Date: Tue, 05 Sep 2000 14:47:08 -0600 From: Warner Losh <imp@village.org> To: "Kevin Oberman" <oberman@es.net> Cc: Vivek Khera <khera@kciLink.com>, Brad Knowles <blk@skynet.be>, freebsd-stable@FreeBSD.ORG Subject: Re: affordable wireless Message-ID: <200009052047.OAA63169@harmony.village.org> In-Reply-To: Your message of "Tue, 05 Sep 2000 09:11:15 PDT." <200009051611.e85GBFU16170@ptavv.es.net> References: <200009051611.e85GBFU16170@ptavv.es.net>
next in thread | previous in thread | raw e-mail | index | archive | help
In message <200009051611.e85GBFU16170@ptavv.es.net> "Kevin Oberman" writes: : Even at 128 bits, WEP encryption is, at best, rather weak. The right : answer is to use strong encryption for everything. : : OpenSSH is now a standard part of FreeBSD. Use it and stop sending : clear passwords over the net. Then you don't care about the security : of the link, only the end nodes. People can still do limited traffic analysis of encrypted TCP connections. I believe that this analysis is harder with the WEP encryption, but might be mistaken. Also, the WEP encryption is done in hardware so it doesn't steal cycles. Maybe this isn't an issue on most modern hardware, but it might be. Warner To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-stable" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200009052047.OAA63169>