>>> Authentication is Authentication. You either make certain resources available anonymously, or you don't. If you don't, then even "port knocking" is just a delivery mechanism (vector) for username/password, public key, whatever. And an unreliable one at that.
Possession of an iPod and varied collection is also irrelevant. <<< I think the post to a "free wireless groups" mailing list was irrelevant :-) I mean I posted a method to completely hide an AP while this group is @ the other end of the rainbow. I still believe that port knocking in terms of a basic "im out all day, no one use my AP" idea is still good. The point at which it's a one time encrypted sequence is still far from off, I think if you cut the beacons and probe responses off you can @ least give ideas on how maybe another authentication concept might work. However I think as long as you can always MITM, you have problems. Good feedback. - Jon -- NYCwireless - http://www.nycwireless.net/ Un/Subscribe: http://lists.nycwireless.net/mailman/listinfo/nycwireless/ Archives: http://lists.nycwireless.net/pipermail/nycwireless/
