best auth method?

evilbunny evilbunny at
Thu Dec 19 20:37:25 EST 2002

Hello Jason,

JR> I was actually talking about the network traffic after the user
JR> is authenticated.  Is this another issue to address seperate from
JR> the nocat solution?

If you mean connection hi-jacking, then I'm not sure if nocat
overcomes this or not, 802.1x does prevent this but you need software
on the client (not currently standard for anything other then Win XP)

Best regards,
 evilbunny                            mailto:evilbunny at

If we were to go by the book, hours would seem like days. - Free Security Certificates - Think globally, network locally - Telecommunications Freedom
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 1966 bytes
Desc: S/MIME Cryptographic Signature
Url :

More information about the wireless mailing list