I want a script to check the wireless client (Hardware Identification Number) when the client connect to Mikrotik
Compare the ID against Stored ID’s if not kick him
off course a third party software on trusted clients installed to communicate with! if that software exist !!!
just a thought what about using access-list to limit connections only from known mac addresses together with WPA-PSK and AES and then create PPPoE tunnel over wireless link. That might sound a bit of a overkill, but PPPoE client is widely available, WPA/WPA2 wireless link encryption is reasonably safe.
WPA has no impact on data transmission speeds over wireless link, especially if you use MikroTik wireless cards that do WPA/WPA2 encryption on the card.
Using current methods WPA/WPA with AES can be broken in no less time than in a month. Thus bringing you security and same speeds as unencrypted wifi link. However PPPoE will add some overhead but that is overkill if you are using secure wireless link already.
Could you please make subtitles or an English version of this? I understood nothing of what happened. I don’t even know if you illustrated a vulnerability or what.
Also, if the problem is WPA… does WPA2 raise the same concerns?
foreach i in=[interface wireless registration-table find ] do={
local name [interface wireless registration-table get value-name=radio-name $i ]
if ($name!=$name_of_radio) do={/kick him}
}
you can do that with access-list of the AP. Then you can turn default forwarding off.
I look at security this way - how long will it take for an attacker to get to me. If that time is of reasonable length it is good enough as there are no super safe mechanisms that cannot be broken eventually.
So if you use wireless on RouterOS router, then enable WPA2, AES chipers, turn off default forwarding, create access-list. If all of that is not enough you can always go for encrypted tunnels and/or hotspot.
“boen_robot” forgive me it’s in Arabic the attack idea depend on how windows system at client side
drop secure WiFi network “WPA” and trying to connect to unsecured one with signal strength strong than
the secure one
“c0d3rSh3ll” Thank you it’s interesting script would you explain if the Radio name is a unique value for each wireless
client or it just the MAC address of the client adapter ?
“janisk”
all the procedures you talking about is secure enough but my situation is special we working as secondary providers
the main provider use PPPOE system with no encryption at our mikrotik router’s and they won’t change their policy
for no reason so I’m trying to secure my Wlan with this type of script I’m just looking for unique value to depend on
that hackers can’t get it like HWID or radio name as c0d3rSh3ll says if it’s unique for every client
radio-name is a proprietary field where you can describe the device. by default it has the MAC address, but it has no meaning, it’s a simple text field.
The question is : if My client MAC is (00:11:22:33:44:55) & I give him (john) as radio name in Registration table
then every time this client connected to my AP his radio name appear corresponding to his MAC?
Right?
what if a hacker spoof this MAC (00:11:22:33:44:55) and try to connect to my AP
he will appear as (john) radio name too ?
its a nice feature, to hide ssid to all normal ppl in a mikrotik net. Use hide ssid, and use the ssid as radioname. Then you will always know the ssid, from mikrotik scan, and a regular guy on street dont see your net at all.