>>> Authentication is Authentication. You either make certain resources
available anonymously, or you don't. If you don't, then even "port knocking"
is just a delivery mechanism (vector) for username/password, public key,
whatever. And an unreliable one at that.

Possession of an iPod and varied collection is also irrelevant. <<<

I think the post to a "free wireless groups" mailing list was irrelevant :-)

I mean I posted a method to completely hide an AP while this group is @ the
other end of the rainbow.  I still believe that port knocking in terms of a
basic "im out all day, no one use my AP" idea is still good.  The point at
which it's a one time encrypted sequence is still far from off, I think if
you cut the beacons and probe responses off you can @ least give ideas on
how maybe another authentication concept might work.

However I think as long as you can always MITM, you have problems.  Good
feedback.

- Jon

--
NYCwireless - http://www.nycwireless.net/
Un/Subscribe: http://lists.nycwireless.net/mailman/listinfo/nycwireless/
Archives: http://lists.nycwireless.net/pipermail/nycwireless/

Reply via email to