Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 13 Aug 2003 11:51:34 +0200
From:      Brad Knowles <brad.knowles@skynet.be>
To:        Paul Robinson <paul@iconoplex.co.uk>
Cc:        Bill Moran <wmoran@potentialtech.com>
Subject:   Re: FreeBSD Security Advisory FreeBSD-SA-03:09.signal
Message-ID:  <a0600120fbb5fb9f0a91c@[10.0.1.4]>
In-Reply-To: <3F3A0581.9010908@iconoplex.co.uk>
References:   <Pine.NEB.3.96L.1030811133518.66226B-100000@fledge.watson.org> <3F37D493.9050604@potentialtech.com> <44lltyij8s.fsf@be-well.ilk.org> <3F397708.7050803@potentialtech.com> <3F3A0581.9010908@iconoplex.co.uk>

next in thread | previous in thread | raw e-mail | index | archive | help
At 10:31 AM +0100 2003/08/13, Paul Robinson wrote:

>  Great, so I send you 10Mb of WEP traffic caught off the air, you
>  can decrypt it for me? You see, to me it's just a big mess of
>  encrypted traffic, but you obviously have some secret technique
>  (or should that be "t3kni|<" ?) for breaking it trivially. If
>  you can't, you've just shown it has some security advantage. Which
>  it has.

	Given the weak 24-bit IV that is common to both 64-bit and 
128-bit WEP, and the way this IV is frequently used, it should be 
pretty easy to crack.  Just a few hours near a busy wireless access 
point is usually more than enough.

	If you really do have 10MB of WEP traffic, odds are that's got 
enough information to be useful.

-- 
Brad Knowles, <brad.knowles@skynet.be>

"They that can give up essential liberty to obtain a little temporary
safety deserve neither liberty nor safety."
     -Benjamin Franklin, Historical Review of Pennsylvania.

GCS/IT d+(-) s:+(++)>: a C++(+++)$ UMBSHI++++$ P+>++ L+ !E-(---) W+++(--) N+
!w--- O- M++ V PS++(+++) PE- Y+(++) PGP>+++ t+(+++) 5++(+++) X++(+++) R+(+++)
tv+(+++) b+(++++) DI+(++++) D+(++) G+(++++) e++>++++ h--- r---(+++)* z(+++)



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?a0600120fbb5fb9f0a91c>