[86895] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Wifi Security

daemon@ATHENA.MIT.EDU (Joel Jaeggli)
Mon Nov 21 12:49:16 2005

Date: Mon, 21 Nov 2005 09:48:48 -0800 (PST)
From: Joel Jaeggli <joelja@darkwing.uoregon.edu>
To: Ross Hosman <rhosman@corp.hometel.com>
Cc: nanog@nanog.org
In-Reply-To: <39420CFB89A9E0449F4314DE8D1CFF4713035B@exchange.corp.hometel.com>
Errors-To: owner-nanog@merit.edu



On Mon, 21 Nov 2005, Ross Hosman wrote:

> So my question is pretty simple. You have all these major companies such
> as google/earthlink/sprint/etc. building wifi networks. Lets say I want
> to collect peoples information so I setup an AP with the same ssid as
> google's ap so people connect to it and I log all of their traffic. Most
> people won't check beyond the ssid to look at the mac address but even
> that could be spoofed. Is there anyway to verify a certain ap beyond
> mac/ssid, will there be in the future? How do these companies plan to
> mitigate this threat or are they just going to hope consumers are smart
> enough to figure it out?

What do you learn by looking at someone's ipsec, ssl-wrappered, or ssh 
tunneled traffic?

Clear-text data-streams have the same liability almost everywhere (in the 
public sphere), so if you want to move data that has any importance at all 
you protect the data end-to-end.

> Ross Hosman
> Network/Systems Administrator
> E: rhosman@corp.hometel.com
> P: 618-644-2111 x 238
> C: 314-898-3381
> Y!: rosshosman
>
>

-- 
--------------------------------------------------------------------------
Joel Jaeggli  	       Unix Consulting 	       joelja@darkwing.uoregon.edu
GPG Key Fingerprint:     5C6E 0104 BAF0 40B0 5BD3 C38B F000 35AB B67F 56B2


home help back first fref pref prev next nref lref last post