Date: Sun, 28 Aug 2011 21:33:01 -0500 (CDT) From: Robert Bonomi <bonomi@mail.r-bonomi.com> To: freebsd-questions@freebsd.org Subject: Re: wireless access point in FreeBSD 8.2p2 Message-ID: <201108290233.p7T2X1Ho046001@mail.r-bonomi.com> In-Reply-To: <CCE337C1-C7FC-47BF-B734-EC762F5D881A@gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
> From owner-freebsd-questions@freebsd.org Sun Aug 28 20:41:41 2011 > From: Paul Beard <paulbeard@gmail.com> > Date: Sun, 28 Aug 2011 18:39:41 -0700 > To: Warren Block <wblock@wonkity.com> > Cc: "freebsd-questions@FreeBSD. ORG" <freebsd-questions@freebsd.org> > Subject: Re: wireless access point in FreeBSD 8.2p2 > > > I'll read through that and see if it helps me at all. > > I found this "'Hidden' SSIDs are not really hidden. They make network > setup more difficult and provide no real security benefits." > interesting. I assume you could figure them out from wardriving? Hidden SSIDs just mean that the access point doesn't broadcast/announce it. The client machine has to transmit it, so that _AN_ access point can tell whether or not the client is tryint to connect to _it_. With something that snoops _all_ the wireless traffic, all you have to do is wait for somebody, _anybody_, to connect to that access point, and bingo, you've got the SSID. 'Hiding' the ID does nothing to deter the "determined" attacker, but it is quite effective at stopping the 'casual' leech. It also means that boxes that 'automatically" connect to the strongest signal in range, when none of their 'favored' networks are in range -- such boxes wil _not_ attempt to a system that doesn't "publish" it's SSID. This can be beneficial.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201108290233.p7T2X1Ho046001>