best auth method?
Kim Hawtin
kim at freesolutions.net
Thu Dec 19 19:26:44 EST 2002
On Thu, Dec 19, 2002 at 02:25:09AM -0600, Jason Radford wrote:
> On Wed, 18 Dec 2002 10:23:06 -0800 (PST)
> Jim Carter <jimc at math.ucla.edu> wrote:
>
> > With the web-based solutions, you don't have to think about Windoze / UNIX
> > / Mac.
>
> Thanks jim/jean for your answers....
>
> I guess going to a web page and using a username/password seems reasonable...
>
> does anything stop someone from sniffing the network to get a mac address
> to emulate though? Or is this something I shouldnt be concerned
> with?
if you go down the NoCat path then IIRR the username/password sessions
is over http/ssl ...
so it should not be in plain text and not sniffable
cheers,
kim
More information about the wireless
mailing list