From: Andy Green <andy@warmcat.com>
To: Johannes Berg <johannes@sipsolutions.net>
Cc: linux-wireless@vger.kernel.org
Subject: Re: Linux Magazin article on mac80211
Date: Fri, 25 May 2007 14:35:23 +0100 [thread overview]
Message-ID: <4656E61B.8020505@warmcat.com> (raw)
In-Reply-To: <1180098098.3604.46.camel@johannes.berg>
Johannes Berg wrote:
> On Fri, 2007-05-25 at 11:21 +0100, Andy Green wrote:
>
>> Thanks I appreciate the mention :-)) I will freshen the injection
>> patch in the next few days and propose it once more.
>
> :)
> I had been doing similar things last year btw, but not for file transfer
> but peer to peer location services. It might be very interesting to
> split up penumbra into one daemon for communication and one for the
> actual usage of that communication. Then, the communication daemon could
> be very small code and even be setuid, or possibly use dbus. Thoughts?
I have been having similar thoughts, that I currently integrated too
much vertical stuff into one monolithic thing that is more specific than
it has to be. For example, shouldn't it somehow be possible to tunnel
TCP/IP anonymously over this unencrypted transport? Maybe people
offering to bridge only want to whitelist news.bbc.co.uk, but still.
Shouldn't it offer an effective distributed NNTP proxy (again you might
only feel only able to offer a newsgroup whitelist as the bridge)?
Someone else suggested, shouldn't it bridge to Gnutella? Not sure I am
brave enough to run an Internet bridge like that, but enough anonymous
users and it can run Gnutella protocol just between the users without a
bridge to the wired Internet.
Maybe the answer is to offer a netdev interface from a penumbra module
again. For example if you send a TCP packet down it, it goes out with a
onetime magic cookie prepended that is required in any answer...
>> I also adapted
>> aircrack to work with the mac80211 monitor mode injection in the meanwhile.
>
> Cool.
I guess it is better that I am running aircrack against my network
before anyone else does. (Although all they will find is set of ssh
tunnels if they beat WPA here).
-Andy
prev parent reply other threads:[~2007-05-25 13:35 UTC|newest]
Thread overview: 6+ messages / expand[flat|nested] mbox.gz Atom feed top
2007-05-24 14:57 Linux Magazin article on mac80211 Andy Green
2007-05-24 16:02 ` Michael Buesch
2007-05-25 10:02 ` Johannes Berg
2007-05-25 10:21 ` Andy Green
2007-05-25 13:01 ` Johannes Berg
2007-05-25 13:35 ` Andy Green [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=4656E61B.8020505@warmcat.com \
--to=andy@warmcat.com \
--cc=johannes@sipsolutions.net \
--cc=linux-wireless@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).