Brad,
We can agree that the 40 bit stuff is not worth the trouble. My 128
bit Lucent card says "128-bit RC-4 encryption". Last I heard, RC-4 was
not considered a "safe" algorithm.
Also, in any multi-user environment, the secret must be too public. (I
believe that when I know something, it's secu
At 9:11 AM -0700 2000/9/5, Kevin Oberman wrote:
> Even at 128 bits, WEP encryption is, at best, rather weak. The right
> answer is to use strong encryption for everything.
If I'm not mistaken, this is actually using Triple DES at 128
bits, so this is still decently strong. The proble
> "KO" == Kevin Oberman <[EMAIL PROTECTED]> writes:
KO> OpenSSH is now a standard part of FreeBSD. Use it and stop sending
KO> clear passwords over the net. Then you don't care about the security
KO> of the link, only the end nodes.
But without encryption, anyone can talk to your base statio
"Kevin Oberman" <[EMAIL PROTECTED]> wrote:
> Even at 128 bits, WEP encryption is, at best, rather weak. The right
> answer is to use strong encryption for everything.
>
> OpenSSH is now a standard part of FreeBSD. Use it and stop sending
> clear passwords over the net. Then you don't care about
"Sameer R. Manek" <[EMAIL PROTECTED]> wrote:
> Does anyone have any suggestions on how to have 802.11 wireless for home
> users? Naturally it should be supported by FreeBSD. Configuruation can be
> done on any pc os though.
>
> My only affordable solution so far is to use the Apple AirPort base
Even at 128 bits, WEP encryption is, at best, rather weak. The right
answer is to use strong encryption for everything.
OpenSSH is now a standard part of FreeBSD. Use it and stop sending
clear passwords over the net. Then you don't care about the security
of the link, only the end nodes.
R. Kevi