From owner-freebsd-stable Tue Sep 5 9:11:26 2000 Delivered-To: freebsd-stable@freebsd.org Received: from ptavv.es.net (ptavv.es.net [198.128.4.29]) by hub.freebsd.org (Postfix) with ESMTP id CD4F137B423 for ; Tue, 5 Sep 2000 09:11:24 -0700 (PDT) Received: from ptavv.es.net (localhost [127.0.0.1]) by ptavv.es.net (8.10.1/8.10.1) with ESMTP id e85GBFU16170; Tue, 5 Sep 2000 09:11:15 -0700 (PDT) Message-Id: <200009051611.e85GBFU16170@ptavv.es.net> To: Vivek Khera Cc: Brad Knowles , freebsd-stable@FreeBSD.ORG Subject: Re: affordable wireless In-reply-to: Your message of "Tue, 05 Sep 2000 10:34:46 EDT." <14773.1158.657375.297666@onceler.kciLink.com> Date: Tue, 05 Sep 2000 09:11:15 -0700 From: "Kevin Oberman" Sender: owner-freebsd-stable@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG Even at 128 bits, WEP encryption is, at best, rather weak. The right answer is to use strong encryption for everything. OpenSSH is now a standard part of FreeBSD. Use it and stop sending clear passwords over the net. Then you don't care about the security of the link, only the end nodes. R. Kevin Oberman, Network Engineer Energy Sciences Network (ESnet) Ernest O. Lawrence Berkeley National Laboratory (Berkeley Lab) E-mail: oberman@es.net Phone: +1 510 486-8634 To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-stable" in the body of the message