Yup you quite right, I was wrong on this one alright. I dind't intend my
answer to be taken up as a whole soln although looking at my post I made
very little effort to clarify this. So seeing as my lame idea got shot
down I have a question Is there any point in putting in mac filters the ?
If you going to use something else to authenticate the hosts joining the
network whats the point is there anything to be actually gained by it? I
thought it was a good thing to add in anyways as it is a simple thing to
do and it's an extra check, albeit and easily circumvented one.

On Fri, 8 Aug 2003, David wrote:

> Rory, the first packet from the wireless client that is sniffed gives away
> the  mac address.
> Unless you tunnel the wireless connection, the mac address is out in the
> open, not encrypted. ipsec won't help either. same deal. and if you vpn
> tunnel, you have to be able to DENY the mac addresses on the two sides of
> the tunnel, so that when they sniff the tunnel, they don't use THOSE mac's.
> Maybe you want to withdraw your comment on this
>
> -----Original Message-----
> From: Rory [mailto:[EMAIL PROTECTED]
> Sent: Friday, August 08, 2003 12:23 AM
> To: netsec novice
> Cc: [EMAIL PROTECTED]
> Subject: Re: Network scanning
>
>
> for the wireless stuff I would just do mac filtering, any host that is not
> in the list of mac address is not allowed to join the wireless network. Of
> course the network traffic can still be sniffed using any laptop but you
> can just encrypt the traffic over wireless as you suggested. The mac
> filtering is something easy to setup and makes sure you don't end up
> handing out access to the network to some dude out in in the parking lot.
>
> AS for the other stuff i'm not too sure as SNMP is not something I have
> used, running a snort box in the network checking for scanning activity is
> also a good precaution that way you are also guarding against any unhappy
> employee's looking to make your job harder.
>
> On Thu, 7 Aug 2003, netsec novice wrote:
>
> > Are there tools out there that would allow system administrators to be
> > notified when a new workstation attaches to a network?  I'm thinking both
> > wireless and ethernet in this case.  SNMP maybe?  I am in a credit union
> > environment and my concern is that someone would be able to steal an
> > existing jack or a jack that is not physically protected but live and be
> > able to capture traffic or do reconaissance.  We don't have Wireless
> access
> > at this point but may look to it in the future.  My only thought in that
> > case would be to encrypt all traffic since wireless security is a bit
> scary
> > at this point.  Any ideas?
> >
> > _________________________________________________________________
> > The new MSN 8: smart spam protection and 2 months FREE*
> > http://join.msn.com/?page=features/junkmail
> >
> >
> > --------------------------------------------------------------------------
> -
> > --------------------------------------------------------------------------
> --
> >
>
> ---------------------------------------------------------------------------
> ----------------------------------------------------------------------------
>
>
>

---------------------------------------------------------------------------
----------------------------------------------------------------------------

Reply via email to