I would do some research before using it -- according to the yashy-hack
mailing list it has been holed like a slice of swiss cheese.

-- 
Jack Coates
Monkeynoodle: It's what's for dinner!

On Fri, 9 Mar 2001, Scott C. Best wrote:

> Rick:
>       I think it's called WEP: Wired Equivalent Privacy.
> AFAIK, there are two levels, one which uses 64-bit keys and
> another which uses 128-bit keys plus RC4. Which is to say,
> I can set my access point to only respond to PCMCIA cards setup
> with the LAN name "Froog", and that code word is likely used
> scramble a 64-bit password challenge or a 128-bit cipher.
>
>       What I'm unsure of is if the data stream itself is
> scrambled. Spread-spectrum (as used in 802.11b) has an
> inherent security to it in the spreading-code. Maybe that's
> what's exchanged "securely" with WEP.
>       Maybe I should look at the source code already. :)
>
> -Scott
>
> >Additionally, before this discussion found it's way to
> >the LRP list, it was said that communications between
> >client and AP are not allowed to be picked up by other
> >clients, protected with a password-like name [and some
> >sort of encryption?].
> >
> >An AP is at least those functions in addition to a bridge.
>
>
>
>
> _______________________________________________
> Leaf-devel mailing list
> [EMAIL PROTECTED]
> http://lists.sourceforge.net/lists/listinfo/leaf-devel
>


_______________________________________________
Leaf-devel mailing list
[EMAIL PROTECTED]
http://lists.sourceforge.net/lists/listinfo/leaf-devel

Reply via email to