The client is concerned about "drive-by hackers," (aka rogue access points). I've tried to come up to speed on Kerberos and other security measures. But I have found at least one major issue that I don't offhand see an answer to:
If the drive-by hacker is using a consumer-grade access point, will it be silent and invisible to the Kerberos server? That is, will I have to monitor the wireless airwaves with probes that listen to R/F communications in the proximity of the wired network if I use Kerberos?
Many thanks in advance. Best, Bill Amatneek
________________________________________________ Kerberos mailing list [EMAIL PROTECTED] https://mailman.mit.edu/mailman/listinfo/kerberos
