>Besides the fact it's trivia to sniff and then spoof a MAC address
AND
>someone using that same sniffer can crack the WEP after about 400,000
>packets (Maybe less) -- if you are running everyone through an IPSEC
tunnel
>over the air and have a set of firewalls between your 802.11b and
your
>security domain, you should be fine as long as you change your key on
the
>WEP every 200,000 packets or so.
If I have IPSEC on top of WEP, and WEP is done with after 200k
packets,
nobody is much wiser.
>So far, I haven't heard any security doubts against this technology.
The
>most important issue during configuration of a WLAN seems to be to
allow
>only
>registered MAC addresses or WLAN cards to join the network.
The data can still be read. It is just bits going over the air.
Whether the router accepts me or not, one can listen anyway...
still, to register your mac address you have to be online on a lower
layer.
on that layer all data is readable. no security there, either.
this measure protects you _a little_ against data injection into your
network.
at least as long until someone sniffs one MAC address and reuses it
after the original device goes offline
Stefan Osterlitz
begin 666 ATT00024.htm
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3"@T*/"]"3T19/@T*/"](5$U,/@``
`
end