-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
At 8:11 AM -0400 7/27/10, Peter P Morrissey wrote:
Makes me wonder if it really matters that much anymore. Are there any
applications that don't already do their own encryption?
The problem is that this attack (basically an ARP spoofing attack) ends
This is good news to at least one vendor. Meru Network's Virtual Cell feature
creates a unique BSSID for each associated station, thereby rendering the whole
vulnerability a non-issue.
--
Ken LeCompte - Telecommunications Analyst
Rutgers University Office of Information Technology
Campus
Our latest on this issue (which should be further clarified today during a
Black Hat conference presentation)
Wi-Fi WPA2 vulnerability FAQ
http://www.networkworld.com/news/2010/072810-wif--wpa2-vulnerability-faq.html?hpg1=bn
__
B O B B R O
Good article. Breaks it down very good.
It also appears that client isolation will break the attack vector as well.
We'll see when the Blackhat presentation goes on.
On Thu, Jul 29, 2010 at 8:43 AM, Bob Brown bbr...@nww.com wrote:
Our latest on this issue (which should be further clarified