Date: Wed, 13 Aug 2003 11:51:34 +0200 From: Brad Knowles <brad.knowles@skynet.be> To: Paul Robinson <paul@iconoplex.co.uk> Cc: Bill Moran <wmoran@potentialtech.com> Subject: Re: FreeBSD Security Advisory FreeBSD-SA-03:09.signal Message-ID: <a0600120fbb5fb9f0a91c@[10.0.1.4]> In-Reply-To: <3F3A0581.9010908@iconoplex.co.uk> References: <Pine.NEB.3.96L.1030811133518.66226B-100000@fledge.watson.org> <3F37D493.9050604@potentialtech.com> <44lltyij8s.fsf@be-well.ilk.org> <3F397708.7050803@potentialtech.com> <3F3A0581.9010908@iconoplex.co.uk>
next in thread | previous in thread | raw e-mail | index | archive | help
At 10:31 AM +0100 2003/08/13, Paul Robinson wrote:
> Great, so I send you 10Mb of WEP traffic caught off the air, you
> can decrypt it for me? You see, to me it's just a big mess of
> encrypted traffic, but you obviously have some secret technique
> (or should that be "t3kni|<" ?) for breaking it trivially. If
> you can't, you've just shown it has some security advantage. Which
> it has.
Given the weak 24-bit IV that is common to both 64-bit and
128-bit WEP, and the way this IV is frequently used, it should be
pretty easy to crack. Just a few hours near a busy wireless access
point is usually more than enough.
If you really do have 10MB of WEP traffic, odds are that's got
enough information to be useful.
--
Brad Knowles, <brad.knowles@skynet.be>
"They that can give up essential liberty to obtain a little temporary
safety deserve neither liberty nor safety."
-Benjamin Franklin, Historical Review of Pennsylvania.
GCS/IT d+(-) s:+(++)>: a C++(+++)$ UMBSHI++++$ P+>++ L+ !E-(---) W+++(--) N+
!w--- O- M++ V PS++(+++) PE- Y+(++) PGP>+++ t+(+++) 5++(+++) X++(+++) R+(+++)
tv+(+++) b+(++++) DI+(++++) D+(++) G+(++++) e++>++++ h--- r---(+++)* z(+++)
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?a0600120fbb5fb9f0a91c>
