Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
The Internet

NoCatAuth: Authentication for Wireless Networks 42

Lisa writes: "Even an open community wireless network needs to keep track of who's using it, says Rob Flickenger, who describes the authentication system used by NoCat in this article." This is at least partially an ad for Flickenger's new book, but since I plan to buy the book anyway... Update: 11/17 14:53 GMT by M : Yep, this is a duplicate. But community wireless needs more participants, so why not read it again? :)
This discussion has been archived. No new comments can be posted.

NoCatAuth: Authentication for Wireless Networks

Comments Filter:
  • by PhotonSphere ( 193108 ) on Saturday November 17, 2001 @10:51AM (#2578231) Homepage Journal
    Since this article was posted earlier, can I simply copy and paste all the top-moderated comments to grab some easy karma? I shall call it a consistency-test!
  • Is posting the same article several times considered Spamming Slashdot Readers (tm)?

    spam slash spam slash spam slash spam slash spam slash spam slash spam slash spam slash

    ...plionk...

    ...SPLASH...

    ...aaaaah...

  • well at least they are getting closer to not doing duplicates :)
  • While it's certainly reasonable to want authentication
    even if you're not going to be charging BigBux for it,
    taking a web-centric approach to using a net is not
    really going to cut it going forward. Using the web as
    an _enrollement_ tool is probably fine, but if you want
    to be running VoIP phones which need real time handoff
    capabilities, let's see... "Hold on while I sign up for service
    on this new AP...". I don't think so.

    Fast roaming is going ot require a better authentication
    subsystem which is inherently single signon and will
    almost certainly requires cross realm agreements so that
    you can move from cellular to 802.11 to whatever
    seamlessly. My personal fave candidate is to use kerberos
    mechanisms since it allows amortization of expensive
    public operations, but other heroism may be needed in
    the form of the icky prospect of transfering AAA, SA, and
    QoS authorization context across access routers, etc.
  • ... would be if you could easily set aside a certain percentage of your bandwidth (say 10-15%) for use by other people, and more if its available. That way you aren't taking a backseat to freeloaders on your own network, but you also aren't curring people off whenever you start a big, bandwidth-heavy transfer.
  • If he wants to authenticate users on his network, good for him. But he assumes that everybody feels the same way as him. Authentication flies in the face of absolute anonymity, and anything that blocks anonymity is a Bad Thing (tm).
  • by RedX ( 71326 ) <redx AT wideopenwest DOT com> on Saturday November 17, 2001 @06:30PM (#2579530)
    Worst. Thread. Ever.
  • Of what use, exactly, are these open networks? My wireless station doesn't even reach outside the house, and I doubt you could boost it to cover more than a few homes. Unless you plan to let flocks of people park on your lawn and use their laptops, wouldn't the only others using it be neighbours, who will stay in one place, and let you give them access to it anyway?

The Tao is like a glob pattern: used but never used up. It is like the extern void: filled with infinite possibilities.

Working...