Wifi Security
Joel Jaeggli
joelja at darkwing.uoregon.edu
Mon Nov 21 17:48:48 UTC 2005
On Mon, 21 Nov 2005, Ross Hosman wrote:
> So my question is pretty simple. You have all these major companies such
> as google/earthlink/sprint/etc. building wifi networks. Lets say I want
> to collect peoples information so I setup an AP with the same ssid as
> google's ap so people connect to it and I log all of their traffic. Most
> people won't check beyond the ssid to look at the mac address but even
> that could be spoofed. Is there anyway to verify a certain ap beyond
> mac/ssid, will there be in the future? How do these companies plan to
> mitigate this threat or are they just going to hope consumers are smart
> enough to figure it out?
What do you learn by looking at someone's ipsec, ssl-wrappered, or ssh
tunneled traffic?
Clear-text data-streams have the same liability almost everywhere (in the
public sphere), so if you want to move data that has any importance at all
you protect the data end-to-end.
> Ross Hosman
> Network/Systems Administrator
> E: rhosman at corp.hometel.com
> P: 618-644-2111 x 238
> C: 314-898-3381
> Y!: rosshosman
>
>
--
--------------------------------------------------------------------------
Joel Jaeggli Unix Consulting joelja at darkwing.uoregon.edu
GPG Key Fingerprint: 5C6E 0104 BAF0 40B0 5BD3 C38B F000 35AB B67F 56B2
More information about the NANOG
mailing list