Hear-hear, but the Wi-Fi handset vendors are by far and large not that far
long in the thought process....

Frank 

-----Original Message-----
From: Michael Griego [mailto:[EMAIL PROTECTED] 
Sent: Tuesday, November 29, 2005 2:33 PM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: Re: [WIRELESS-LAN] [SCFN] <offtopic> VoIP eavesdropping (fwd)

This highlights the exact reasons that VoFi systems *should* use 802.1x
authentication with per-station keys.  That way, each handset has its own
key to encrypt its traffic over the air with, stopping the easy sniffing of
traffic passing through the air.  This, of course, does nothing for
beyond-the-AP sniffing, but it is presumed that is handled by other security
measures in the environment.

--Mike

-----------------------------------
Michael Griego
Wireless LAN Project Manager
The University of Texas at Dallas



Lee Barken wrote:
> Any comments?  (Originally sent to socalfreenet.org)
> 
> ---------- Forwarded message ----------
> Date: Tue, 29 Nov 2005 09:20:11 -0800 (PST)
> From: Lee Barken <[EMAIL PROTECTED]>
> To: [EMAIL PROTECTED]
> Subject: [SCFN] <offtopic> VoIP eavesdropping
> 
> This is somewhat offtopic for a wireless list-- but kinda relevent 
> considering our plans to implement VoIP in our wireless clouds....
> 
> VoIP, in essence, uses CLEARTEXT protocols... making passive capture 
> trivial in a wireless environment..... (?)  What is the risk that 
> somebody will capture unauthorized recordings of voice communication?  
> Is there a legal precendent for prohibiting wiretapping in a digital
environment?
> 
> http://oreka.sourceforge.net/
> 
> "The open source, cross-platform audio stream recording and retrieval 
> system Oreka is a modular and cross-platform system for recording and 
> retrieval of audio streams. The project currently supports VoIP and 
> sound device based capture. Recordings metadata can be stored in any 
> mainstream database.  Retrieval of captured sessions is web based."
> 
> "Record VoIP RTP sessions by passively listening to network packets. 
> Both sides of a conversation are mixed together and each call is 
> logged as a separate audio file. When SIP or Cisco Skinny (SCCP) 
> signalling is detected, the associated metadata is also extracted."
> 
> Take it easy,
>    -Lee
> 
> 
> _______________________________________________
> SoCalFreeNet.org General Discussion List To unsubscribe, please visit: 
> http://socalfreenet.org/mailman/listinfo/discuss_socalfreenet.org
> 
> **********
> Participation and subscription information for this EDUCAUSE Constituent
Group discussion list can be found at http://www.educause.edu/groups/.

**********
Participation and subscription information for this EDUCAUSE Constituent
Group discussion list can be found at http://www.educause.edu/groups/.

**********
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.

Reply via email to