best auth method?

Kim Hawtin kim at freesolutions.net
Thu Dec 19 19:26:44 EST 2002


On Thu, Dec 19, 2002 at 02:25:09AM -0600, Jason Radford wrote:
> On Wed, 18 Dec 2002 10:23:06 -0800 (PST)
> Jim Carter <jimc at math.ucla.edu> wrote:
>  
> > With the web-based solutions, you don't have to think about Windoze / UNIX
> > / Mac.
> 
> Thanks jim/jean for your answers....
> 
> I guess going to a web page and using a username/password seems reasonable...
> 
> does anything stop someone from sniffing the network to get a mac address
> to emulate though?  Or is this something I shouldnt be concerned
> with?


if you go down the NoCat path then IIRR the username/password sessions
is over http/ssl ...

so it should not be in plain text and not sniffable

cheers,

kim



More information about the wireless mailing list