Wifi Security

Joel Jaeggli joelja at darkwing.uoregon.edu
Mon Nov 21 17:48:48 UTC 2005



On Mon, 21 Nov 2005, Ross Hosman wrote:

> So my question is pretty simple. You have all these major companies such
> as google/earthlink/sprint/etc. building wifi networks. Lets say I want
> to collect peoples information so I setup an AP with the same ssid as
> google's ap so people connect to it and I log all of their traffic. Most
> people won't check beyond the ssid to look at the mac address but even
> that could be spoofed. Is there anyway to verify a certain ap beyond
> mac/ssid, will there be in the future? How do these companies plan to
> mitigate this threat or are they just going to hope consumers are smart
> enough to figure it out?

What do you learn by looking at someone's ipsec, ssl-wrappered, or ssh 
tunneled traffic?

Clear-text data-streams have the same liability almost everywhere (in the 
public sphere), so if you want to move data that has any importance at all 
you protect the data end-to-end.

> Ross Hosman
> Network/Systems Administrator
> E: rhosman at corp.hometel.com
> P: 618-644-2111 x 238
> C: 314-898-3381
> Y!: rosshosman
>
>

-- 
--------------------------------------------------------------------------
Joel Jaeggli  	       Unix Consulting 	       joelja at darkwing.uoregon.edu
GPG Key Fingerprint:     5C6E 0104 BAF0 40B0 5BD3 C38B F000 35AB B67F 56B2




More information about the NANOG mailing list