-enter a ridiculously long password using a UI designed in 1950.

I also don't use DHCP and bind my router to the MAC addresses, then the devices to particular internal IP addresses. On a subnet that is not a standard one. Really, when (example IP range) are you going to go to 1.1.1.[17-32]?

[identity profile] http://users.livejournal.com/merle_/ 2012-05-14 11:49 am (UTC)(link)
The MAC filtering is an enormous pain. But with the rate of new devices being under two per year (for me) it is bearable (especially now that many things have a label with the MAC). Not that it is perfect, as someone with the right hardware can spoof their MAC and if they catch you during an outage get onto your network, but whether this is a problem greater than a mere loss of bandwidth depends on other measures, like not sharing drives without an additional password layer.