the other side of wireless security

Miner, Jonathan W (CSC) (US SSA) jonathan.w.miner at baesystems.com
Mon Oct 8 12:07:12 UTC 2007


 

	-----Original Message----- 
	From: fedora-list-bounces at redhat.com on behalf of Tim 
	Sent: Fri 10/05/2007 06:37 AM 
	To: For users of Fedora 
	Cc: 
	Subject: the other side of wireless security
	
	


	I've just been looking at possibly getting a laptop (a maddening
	exercise, if there ever was one), and have been playing with a friend's
	for a while, now.  One thing I haven't noticed are comments on the
	security of the other side of the wireless connection, your side.  Does
	the laptop treat connections made to its wireless interface in the same
	manner as it would a wired connection?  Do the encryption schemes you
	might use to connect to an access point work in the same way in the
	reverse direction?
	-----------------------------------------------

	My apologies if this isn't related... I was working with a friend last week, and trying to debug communication issues between her laptop and her hosting company's FTP server.  Her wireless network is unencrypted, and both her laptop (WinXP)  and mine (F7) were "connected".  I could run wireshark on my wireless interface and see the traffic from the server to her laptop... but not the traffic from the laptop to the server.  (Physically tapping the network, upstream from the AP would be my next option)

	Thanks

-------------- next part --------------
A non-text attachment was scrubbed...
Name: winmail.dat
Type: application/ms-tnef
Size: 4442 bytes
Desc: not available
URL: <http://listman.redhat.com/archives/fedora-list/attachments/20071008/839a9239/attachment-0001.bin>


More information about the fedora-list mailing list