On 6 Jun 2006, at 19:37, Spruell, Darren-Perot wrote:

> I understand. You're not saying anything regarding intercepting an  
> existing
> session and accessing the data; it's akin to getting an Ethernet  
> cable on a
> LAN (since you have the PSK for authentication) and negotiating a new
> communication session (key, etc.) with the AP.

So at that point, you're effectively on the LAN, so have access to  
the traffic that runs across it anyway.  However, if the sessions are  
individually keyed for each user, with a time-dependant rotating key,  
the person spoofing the MAC won't have the corresponding key, so  
won't be able to decode the traffic properly?

It's similar to being on the same switch, but the radio traffic that  
is visible is WPA encrypted, again with the time dependant keys.  So  
even if the PSK is freely available, the initial session negotiation  
means it's still hard to steal another person's traffic?  Or am I  
getting my layers mixed up here?

> A problem which WPA Enterprise (w/RADIUS and individual per-user
> authentication, not per-computer authentication) would protect  
> against.
>
> Unfortunately, something that wouldn't suit the OP's situation  
> either...

Yes, it requires a RADIUS client to connect.  I have read a little  
more about RADIUS (specifically FreeRADIUS) and I like the features  
it has to offer, especially the accounting parts.  It's a shame it's  
not suitable, it takes care of a lot of the problems I have yet to  
work out.

Gaby

--
Junkets for bunterish lickspittles since 1998!
http://www.playr.co.uk/sudoku/
http://weblog.vanhegan.net/

Reply via email to