Kevin Arima wrote:

Basically, it claims that MITM attacks are possible when an inner protocol
is tunneled through a protected tunnel provided by the outer protocol.
Now I do not know whether something of this nature is feasible, but when
designing a security solution it's something that you should keep in mind.

What about the upcoming WPA standard? (is it even shipping yet?) Is EAP part of it?
Keeping up w/ all the bs wireless security acronyms is blowing my mind and I have yet to set up a radius server to play around with. But thanks alot for the community feedback in the meantime :-)

- Jon

--
NYCwireless - http://www.nycwireless.net/
Un/Subscribe: http://lists.nycwireless.net/mailman/listinfo/nycwireless/
Archives: http://lists.nycwireless.net/pipermail/nycwireless/


Reply via email to