best auth method?

evilbunny evilbunny at sydneywireless.com
Thu Dec 19 20:37:25 EST 2002


Hello Jason,


JR> I was actually talking about the network traffic after the user
JR> is authenticated.  Is this another issue to address seperate from
JR> the nocat solution?

If you mean connection hi-jacking, then I'm not sure if nocat
overcomes this or not, 802.1x does prevent this but you need software
on the client (not currently standard for anything other then Win XP)

-- 
Best regards,
 evilbunny                            mailto:evilbunny at sydneywireless.com

If we were to go by the book, hours would seem like days.

http://www.cacert.org - Free Security Certificates
http://www.nodedb.com - Think globally, network locally
http://www.sydneywireless.com - Telecommunications Freedom
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 1966 bytes
Desc: S/MIME Cryptographic Signature
Url : http://lists.samba.org/archive/wireless/attachments/20021219/f3cbee3f/smime.bin


More information about the wireless mailing list