Quoth Kacheong Poon on Tue, Oct 24, 2006 at 05:59:09PM +0800:
> David Bustos wrote:
> > Do you mean that we won't be able to read all of the packets we receive?
> 
> How do you know that there are actually packets flowing around?

We don't, so we can't rely on them.  If we find them though, they might
be useful.

> > Why do you think it would be a hack?  If the administrator says "Choose
> > home if you see MAC address X" (though I think most of the time the
> > administrator will want to specify more selective metrics), and we see
> > MAC address X, shouldn't we choose "home"?
> 
> Assuming we are still discussing on the wireless case, the
> above suggestion is almost equivalent to saying that when we
> see the BSSID X, we are at home.  But I think the problem we
> are discussing is that if the BSSID is different, what should
> the default action be?

I don't think that's what we're discussing here, but I think the answer
to that question is obvious: If we're not sure whether it's legal to
transmit on the network, tell the user whatever information we've
gathered and ask for permission.  Otherwise, start probing for the
networks we know.

> > Wirelessness is the point here.  Due to wireless's broadcast nature, we
> > can get a nonzero amount of information without sending anything.  "It's
> > a hack, it's not robust" doesn't seem like a good argument for
> > withholding it from the user('s tests).  "Seeing a packet with a known
> > MAC address isn't sufficient legal justification to begin transmitting"
> > is.
> 
> If we replace MAC address with BSSID above, is the suggestion
> something new?

No.  As far as I know, it would just require more work to sniff the
packets.


David

Reply via email to