>I agre security is sadly lacking, but it is probably impossible to
>implement in a conference environment.
Look this is a very simple issue. Sean's first post really pointed out that it's "bad
form" for a set of operators to run an insecure network. I would believe that it's
"good form" to at least try. It was stated that the network was not run by the
"operators". OK, I accept that, but it's run by people with great (actually
fantastic) connections to real operators (ie: us).
WEP may not be a good protocol, but it's better than nothing. If people thing it's
hard to configure, then run two networks.. one without WEP and one with WEP.
Security is a relative thing... Normally security at the door to the nanog conference
hall is "low", but that does not seem to bother many people. (Hence security at a
"wired" locations within the conference is "low" making the WEP issue mute).
I would be happy to run on a wireless network with a specific SSID and no SSID beacon
with a static WEP key. (I don't have LEAP, or other protocols on my laptop). Does
this make my communications more secure? I don't know... Everything from my nanog
laptop is VPN'ed anyway... hence already end-to-end encrypted.
I believe that Sean brought up a good point and something worth working on.
Even an incremental improvement at this upcoming meeting followed by another
incremental improvement at the next meeting, etc. etc. will be a good thing.
BTW: WEP may not be a great protocol and people may believe there is a false sense of
security. If this worries you, then I would recommend a note placed on the nanog web
pages that states something like "all IP networking provided at the conference should
be considered insecure, etc.".
Martin
PS: As for bandwidth "stealing". Heck... looking at the stats for previous nanog's,
we are doing a poor job of using the provided bandwidth. I say... bring it on!
(legal traffic only --- of-course!).