While they may serve as a very minor deterrent to the casual passerby, I
guess that my point is that it's a waste of time, even on a home deployment,
to implement when you are hopefully deploying WPA (with AES, since there is
a vulnerability with TKIP) or WPA2 anyway. From the author's follow-up to
that article: "These aren't layered approaches; they're more like buying
overlapping warranty coverage, since any benefit against casual bandwidth
thieves is already covered by real security measures."

Greg

> -----Original Message-----
> From: hardware-boun...@hardwaregroup.com [mailto:hardware-
> boun...@hardwaregroup.com] On Behalf Of Bino Gopal
> Sent: Tuesday, April 28, 2009 5:22 PM
> To: hardware@hardwaregroup.com
> Subject: Re: [H] MAC Address Filter
> 
> I wouldn't say *utterly* pointless.  The article is good in pointing
> out the
> issues and people who think using these measures=security (which it
> doesn't), but his points are more tailored to an *enterprise* rather
> than a
> home user with an AP...
> 
> To wit, MAF is pointless in a work environment, but again, using simple
> psychology, which AP is a person looking for free wireless going to
> target-the one that's broadcasting the SSID and has no MAF, or yours
> that
> requires a sniffer to find the SSID and a MAC to steal!
> 
> As per http://www.lanarchitect.net/Articles/Wireless/SecurityRating/ if
> a
> bored hacker is trying to get in, even L2 will protect you since they
> have
> to steal your password to get in.  And if that hacker is really
> targeting
> you, then even L3 will protect you; but no one needs that for home use
> (but
> at least use WPA2 since WPA can be cracked now; and forget WEP!).
> 


Reply via email to