How do I share files (securely) using wifi modem/router?

I connect to the internet via a Netgear wifi modem/router. My own PC (Win98SE) is connected to this by wire, my wife's laptop(WinXPSP2) is connected by wifi. This works OK - both machines can access the internet fine. But,I would like to be able to send files from the PC to the laptop.

How do I congifure things to enable files to be sent from the PC to the laptop without have the laptop or PC vulnerable on the internet?

I would appreciate any help

Regards, Terry

Reply to
Terry
Loading thread data ...

On 16 Jul 2006 01:08:44 GMT, Terry wrote in :

At a minimum, you should:

(a) use WPA on your wireless with a strong passphrase (at least 20 characters, 30 is better);

(b) use strong passwords on all your shares (at least 12 random characters);

(c) not open "holes" in your wireless router to computers on your LAN, or use the horribly misnamed "DMZ" feature;

(d) use software ("personal") firewalls on all computers.

See "Making File and Printer Sharing Safer in Windows XP Service Pack 2"

Reply to
John Navas

If the router provides NAT, you can use Windows File Sharing.

Reply to
Axel Hammerschmidt

snipped-for-privacy@hotmail.com (Axel Hammerschmidt) wrote in news:1hin1zs.1fjyqge1shwvywN% snipped-for-privacy@hotmail.com:

Yes, the router has NAT - I have set 192.168.0.2 and 192.168.0.3 as IP for my PC and the laptop.

If I now enable 'file and printer sharing' on both machines, will this be safe regarding unwanted access via the internet? Is it possible/necessary to limit access to just the two machines?

Thanks,

Terry

Reply to
Terry

On 19 Jul 2006 01:49:23 GMT, Terry wrote in :

No.

See my prior response.

Reply to
John Navas

The OP stipulates "on the internet" and "via the internet". Since when has a PC behind a router with NAT been accessable from the internet?

Reply to
Axel Hammerschmidt

On Thu, 20 Jul 2006 14:14:56 +0200, snipped-for-privacy@hotmail.com (Axel Hammerschmidt) wrote in :

There are ways to get through NAT (PAT) from the outside (and before you ask, I'm not going to detail that here). Marketing claims notwithstanding, NAT alone is not as effective as a real SPI firewall.

Reply to
John Navas

You answered "no" to being "safe regarding unwanted access via the internet" when file and printer sharing are enabled. Now you vaguely refer to something you call "ways to get through NAT". And then you try to duck out by pretending that you could somehow be able "to detail that here".

Are you not really a wannabee, Mr Navas?

formatting link

Again, the difference between network address translation and statefull packet inspection has nothing to do with the question you answered "no" to.

A link explaining NAT- and SPI firewalls:

formatting link

Reply to
Axel Hammerschmidt

snipped-for-privacy@hotmail.com (Axel Hammerschmidt) wrote in news:1hisn7b.zy2oit14k1juqN% snipped-for-privacy@hotmail.com:

The router I'm using (Netgear DG834G) uses SPI according to the spec.

As there's no reason anyone would want to target my PC, am I safe from a random or casual attack, as regards having 'file and printer sharing' enabled?

And, just out of interest, is it really possible for someone to get past NAT and access to files?

Regards,

Terry

Reply to
Terry

On 20 Jul 2006 22:23:59 GMT, Terry wrote in :

Good. Properly implemented, it *should* be considerably more robust than NAT alone. (To have real confidence in the firewall, you need independent certification; e.g., by ICSA Labs.)

Just because you don't think anyone is after you personally, a big problem is the opportunity to make serious dirty money from zombie networks. There are lots of such nasty folk out there -- my firewall (an ICSA-certified SonicWALL) has typically logged multiple attacks per day, and while many of them are just probes for security vulnerabilities, some of them are pretty sophisticated. And of course I have no way of knowing what might not have been logged.

Here's what Cisco says (in "Anatomy: A Look Inside Network Address Translators", September 2004):

Learning from NATs At this stage we can observe a few relevant lessons about NATs: ... Secondly, a little bit of security is often far worse than no security. NATs are very poor security devices, and in terms of their ---------------------------------------------------------- behavior with UDP, NATs afford only minor levels of protection. The --------------------------------------------------------------- task of securing a site from various forms of attack and disruption remains one of a careful exercise of assessment of acceptable risk coupled with detailed consideration of site-management functions. NATs are not a quick way out of this effort.

For more context, see Section 9.0 (Security Considerations) of RFC 2663 (NAT Terminology and Considerations), a 7-year old document (ancient in Internet terms). See also tcptraceroute, which can traverse NAT.

I could go on, but as I said before, I'm not going to go into real detail here. Take that however you wish.

The three laws of prediction:

  1. When a distinguished but elderly scientist states that something is possible, he is almost certainly right. When he states that something is impossible, he is very probably wrong.
  2. The only way of discovering the limits of the possible is to venture a little way past them into the impossible.
  3. Any sufficiently advanced technology is indistinguishable from magic.

-Arthur C. Clarke

Reply to
John Navas

Why don't you just answer the question?

Reply to
Axel Hammerschmidt

No. And why should someone with a NAT firewall who wants to turn on file and printer sharing be concerned about (from the link above, using SPI):

- blocking Java, ActiveX, and Cookie portions of downloaded web pages

- blocking access to WAN Proxy servers

- blocking "IP Spoofing" attacks

- blocking malformed IP packet attacks such as "Ping of Death", and variants such as "Teardrop", "Bonk", and "Nestea"

-blocking SYN flood and LAND attacks

Mr Navas?

BTW. My router with NAT blocks SYN flood attacks, and answering pings can be turned off.

Reply to
Axel Hammerschmidt

You can test your connection with Shieldsup at Steve Gibson's site, here:

formatting link

Reply to
Axel Hammerschmidt

On Fri, 21 Jul 2006 12:38:58 +0200, snipped-for-privacy@hotmail.com (Axel Hammerschmidt) wrote in :

Because I don't trust the audience, and I'm not about to help evildoers. Is that clear enough? ;)

Reply to
John Navas

On Fri, 21 Jul 2006 12:38:59 +0200, snipped-for-privacy@hotmail.com (Axel Hammerschmidt) wrote in :

SPI is something else entirely. Here's a good start:

Zippie do.

Reply to
John Navas

On Fri, 21 Jul 2006 16:28:23 +0200, snipped-for-privacy@hotmail.com (Axel Hammerschmidt) wrote in :

Full of very bad advice by Steve "Chicken Little" Gibson.

And lots more.

Reply to
John Navas

Well, yes actually though not trivially.

- you could mistakenly open the ports on your router.

- your router could have an exploitable flaw in the firmware.

(list of fairly irrelevant items).

Well, they're all things one should perhaps be interested in blocking anyway, but I agree tehy've sod all to do with file & printer sharing.

Reply to
Mark McIntyre

What a stupid answer!

Reply to
Axel Hammerschmidt

He asked, is it possible for someone to...

So could a router with SPI.

Exactly!

All these Chicken Littles (Mr Navas) on usenet.

Reply to
Axel Hammerschmidt

A case of the kettle calling the pot black.

Reply to
Axel Hammerschmidt

Cabling-Design.com Forums website is not affiliated with any of the manufacturers or service providers discussed here. All logos and trade names are the property of their respective owners.