On Mon, Dec 15, 2008 at 5:04 PM, Dan Williams <d...@redhat.com> wrote:
> On Mon, 2008-12-15 at 16:47 +0100, Stefanik Gábor wrote:
>> This patch regressed support for aireplay-ng's "fragmentation attack" 
>> feature!
>>
>> Prior to the landing of this patch (as commit
>> caeb36d73b23b52a0ea2a8368502ef8230fa67b3), applying the patch @
>> http://patches.aircrack-ng.org/mac80211_2.6.28-rc4-wl_frag+ack_v2.patch
>> allowed aireplay-ng's fragmentation attack to work with almost all
>> mac80211 drivers, including ath5k. After the landing of this patch,
>> the attack fails with "No answer, repeating...". (Regression found
>> using git bisect, and verified by local backout of commit
>> caeb36d73b23b52a0ea2a8368502ef8230fa67b3.)
>
> Unless I misunderstand...  but not all drivers will report their MAC
> address until they have opened the device (ie, add_interface time),
> because not all devices load firmware until the interface is opened, and
> thus some cannot read their MAC address until that time.
>
> So aireplay-ng is broken if it relies on the device having a valid mac
> address before the device is opened.
>
> Dan
>

That is not the problem - aireplay-ng operates on a monitor interface
that is already up. Likely this patch somehow misses monitor
interfaces.

-- 
Vista: [V]iruses, [I]ntruders, [S]pyware, [T]rojans and [A]dware. :-)
_______________________________________________
ath5k-devel mailing list
ath5k-devel@lists.ath5k.org
https://lists.ath5k.org/mailman/listinfo/ath5k-devel

Reply via email to