mirror of
https://github.com/LCTT/TranslateProject.git
synced 2025-03-09 01:30:10 +08:00
Merge pull request #630 from Akagi201/master
[Akagi201] [TRANSLATED] Ubuntu Stores Your Wi-Fi Passwords By Default! 翻译没问题了。你是另外提交了一份原文待翻译么?以后原文的提交,可告知“选题”来做。:>
This commit is contained in:
commit
bb00dbb62b
63
sources/Hardware, software, standards.md
Normal file
63
sources/Hardware, software, standards.md
Normal file
@ -0,0 +1,63 @@
|
|||||||
|
Hardware, software, standards
|
||||||
|
=============================
|
||||||
|
|
||||||
|
The idea behind Coova is simple: to provide you with the open (and free) tools and services you need to manage and access your WiFi network, just the way you want to. Our philosophy is that you shouldn't be required to use any specific hardware (like [FON][1] or [Meraki][2]) or software (like [Whisher][3]). From the ground up, Coova is about being open and standards based - compatible with the widest possible range of hardware, protocols, and services. It's about bringing ["Carrier" grade][4] features and services to the open-source/services world. It's also about making dumb routers a bit smarter - recycling is good, right?
|
||||||
|
|
||||||
|
With Coova, you can pick and choose the software and services you need - depending on the kind of network you are building and how you want to access it. Here are some typical uses of Coova technologies:
|
||||||
|
|
||||||
|
#### Use [CoovaAP][5] for easy configuration of [CoovaChilli][6] (or [WiFiDog][7]):
|
||||||
|
|
||||||
|
* with or without using CoovaAAA services,
|
||||||
|
* using RADIUS or locally defined users,
|
||||||
|
* using the customizable "Internal" captive portal, or
|
||||||
|
* configured to use your own portal or RADIUS service.
|
||||||
|
|
||||||
|
#### Use [CoovaChilli][6] either in [CoovaAP][5] or in your own firmware or server to:
|
||||||
|
* enforce a captive portal and authentication using CoovaAAA or any other portal/RADIUS service,
|
||||||
|
* works with a variety of commercial services (ask your provider),
|
||||||
|
* integrate with 802.1X authentication to provide accounting and access limitations.
|
||||||
|
|
||||||
|
#### Use [CoovaAAA][8] to manage the access to your network:
|
||||||
|
* with a CoovaChilli/AP captive portal,
|
||||||
|
* using a patched WiFiDog captive portal,
|
||||||
|
* using [your own captive portal][9] (no advanced programming needed),
|
||||||
|
* using our Facebook or standard captive portal applications,
|
||||||
|
* using a commercial access controller (like Colubris), or
|
||||||
|
* using any router supporting WPA Enterprise/802.1X (like the AirPort Extreme).
|
||||||
|
|
||||||
|
#### Use and share your [CoovaAAA][8] controlled network:
|
||||||
|
* using one account to login to both your captive portal and your secure WPA Enterprise networks (using any device supporting 802.1X, like your laptop or Nokia phone),
|
||||||
|
* using your account at any [CoovaAAA][8] location that is being shared with you,
|
||||||
|
* selectively share your network with only those you choose - individuals or entire realms, or
|
||||||
|
* share your network based on [OpenID][10] logins or Facebook fans/friends.
|
||||||
|
|
||||||
|
#### Use [CoovaFX][11] and [CoovaSX][12] in Firefox or your phone, respectively, to login past a captive portal using the WISPr standard and a pre-configured account - WISPr is supported by CoovaAAA and most commercial access controllers and service providers.
|
||||||
|
|
||||||
|
#### Use [JRadius][13] to program your own RADIUS provisioning logic for your network.
|
||||||
|
|
||||||
|
If you are building a WiFi network and haven't found anything on this site that can help you, you probably haven't looked hard enough. Though, it has been said, and we do acknowledge, that more documentation is needed. For this, we call out to the development and user community to help out in the Wiki , [forums][14], and [mailing lists][15]. Note: In the Wiki, we do lock pages to prevent SPAM - either create a new page or ask for more permissions on one of the mailing lists.
|
||||||
|
|
||||||
|
We are also hoping to hear more about how and where you are using Coova! In fact, a friend of mine was recently vacationing in the Dominican Republic and was pleasantly surprised to find a Coova signal at the Hotel. They were using CoovaAP for their WiFi. Stories like this are terrific -- lets get them in the forum!
