On Mon, Dec 15, 2008 at 5:04 PM, Dan Williams <d...@redhat.com> wrote: > On Mon, 2008-12-15 at 16:47 +0100, Stefanik Gábor wrote: >> This patch regressed support for aireplay-ng's "fragmentation attack" >> feature! >> >> Prior to the landing of this patch (as commit >> caeb36d73b23b52a0ea2a8368502ef8230fa67b3), applying the patch @ >> http://patches.aircrack-ng.org/mac80211_2.6.28-rc4-wl_frag+ack_v2.patch >> allowed aireplay-ng's fragmentation attack to work with almost all >> mac80211 drivers, including ath5k. After the landing of this patch, >> the attack fails with "No answer, repeating...". (Regression found >> using git bisect, and verified by local backout of commit >> caeb36d73b23b52a0ea2a8368502ef8230fa67b3.) > > Unless I misunderstand... but not all drivers will report their MAC > address until they have opened the device (ie, add_interface time), > because not all devices load firmware until the interface is opened, and > thus some cannot read their MAC address until that time. > > So aireplay-ng is broken if it relies on the device having a valid mac > address before the device is opened. > > Dan >
That is not the problem - aireplay-ng operates on a monitor interface that is already up. Likely this patch somehow misses monitor interfaces. -- Vista: [V]iruses, [I]ntruders, [S]pyware, [T]rojans and [A]dware. :-) _______________________________________________ ath5k-devel mailing list ath5k-devel@lists.ath5k.org https://lists.ath5k.org/mailman/listinfo/ath5k-devel