If you are using WEP to secure your wireless network, STOP! WEP is weak encryption, and can be broken in a matter of minutes, due to weaknesses in its implementation in wi-fi. Strong encryption is available for wireless networks, and should be used to prevent unauthorized access and abuse of your wireless network.
Currently, the best available encryption protocol for wireless networking is "Wi-Fi Protected Access" (WPA). Many of the popular Linux distributions come with functioning WPA support. Other smaller distros may not have it installed in a bare bones system, requiring the end user to install a pre-compiled WPA package or module.
In some cases it is be necessary for the end user to manually download and install WPA support. For example, the author recently upgraded a SLAX Linux installation with the rt2860 wireless driver. Not only was it necessary to manually compile and install the rt2860 driver from source with (WPA enabled), the required WPA_SUPPLICANT software had to be installed in the same manner.
Follow the procedure given below to manually compile and install WPA support on your Linux system:
root@slax~# wget http://hostap.epitest.fi/releases/wpa_supplicant-0.7.3.tar.gz
root@slax~# tar -xzf wpa_supplicant-0.7.3.tar.gz
root@slax~# cd /root/wpa_supplicant-0.7.3/wpa_supplicant/ root@slax:~/wpa_supplicant-0.7.3/wpa_supplicant# cp defconfig .config
root@slax:~/wpa_supplicant-0.7.3/wpa_supplicant# cp wpa_supplicant.conf /etc/wpa_supplicant.conf
root@slax:~/wpa_supplicant-0.7.3/wpa_supplicant# make && make install
In a flash, wpa_supplicant will be compiled and installed. The following new files
should exist on your system:
/etc/wpa_supplicant.conf /usr/local/sbin/wpa_cli /usr/local/sbin/wpa_passphrase /usr/local/sbin/wpa_supplicant
Wireless managers such as Ceni and WICD should now be able to configure your wireless interface for strongly encrypted connections using WPA and WPA2. Remember, if you are setting up the access point for WPA encryption, select a long and random string of letters and numbers for the passphrase in order to resist "dictionary attacks" on the network. Woe unto your network if the common passphrase "123456" is used!!
If you are using a live CD / DVD Linux distribution, now is the time to save the changes to your system. SLAX and Bluewhite64 users should create a new config module from the /mnt/live/memory/changes/ directory. Users of other distros should use their own preferred method of saving system changes in order to have WPA/WPA2 support upon the next system start up.