|
||||||
|
|
||||||
|
-------------------------------------------
|
||||||
|
via: http://coova.org/node/133
|
||||||
|
|
||||||
|
译者:[Akagi201](https://github.com/Akagi201) 校对:[校对者ID](https://github.com/校对者ID)
|
||||||
|
|
||||||
|
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
|
||||||
|
|
||||||
|
[1]: https://corp.fon.com/en
|
||||||
|
[2]: https://meraki.cisco.com/
|
||||||
|
[3]: http://www.whisher.com/
|
||||||
|
[4]: https://meraki.cisco.com/blog/2008/04/new-carrier-services/
|
||||||
|
[5]: http://coova.org/CoovaAP
|
||||||
|
[6]: http://coova.org/CoovaChilli
|
||||||
|
[7]: http://dev.wifidog.org/
|
||||||
|
[8]: http://coova.org/CoovaAAA
|
||||||
|
[9]: http://coova.org/node/80
|
||||||
|
[10]: http://coova.org/node/71
|
||||||
|
[11]: http://www.coova.com/CoovaFX
|
||||||
|
[12]: http://www.coova.com/CoovaSX
|
||||||
|
[13]: http://coova.org/JRadius
|
||||||
|
[14]: http://coova.org/forum/
|
||||||
|
[15]: http://coova.org/MailingLists
|
@ -1,20 +0,0 @@
|
|||||||
Ubuntu Stores Your Wi-Fi Passwords By Default!
|
|
||||||
================================================================================
|
|
||||||
|
|
||||||
### Akagi201 is TRANSLATING
|
|
||||||
|
|
||||||
Ubuntu is not as secure as you perhaps thought it to be. According to reports, the Linux-driven distribution stores its Wi-Fi profiles outside its home folder, which makes them more accessible. This includes passwords for the Wi-Fi profiles. Reports say that a user pointed out that Wi-Fi passwords on Ubuntu aren’t encrypted as they are stored outside the Home folder. This folder though can be encrypted during the OS’ installation.
|
|
||||||
|
|
||||||
“I recently stumbled over the fact, that NetworkManager by default stores Wifi profiles *including clear text passwords* under ‘/etc/NetworkManager/system-connections/.’ I think that is not what one expects when he/she turns on home folder encryption and should because of that be corrected somehow,” Softpedia quoted user Per Guth from a mailing list.
|
|
||||||
|
|
||||||
The issue is apparently a result of “All users may connect to this network”, the option that is enabled by default. In order to switch this feature off, users have to open the Network Indicator and go to Edit Connections. Then choose Select Network and clock on Edit. In the General tab here, untick the option in order to switch it off.
|
|
||||||
|
|
||||||
Unchecking the option reportedly moves the password into the required folder, but the Softpedia report speculated that majority of the users won’t be aware of this issue. Whether Canonical will make any changes to this or not remains to be seen.
|
|
||||||
|
|
||||||
--------------------------------------------------------------------------------
|
|
||||||
|
|
||||||
via: http://www.efytimes.com/e1/fullnews.asp?edid=125483
|
|
||||||
|
|
||||||
译者:[译者ID](https://github.com/译者ID) 校对:[校对者ID](https://github.com/校对者ID)
|
|
||||||
|
|
||||||
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
|
|
18
translated/Ubuntu Stores Your Wi-Fi Passwords By Default!.md
Normal file
18
translated/Ubuntu Stores Your Wi-Fi Passwords By Default!.md
Normal file
@ -0,0 +1,18 @@
|
|||||||
|
Ubuntu默认存储你的Wi-Fi密码!
|
||||||
|
================================================================================
|
||||||
|
|
||||||
|
Ubuntu可能不像你想象的那么安全.据报道,Linux驱动的发行版在home目录外存储Wi-Fi配置文件,这使得它们更易于被访问。这包括Wi-Fi配置文件的密码。报道说,一个用户指出,Wi-Fi密码在Ubuntu上是不加密的,因为它们都存储在home目录之外。此文件夹虽然可以在操作系统的安装过程中进行加密。
|
||||||
|
|
||||||
|
"最近,我偶然发现了一个事实,NetworkManager默认存储WiFi配置文件*包括明文密码*到/etc/NetworkManager/system-connections/.我认为这不是用户所期望的,当他/她开启了home目录加密,正因为如此,应该以某种方式纠正." - Softpedia引用邮件列表中Per Guth的话。
|
||||||
|
|
||||||
|
这个问题显然是为了让“所有用户都可以连接到这个网络”,即默认情况下启用该选项的结果。为了关掉此功能,用户必须打开Network Indicator,然后去Edit Connection。然后选择在Edit上的Select Network and clock。在General选项卡,取消勾选,以将其关闭。
|
||||||
|
|
||||||
|
取消选中该选项据说会移动密码进入所需的文件夹,但Softpedia报告推测,大多数用户不会注意到这个问题。Canonical是否会进行任何更改,还有待观察。
|
||||||
|
|
||||||
|
--------------------------------------------------------------------------------
|
||||||
|
|
||||||
|
via: http://www.efytimes.com/e1/fullnews.asp?edid=125483
|
||||||
|
|
||||||
|
译者:[Akagi201](https://github.com/Akagi201) 校对:[校对者ID](https://github.com/校对者ID)
|
||||||
|
|
||||||
|
本文由 [LCTT](https://github.com/LCTT/TranslateProject) 原创翻译,[Linux中国](http://linux.cn/) 荣誉推出
|
Loading…
Reference in New Issue
Block a user