Home
| Calendar
| Mail Lists
| List Archives
| Desktop SIG
| Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings Linux Cafe | Meeting Notes | Linux Links | Bling | About BLU |
Rob Hasselbaum wrote: > If your network is not protested by WPA, the attacker can simply watch the > traffic, which will show him the authorized MAC addresses. Wouldn't the MAC address be exposed even if WPA is in use? If not, how do the encrypted packets get routed to the correct radio? MAC filtering is useful to prevent casual or unintentional use of an otherwise open network. Much the same way that turning off broadcast of the network ID discourages casual use, but has no real impact on security. But both can have some value in slightly raising the bar against attacks, in the same way as having ssh listen on an alternate port does. -Tom -- Tom Metro Venture Logic, Newton, MA, USA "Enterprise solutions through open source." Professional Profile: http://tmetro.venturelogic.com/
BLU is a member of BostonUserGroups | |
We also thank MIT for the use of their facilities. |