Date: Wed, 13 Aug 2003 11:51:34 +0200 From: Brad Knowles <brad.knowles@skynet.be> To: Paul Robinson <paul@iconoplex.co.uk> Cc: Bill Moran <wmoran@potentialtech.com> Subject: Re: FreeBSD Security Advisory FreeBSD-SA-03:09.signal Message-ID: <a0600120fbb5fb9f0a91c@[10.0.1.4]> In-Reply-To: <3F3A0581.9010908@iconoplex.co.uk> References: <Pine.NEB.3.96L.1030811133518.66226B-100000@fledge.watson.org> <3F37D493.9050604@potentialtech.com> <44lltyij8s.fsf@be-well.ilk.org> <3F397708.7050803@potentialtech.com> <3F3A0581.9010908@iconoplex.co.uk>
next in thread | previous in thread | raw e-mail | index | archive | help
At 10:31 AM +0100 2003/08/13, Paul Robinson wrote: > Great, so I send you 10Mb of WEP traffic caught off the air, you > can decrypt it for me? You see, to me it's just a big mess of > encrypted traffic, but you obviously have some secret technique > (or should that be "t3kni|<" ?) for breaking it trivially. If > you can't, you've just shown it has some security advantage. Which > it has. Given the weak 24-bit IV that is common to both 64-bit and 128-bit WEP, and the way this IV is frequently used, it should be pretty easy to crack. Just a few hours near a busy wireless access point is usually more than enough. If you really do have 10MB of WEP traffic, odds are that's got enough information to be useful. -- Brad Knowles, <brad.knowles@skynet.be> "They that can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety." -Benjamin Franklin, Historical Review of Pennsylvania. GCS/IT d+(-) s:+(++)>: a C++(+++)$ UMBSHI++++$ P+>++ L+ !E-(---) W+++(--) N+ !w--- O- M++ V PS++(+++) PE- Y+(++) PGP>+++ t+(+++) 5++(+++) X++(+++) R+(+++) tv+(+++) b+(++++) DI+(++++) D+(++) G+(++++) e++>++++ h--- r---(+++)* z(+++)
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?a0600120fbb5fb9f0a91c>