Boston Linux & Unix (BLU) Home | Calendar | Mail Lists | List Archives | Desktop SIG | Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings
Linux Cafe | Meeting Notes | Blog | Linux Links | Bling | About BLU

BLU Discuss list archive


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

mac address



Rob Hasselbaum wrote:
> If your network is not protested by WPA, the attacker can simply watch the
> traffic, which will show him the authorized MAC addresses.

Wouldn't the MAC address be exposed even if WPA is in use?

If not, how do the encrypted packets get routed to the correct radio?


MAC filtering is useful to prevent casual or unintentional use of an
otherwise open network. Much the same way that turning off broadcast of
the network ID discourages casual use, but has no real impact on
security. But both can have some value in slightly raising the bar
against attacks, in the same way as having ssh listen on an alternate
port does.

 -Tom

-- 
Tom Metro
Venture Logic, Newton, MA, USA
"Enterprise solutions through open source."
Professional Profile: http://tmetro.venturelogic.com/






BLU is a member of BostonUserGroups
BLU is a member of BostonUserGroups
We also thank MIT for the use of their facilities.

Valid HTML 4.01! Valid CSS!



Boston Linux & Unix / webmaster@blu.org