lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
From: rsumida at csulb.edu (Ryan Sumida)
Subject: Wi-fi. Approaching customers

I don't think it is based on MAC.  That would be too easy to spoof. 


Ron DuFresne <dufresne@...ternet.com> wrote on 03/15/2005 05:20:26 PM:

> 
> 
> From what little I read on their site, it seems to be a radius auth mech
> based upon MAC addresses.
> 
> Thanks,
> 
> Ron DuFresne
> 
> 
> On Tue, 15 Mar 2005, KF (Lists) wrote:
> 
> > hrmm... is that based on signal strength or something?
> > -KF
> >
> > Ryan Sumida wrote:
> > >
> > > As a side note..
> > >
> > > Newbury Networks has a product called WiFi Watchdog that can 
allow/deny
> > > access based on physical location.  As an example, it can be 
configured
> > > where anyone outside the building walls can not connect to the 
network
> > > but once they move inside the building they are allowed access. 
Sounds
> > > like black magic but it works (a rep came down and showed us a demo
> > > yesterday) and can help manage who gets on an open WiFi network like
> > > Matthew's.
> > >
> > > Ryan Sumida
> > > Network Services, CSU Long Beach
> > >
> > >
> > > full-disclosure-bounces@...ts.grok.org.uk wrote on 03/15/2005 
01:27:43 PM:
> > >
> > >  >
> > >  > Matthew Sabin wrote:
> > >  >
> > >  > > My company has made a conscious decision to leave our WiFi open 
to
> > >  > visitors, while our internal machines connect via IPSec on the 
open
> > > airwaves.
> > >  > > A drive-by would show the open nature of our WiFi, but wouldn't
> > >  > immediately tell you that we've secured our business fairly well.
> > >  >
> > >  > but what if someone uses your unsecured network to download 
copyrighted
> > >  > material (just mp3s are enough :->) or to send porn?
> > >  >
> > >  > An unsecured WiFi may have serious legal consequences.
> > >  >
> > >  > And to come back on the original topic: These legal consequences 
may be
> > >  > good arguments to convince customers that they need to get their 
network
> > >  > secured.
> > >  >
> > >  > Ciao
> > >  > Marcus
> > >  >
> > >  > --
> > >  > Hail Eris! Hail Discordia!
> > >  > _______________________________________________
> > >  > Full-Disclosure - We believe in it.
> > >  > Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> > >  > Hosted and sponsored by Secunia - http://www.secunia.com/
> > >
> > >
> > > 
------------------------------------------------------------------------
> > >
> > > _______________________________________________
> > > Full-Disclosure - We believe in it.
> > > Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> > > Hosted and sponsored by Secunia - http://www.secunia.com/
> > _______________________________________________
> > Full-Disclosure - We believe in it.
> > Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> > Hosted and sponsored by Secunia - http://www.secunia.com/
> >
> 
> -- 
> "Sometimes you get the blues because your baby leaves you. Sometimes you 
get'em
> 'cause she comes back." --B.B. King
>         ***testing, only testing, and damn good at it too!***
> 
> OK, so you're a Ph.D.  Just don't touch anything.
> 
> 
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20050316/b5b220f8/attachment.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