On Fri, Jul 15, 2005 at 06:03:01PM +0200, Johan P. Lindstrvm wrote:
...
>  I'm not too familiar with the inner workings of the needed technologies
> (sometimes a pro, often a con) but what if one would use a https proxy, like
> say squid with SSL/TLS support, to obfuscate the http traffic leaving your
> laptop over the WiFi LAN to your local OpenBSD box that runs the proxy, that
> would then with some magic serve you the pages. So that http traffic could
> not be intercepted on the open WiFi network.
...

Before you worry about this too much...

IF you are worried about people packet sniffing your wireless
connection, you should probably be running some kind of encryption on
the traffic already, wireless or not.  What's the point of encrypting
from your laptop to the firewall, if it is then sent plain-text to the
remote end over the common cable that many of your neighbors are also
attached to.

By this point in time, any communications over the internet which should
not be sniffed should be encrypted end-to-end.

That was a specific answer to a specific question.
the above reply is not meant to imply wireless security issues "don't
matter".  IF the question is, "How do I keep people out of my wireless
network", or "how do I keep them from sniffing internal traffic in my
network", my answer would be very different...but that wasn't the 
question.

Nick.

Reply via email to