It's not good.

But in an enterprise environment, it might be mitigated.  In order to
do "Badness", a client will have to spoof an Access Point BSSID.  I
believe most of the vendors already do BSSID spoof detection.  I'm not
sure what type of response would be appropriate, (ie blackhole that
BSSID, knocking that client off, but also knocking out 1 of your
access points).

We'll have to see how the vendors individually, and as a whole, deal
with this new problem.

I do agree with some of the comments of the article that it seems as
if this researcher was going for maximum exposure, as notifying the
big 3 / 4 was never mentioned.  (Never mind the standards body itself)

Mike

On Mon, Jul 26, 2010 at 5:59 PM, Chris Hart <ch...@northwestern.edu> wrote:
> This is not good -    It does not mention anything about keys that are
> rotated.
>
>
>
> http://www.networkworld.com/newsletters/wireless/2010/072610wireless1.html
>
>
>
>
>
>
>
> ********** Participation and subscription information for this EDUCAUSE
> Constituent Group discussion list can be found at
> http://www.educause.edu/groups/.

**********
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.

Reply via email to