On Thu, Mar 12, 2009 at 08:09:53PM -0700, Luis R. Rodriguez wrote: > Do we want to ignore certain APs if we determine they are bogus? Only if we can be sure that there is no chance of that AP working (e.g., someone running a program that sends random Beacon frames just to annoy people). Even in the case of apparently bogus AP, I'm not sure I would like to remove it from the scan results in any other case than the attack with huge number of random beacons/probe response frames. > An > example is 11n APs with WEP/TKIP. Would we rather not even store then > in our bss list so that way we wont' get reports from users not being > able to connect to such APs. That is not an example of an AP we would not be able to talk to (with legacy rates; and as far as HT-only configuration is concerned, we would likely only learn about that after having tried to associate). > Other examples might be if 11n APs have > HT IEs but their lengths are not right, or if the AP is HT40 and our > regulatory domain does now allow HT40. I would be careful about IE lengths since many IEs can be extended in the future. As far as HT40 is concerned, we could try to associate with HT20 and anyway, I would like to see that AP in the scan results. > The benefit I see with these early checks we won't get complaints > about not being able to connect to bogus APs or APs you shouldn't be > connected to anyway. Those would be replaced with complaints about not seeing APs, scan being broken, and not being able to connect to APs that we should be able to connect to.. -- Jouni Malinen PGP id EFC895FA -- To unsubscribe from this list: send the line "unsubscribe linux-wireless" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html