This (and variants) have been known for a year+, and we haven't seen
widespread attacks with it.  If you read the ucal-sandiego paper about
it, many vendors don't even respect RTS/CTS correctly and transmit even
after someone tries to corrupt the carrier.

This might be a concern if someone wanted to create minor havok at a
store or business where wifi is the only communications channel for POS
units or something of that nature, but it's not that scary in general.

-m

On Tue, May 18, 2004 at 05:26:30PM -0700, Daniel Dobkin wrote:
> I took a look at the AusCert posting for this problem.  It appears to 
> be nothing more than setting a card to send packets continuously, thus 
> setting everyone's carrier sense high and blocking the channel.   The 
> press release maintains that the transmitter 'cannot be located' but 
> this is a mystery to me:  since the transmitter must send continuously 
> to cause a problem, it ought to be quite simple to locate the offending 
> node using raw signal strength or (preferably) a directional antenna 
> and a spectrum analyzer.  For large organizations that are likely to 
> own the space around their network, the offending node would be on 
> their property and could be shut down or asked to leave.  In any case 
> it certainly isn't news:  FCC part 15, "unlicensed devices must accept 
> interference".
> 
> Daniel M. Dobkin
> Enigmatics
> 1-408-314-2769
> [EMAIL PROTECTED]
> 
> _______________________________________________
> BAWUG's general wireless chat mailing list
> [unsubscribe] http://lists.bawug.org/mailman/listinfo/wireless

-- 
"Killing you would be so easy."
"Fried food can kill me.  A mugger can kill me.  You're not that special
 down here."

Attachment: pgpnxirANAHcX.pgp
Description: PGP signature

_______________________________________________
BAWUG's general wireless chat mailing list
[unsubscribe] http://lists.bawug.org/mailman/listinfo/wireless

Reply via email to