From owner-freebsd-questions@FreeBSD.ORG Tue Apr 23 20:08:39 2013 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by hub.freebsd.org (Postfix) with ESMTP id 1C4F2851 for ; Tue, 23 Apr 2013 20:08:39 +0000 (UTC) (envelope-from aimass@yabarana.com) Received: from mail-da0-x231.google.com (mail-da0-x231.google.com [IPv6:2607:f8b0:400e:c00::231]) by mx1.freebsd.org (Postfix) with ESMTP id EDF941C5A for ; Tue, 23 Apr 2013 20:08:38 +0000 (UTC) Received: by mail-da0-f49.google.com with SMTP id t11so503555daj.8 for ; Tue, 23 Apr 2013 13:08:38 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:x-received:in-reply-to:references:date:message-id :subject:from:to:cc:content-type:x-gm-message-state; bh=GIHC6zK/4xNh4W27ohTRH+8qRZT3pqrO1MOM5nh3Hr4=; b=AuUUYLHVjHtkqEh3+jnpCukc8pSeW+ofQ5ejC875rrgb1LChkM5NNgebWBiiLK6W4S Mzq0M11KEpEbWMiBK+8q2ahlN0QfwjnePBP9ZK2QgcHBlZzAIRsr9191vTsPLZUxYz2Y zBBflvi5uUKlyXEnnisbPwg1iKMMRSKgsSs+Ka8Om08qMV/86hIfi2v5uzMDzumZ+0OP QYkgH/qXcdr9iZ/gvQDk2Dxbms1+gSLjfBKZZlhZGv7W13LuhxWrgNgXX0dE+U7qM1l3 Lz+vdPHh8gpQZ1ABQJ1V0J9MDoBqSg+Yw6W4hsbRKM1E2gjhPaUAkf592oNMKlBcrxNn PGng== MIME-Version: 1.0 X-Received: by 10.66.161.69 with SMTP id xq5mr32324960pab.136.1366747718791; Tue, 23 Apr 2013 13:08:38 -0700 (PDT) Received: by 10.66.235.3 with HTTP; Tue, 23 Apr 2013 13:08:38 -0700 (PDT) In-Reply-To: <20130423010407.25a73c92@gumby.homeunix.com> References: <20130423010407.25a73c92@gumby.homeunix.com> Date: Tue, 23 Apr 2013 16:08:38 -0400 Message-ID: Subject: Re: Home WiFi Router with pfSense or m0n0wall? From: Alejandro Imass To: RW Content-Type: text/plain; charset=ISO-8859-1 X-Gm-Message-State: ALoCoQmTVfOTH5cnKJGAe69L8kJ/ROfurTjTbiekK6XUdiFgLaW5ueubM203qCkXhO4BTwTUhMxa Cc: FreeBSD Questions X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 23 Apr 2013 20:08:39 -0000 On Mon, Apr 22, 2013 at 8:04 PM, RW wrote: > On Mon, 22 Apr 2013 14:25:30 -0400 > Michael Powell wrote: > > >> Most consider the answer to use WPA2, which I do use too. Many think >> it is 'virtually' unbreakable, but this really is not true; it just >> takes longer. I've done WPA2 keys in as little as 2-3 hours before. > > Are you saying that any WPA2 key can be cracked or or you simply > referring to weak keys? I would also like to specifically if it's for weak keys or are all WPA2 personal keys crackable by brute force. Also is WPA2 Enterprise as weak also. Could anyone expand on how weak is WPA2 and WPA2 Enterprise or is this related to weak PSKs only?? Thanks, -- Alejandro Imass