I would do some research before using it -- according to the yashy-hack mailing list it has been holed like a slice of swiss cheese. -- Jack Coates Monkeynoodle: It's what's for dinner! On Fri, 9 Mar 2001, Scott C. Best wrote: > Rick: > I think it's called WEP: Wired Equivalent Privacy. > AFAIK, there are two levels, one which uses 64-bit keys and > another which uses 128-bit keys plus RC4. Which is to say, > I can set my access point to only respond to PCMCIA cards setup > with the LAN name "Froog", and that code word is likely used > scramble a 64-bit password challenge or a 128-bit cipher. > > What I'm unsure of is if the data stream itself is > scrambled. Spread-spectrum (as used in 802.11b) has an > inherent security to it in the spreading-code. Maybe that's > what's exchanged "securely" with WEP. > Maybe I should look at the source code already. :) > > -Scott > > >Additionally, before this discussion found it's way to > >the LRP list, it was said that communications between > >client and AP are not allowed to be picked up by other > >clients, protected with a password-like name [and some > >sort of encryption?]. > > > >An AP is at least those functions in addition to a bridge. > > > > > _______________________________________________ > Leaf-devel mailing list > [EMAIL PROTECTED] > http://lists.sourceforge.net/lists/listinfo/leaf-devel > _______________________________________________ Leaf-devel mailing list [EMAIL PROTECTED] http://lists.sourceforge.net/lists/listinfo/leaf-devel
