I was setting up one of my routers (WRT-54G with DD-WRT) to be able to use it at home and noticed that when I'd set the APs network ID (happy), and run an "ifconfig rum0 scan" I get the following output:
# ifconfig rum0 scan rum0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> mtu 1500 lladdr 00:0e:3b:1e:f0:14 priority: 4 groups: wlan egress media: IEEE802.11 autoselect (OFDM54 mode 11g) status: active ieee80211: nwid Olympus chan 6 bssid 00:1d:7e:ba:5d:f0 120dB wpapsk 0xa8b998937cb300969596b972ba6363abf2c8aa5080469cc0c74fba6a62733fd9 wpaprotos wpa1,wpa2 wpaakms psk wpaciphers tkip,ccmp wpagroupcipher tkip 100dBm nwid 0x0000000000 chan 10 bssid 00:0c:41:75:cf:22 89dB 54M privacy,short_preamble,short_slottime nwid Olympus chan 6 bssid 00:1d:7e:ba:5d:f0 120dB 54M privacy,short_preamble,short_slottime inet 192.168.1.17 netmask 0xffffff00 broadcast 192.168.1.255 the "nwid" field shows 10 zeros So I set the network ID to something longer (mega_happy_time) # ifconfig rum0 scan rum0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> mtu 1500 lladdr 00:0e:3b:1e:f0:14 priority: 4 groups: wlan egress media: IEEE802.11 autoselect (OFDM54 mode 11g) status: active ieee80211: nwid Olympus chan 6 bssid 00:1d:7e:ba:5d:f0 120dB wpapsk 0xa8b998937cb300969596b972ba6363abf2c8aa5080469cc0c74fba6a62733fd9 wpaprotos wpa1,wpa2 wpaakms psk wpaciphers tkip,ccmp wpagroupcipher tkip 100dBm nwid 0x000000000000000000000000000000 chan 10 bssid 00:0c:41:75:cf:22 89dB 54M privacy,short_preamble,short_slottime nwid Olympus chan 6 bssid 00:1d:7e:ba:5d:f0 120dB 54M privacy,short_preamble,short_slottime inet 192.168.1.17 netmask 0xffffff00 broadcast 192.168.1.255and issued the same command: with a 15 character nwid, it shows 30 zeros. So, if I come across a wireless with a hidden network, I can guess the number of characters in the nwid. Just for giggles, I set the nwid to "1" and ran it again... # ifconfig rum0 scan rum0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> mtu 1500 lladdr 00:0e:3b:1e:f0:14 priority: 4 groups: wlan egress media: IEEE802.11 autoselect (OFDM54 mode 11g) status: active ieee80211: nwid Olympus chan 6 bssid 00:1d:7e:ba:5d:f0 120dB wpapsk 0xa8b998937cb300969596b972ba6363abf2c8aa5080469cc0c74fba6a62733fd9 wpaprotos wpa1,wpa2 wpaakms psk wpaciphers tkip,ccmp wpagroupcipher tkip 100dBm nwid 0x00 chan 10 bssid 00:0c:41:75:cf:22 89dB 54M privacy,short_preamble,short_slottime nwid Olympus chan 6 bssid 00:1d:7e:ba:5d:f0 120dB 54M privacy,short_preamble,short_slottime inet 192.168.1.17 netmask 0xffffff00 broadcast 192.168.1.255 This was on an AP setup with WPA2, with AES (CCMP), with the broadcast set to "hidden". I realize that this is probably not a big deal, but I just thought it was interesting to point out. I mean, without the passphrase, it would be difficult to access the box. This was on a laptop running a Hawking USB wireless (HWUG1) which attaches to rum(4). I tried this on a cvs build from 15 September 2010. Bryan