James Kelly on 15 Oct 2004 20:19:02 -0000 |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Paul wrote: | Crackers connecting to the access point could attack the clients | directly through their unencrypted channels. I'm assuming that most | clients do not have their own firewalls. (Is that a reasonable | assumption?) The access point would have to restrict access to the VPN | port only to protect against that. Again, there's that trade-off | between convenience and security since non-VPN clients would not be able | to use the network. But why is this any more of a vulnerability using a VPN vs WPA? -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.3 (GNU/Linux) Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org iD8DBQFBcDCc3IzKSZsd6+oRAj3DAKDmUr5qn0mxsoldkouzsNa1NrBHhgCfVKfM qwKOpVCNJGg+Nqfpk0WX2L8= =hDEE -----END PGP SIGNATURE----- ___________________________________________________________________________ Philadelphia Linux Users Group -- http://www.phillylinux.org Announcements - http://lists.phillylinux.org/mailman/listinfo/plug-announce General Discussion -- http://lists.phillylinux.org/mailman/listinfo/plug
|
|