This (and variants) have been known for a year+, and we haven't seen widespread attacks with it. If you read the ucal-sandiego paper about it, many vendors don't even respect RTS/CTS correctly and transmit even after someone tries to corrupt the carrier.
This might be a concern if someone wanted to create minor havok at a store or business where wifi is the only communications channel for POS units or something of that nature, but it's not that scary in general. -m On Tue, May 18, 2004 at 05:26:30PM -0700, Daniel Dobkin wrote: > I took a look at the AusCert posting for this problem. It appears to > be nothing more than setting a card to send packets continuously, thus > setting everyone's carrier sense high and blocking the channel. The > press release maintains that the transmitter 'cannot be located' but > this is a mystery to me: since the transmitter must send continuously > to cause a problem, it ought to be quite simple to locate the offending > node using raw signal strength or (preferably) a directional antenna > and a spectrum analyzer. For large organizations that are likely to > own the space around their network, the offending node would be on > their property and could be shut down or asked to leave. In any case > it certainly isn't news: FCC part 15, "unlicensed devices must accept > interference". > > Daniel M. Dobkin > Enigmatics > 1-408-314-2769 > [EMAIL PROTECTED] > > _______________________________________________ > BAWUG's general wireless chat mailing list > [unsubscribe] http://lists.bawug.org/mailman/listinfo/wireless -- "Killing you would be so easy." "Fried food can kill me. A mugger can kill me. You're not that special down here."
pgpnxirANAHcX.pgp
Description: PGP signature
_______________________________________________ BAWUG's general wireless chat mailing list [unsubscribe] http://lists.bawug.org/mailman/listinfo/wireless
