On Wed, May 11, 2011 at 10:54:16PM +0200, Adam Borowski wrote:
> On Wed, May 11, 2011 at 10:05:40PM +0200, Frank Küster wrote:
> > Not at the same time, but someone might allow a user of a laptop to
> > access their WLAN, but neither accept that an other user of the laptop
> > should be able to use the same network without asking, nor that the keys
> > be written in a system-wide configuration file.
> 
> Sorry but if you alternate physical possession of a laptop with someone whom
> you suspect of being hostile, no files are secure as long as they're stored
> on that laptop.

My wireless network uses a RADIUS server to authenticate people against
the network Kerberos database.  Every user must have an entry in the
Kerberos database in order to access the network.  While I don't mind if
while I'm connected to the network my partner uses the network
connection, I certainly don't want him able to access the password that
is used for authentication.

-- 
brian m. carlson / brian with sandals: Houston, Texas, US
+1 832 623 2791 | http://www.crustytoothpaste.net/~bmc | My opinion only
OpenPGP: RSA v4 4096b: 88AC E9B2 9196 305B A994 7552 F1BA 225C 0223 B187

Attachment: signature.asc
Description: Digital signature

Reply via email to