On Mon, 21 Nov 2005, Ross Hosman wrote:
So my question is pretty simple. You have all these major companies such as google/earthlink/sprint/etc. building wifi networks. Lets say I want to collect peoples information so I setup an AP with the same ssid as google's ap so people connect to it and I log all of their traffic. Most people won't check beyond the ssid to look at the mac address but even that could be spoofed. Is there anyway to verify a certain ap beyond mac/ssid, will there be in the future? How do these companies plan to mitigate this threat or are they just going to hope consumers are smart enough to figure it out?
What do you learn by looking at someone's ipsec, ssl-wrappered, or ssh tunneled traffic? Clear-text data-streams have the same liability almost everywhere (in the public sphere), so if you want to move data that has any importance at all you protect the data end-to-end.
Ross Hosman Network/Systems Administrator E: rhosman@corp.hometel.com P: 618-644-2111 x 238 C: 314-898-3381 Y!: rosshosman
-- -------------------------------------------------------------------------- Joel Jaeggli Unix Consulting joelja@darkwing.uoregon.edu GPG Key Fingerprint: 5C6E 0104 BAF0 40B0 5BD3 C38B F000 35AB B67F 56B2