Some of the better APs and WLAN Bridges allow you to control the MACs 
allowed to communicate with it, or Allowed Talkers.  You build the MAC 
table directly on the AP/WLAN Device.  And, you can turn off "Advertise 
ESSID" from the AP, so the attacker has to know the SSID and guess the MAC 
address as well.

Wireless LANs can be made secure, you just have to put some time and effort 
into it.  They are no worse then wired LANs in my humble opinion.

Of course, with all the FUD in the press lately about Drivebyhacking and so 
forth, companies that don't know any better or lack good IT security 
teams/departments/people/etc, are worried mainly because they don't know or 
understand what the issues are.

I took my iPAQ with my Orinoco card and some software, and was able to find 
a few APs within a 3 block radius, and they were all wide-open.  Ignorance 
is scary.

tjk


T.  These are only small At 02:05 PM 2/12/2002 -0500, you wrote:
>         Forgot one thing in my previous message...
>
>On Mon, Feb 11, 2002 at 11:44:50PM -0500, Jason Costomiris wrote:
> > On Mon, Feb 11, 2002 at 08:13:22PM -0800, David Talkington wrote:
> > : Chad and Doria Skinner wrote:
> > :
> > : >1. Setup DHCP to only assign IPs to specific MAC Addresses
> > :
> > : Wrong already.  MAC addresses are under client control.  You can
> > : assign a different one to your network card with ifconfig (if the
> > : driver can handle that).  Try it.  :-)
>
> > Now before you immediately discount that, remember that a would-be
> > attacker would need to know the MAC address of an *authorized* client.
> > Any by the way - MAC addresses aren't always under the control of the user
> > when we're talking about WLAN cards.
>
>         The selection of the card is under the control of the user
>(attacker).  The selection of the operating system is under the control
>of the user (attacker).  Therefore, the ability of an attacker to
>select the MAC addresses is ALWAYS under his control.  Even if it means
>he has to run out to Joe's Computer Shack and pick up a different card
>and switch to it, it is under HIS control and NOT yours.
>
>         [...]
>
> > --
> > Jason Costomiris <><           |  Technologist, geek, human.
> > jcostom {at} jasons {dot} org  |  http://www.jasons.org/
> >           Quidquid latine dictum sit, altum viditur.
> >                     My account, My opinions.
>
>         Mike
>--
>  Michael H. Warfield    |  (770) 985-6132   |  [EMAIL PROTECTED]
>   /\/\|=mhw=|\/\/       |  (678) 463-0932   |  http://www.wittsend.com/mhw/
>   NIC whois:  MHW9      |  An optimist believes we live in the best of all
>  PGP Key: 0xDF1DD471    |  possible worlds.  A pessimist is sure of it!
>
>
>
>_______________________________________________
>Redhat-list mailing list
>[EMAIL PROTECTED]
>https://listman.redhat.com/mailman/listinfo/redhat-list



_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to