Evilbunny,
I think the EAP allows for any authentication means, which could also be
biometrics (might be going too far)!
Correct me if I am wrong.

- Rohyt 

-----Original Message-----
From: evilbunny [mailto:[EMAIL PROTECTED]] 
Sent: Monday, September 09, 2002 10:40 PM
To: [EMAIL PROTECTED]
Subject: Re: [nycwireless] Wireless Security

Hello Rohyt,

And this is 1 of the reasons SSL was introduced into the current
mapping database, as PTP are planning to use it as an alternative
method of authentication for Nocat, rather then having usernames and
passwords being sniffed... 

-- 
Best regards,
 evilbunny
mailto:[EMAIL PROTECTED]

http://www.SydneyWireless.com - Exercise your communications
freedom to make it do what you never thought possible... 

Tuesday, September 10, 2002, 12:29:41 PM, you wrote:

RB> SSID can be "cloaked" - not broadcasted by the AP. However, when a
client associates with the AP the SSID is transmitted in a management
frame. This is alo picked up by Kismet. Also, if there are
RB> no client associations for a long time, the attacker may produce
noise thus causing the client to disassociate or the attacker may
transmit a spoofed management frame for disassociation. This
RB> waill cause the client to re-associate thus revealing the SSID. This
further emphasizes that the SSID cannot totally be prevented from being
transmitted. A well configured VPN solution may be the
RB> right choice for securing the wireless network.
RB> --
RB> NYCwireless - http://www.nycwireless.net/
RB> Un/Subscribe:
http://lists.nycwireless.net/mailman/listinfo/nycwireless/
RB> Archives: http://lists.nycwireless.net/pipermail/nycwireless/
--
NYCwireless - http://www.nycwireless.net/
Un/Subscribe: http://lists.nycwireless.net/mailman/listinfo/nycwireless/
Archives: http://lists.nycwireless.net/pipermail/nycwireless/

Reply via email to