Thanks Bob I will certainly have a peek, I am starting to think authpf is the way to go, but the users at the intended facility are far from self sufficient/ self educating (plain lack of interest) and that usually spells trouble when helping out... or a fortune if you are a consultant, if you don't want to read the manual, then have some one else do it for you @ $110+ an hour =)
-- Johan On 7/27/05, Bob Beck <[EMAIL PROTECTED]> wrote: > > > authpf and a decent ruleset. > > use a central box and tunnel it back. > > redirect all unauthenticated http traffic to a website showing > them what to do to get authenticted. > > see http://www.ualberta.ca/CNS/wireless/ for a description of what > we use here. > > > > > * Johan P. Lindstrvm <[EMAIL PROTECTED]> [2005-07-16 10:48]: > > Thanks for all the replies, I see now that I should explain myself further. > > The scenario I am thinking of is when you run a public WiFi access point at > > let's say a campus with many new visitors from different organisations and > > you don't want to start messing around with WAP, WEP, IPSec, PPP or L2TP, > > having staff/manuals to help visitors setting up tunnels on their Windows XP > > / 2000 laptops is just not feasible. I am after a zero configuration > > solution for just the HTTP traffic, and if the sites browsed does not > > support https then there is little I can do on my end. > > > > > > On 7/15/05, Nick Holland <[EMAIL PROTECTED]> wrote: > > > > > > On Fri, Jul 15, 2005 at 06:03:01PM +0200, Johan P. Lindstrvm wrote: > > > ... > > > > I'm not too familiar with the inner workings of the needed technologies > > > > (sometimes a pro, often a con) but what if one would use a https proxy, > > > like > > > > say squid with SSL/TLS support, to obfuscate the http traffic leaving > > > your > > > > laptop over the WiFi LAN to your local OpenBSD box that runs the proxy, > > > that > > > > would then with some magic serve you the pages. So that http traffic > > > could > > > > not be intercepted on the open WiFi network. > > > ... > > > > > > Before you worry about this too much... > > > > > > IF you are worried about people packet sniffing your wireless > > > connection, you should probably be running some kind of encryption on > > > the traffic already, wireless or not. What's the point of encrypting > > > from your laptop to the firewall, if it is then sent plain-text to the > > > remote end over the common cable that many of your neighbors are also > > > attached to. > > > > > > By this point in time, any communications over the internet which should > > > not be sniffed should be encrypted end-to-end. > > > > > > That was a specific answer to a specific question. > > > the above reply is not meant to imply wireless security issues "don't > > > matter". IF the question is, "How do I keep people out of my wireless > > > network", or "how do I keep them from sniffing internal traffic in my > > > network", my answer would be very different...but that wasn't the > > > question. > > > > > > Nick. > > > > -- > Bob Beck Computing and Network Services > [EMAIL PROTECTED] University of Alberta > True Evil hides its real intentions in its street address.