{"id":163,"date":"2002-02-17T14:28:04","date_gmt":"2002-02-17T21:28:04","guid":{"rendered":"http:\/\/mossback.org\/archives\/2002\/02\/insecure-networks-\/"},"modified":"2002-02-17T14:28:04","modified_gmt":"2002-02-17T21:28:04","slug":"insecure-networks","status":"publish","type":"post","link":"https:\/\/bennett.com\/blog\/2002\/02\/17\/insecure-networks\/","title":{"rendered":"Insecure networks &#8211;"},"content":{"rendered":"<p>\t\t\t\t<a href=\"http:\/\/www.infoworld.com\/articles\/hn\/xml\/02\/02\/14\/020214hnwifispec.xml\">Researchers crack new wireless security spec<\/a><\/p>\n<blockquote><p>A UNIVERSITY OF Maryland professor and his graduate student have apparently uncovered serious weaknesses in the next-generation Wi-Fi (Wireless Fidelity) security protocol known as 802.1x.<\/p><\/blockquote>\n<p>Back to the drawing board. Security wasn&#8217;t part of the 802.11 MAC protocol, because those of us who designed it didn&#8217;t know anything about the subject, and subsequent attempts to graft it on (WEP and 802.1x) have problems. As things stand, you&#8217;re not truly secure on 802.11 unless you use an end-to-end VPN, but neither are you on a wired network, easily tapped at many points. The <i>man-in-the-middle<\/i> flaw that these folks think they&#8217;ve found isn&#8217;t a genuine flaw beause they assume a directionality of signal that&#8217;s not generally possible, but I don&#8217;t want to spoil their fun. (source: <a href=\"http:\/\/80211b.weblogger.com\/\">802.11b Networking News<\/a>)\t\t<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Researchers crack new wireless security spec A UNIVERSITY OF Maryland professor and his graduate student have apparently uncovered serious weaknesses in the next-generation Wi-Fi (Wireless Fidelity) security protocol known as 802.1x. Back to the drawing board. Security wasn&#8217;t part of the 802.11 MAC protocol, because those of us who designed it didn&#8217;t know anything about &hellip; <a href=\"https:\/\/bennett.com\/blog\/2002\/02\/17\/insecure-networks\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Insecure networks &#8211;&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[4],"tags":[],"class_list":["post-163","post","type-post","status-publish","format-standard","hentry","category-comp"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbifyw-2D","_links":{"self":[{"href":"https:\/\/bennett.com\/blog\/wp-json\/wp\/v2\/posts\/163","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bennett.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bennett.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bennett.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bennett.com\/blog\/wp-json\/wp\/v2\/comments?post=163"}],"version-history":[{"count":0,"href":"https:\/\/bennett.com\/blog\/wp-json\/wp\/v2\/posts\/163\/revisions"}],"wp:attachment":[{"href":"https:\/\/bennett.com\/blog\/wp-json\/wp\/v2\/media?parent=163"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bennett.com\/blog\/wp-json\/wp\/v2\/categories?post=163"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bennett.com\/blog\/wp-json\/wp\/v2\/tags?post=163"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}