best auth method?
evilbunny at sydneywireless.com
Thu Dec 19 20:37:25 EST 2002
JR> I was actually talking about the network traffic after the user
JR> is authenticated. Is this another issue to address seperate from
JR> the nocat solution?
If you mean connection hi-jacking, then I'm not sure if nocat
overcomes this or not, 802.1x does prevent this but you need software
on the client (not currently standard for anything other then Win XP)
evilbunny mailto:evilbunny at sydneywireless.com
If we were to go by the book, hours would seem like days.
http://www.cacert.org - Free Security Certificates
http://www.nodedb.com - Think globally, network locally
http://www.sydneywireless.com - Telecommunications Freedom
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 1966 bytes
Desc: S/MIME Cryptographic Signature
Url : http://lists.samba.org/archive/wireless/attachments/20021219/f3cbee3f/smime.bin
More information about the wireless