Re: DOS attack on WPA 802.11?

2002-12-24 Thread Donald Eastlake 3rd
attack on WPA 802.11? ... The differential attack on Michael, which prompted the addition of the DoS-enabling time-out, involves sending half a billion forged packets for every one packet that gets through. Why isn't that considered [by the 802.11i Task Group] a minor and even currently

Re: DOS attack on WPA 802.11?

2002-12-08 Thread Arnold G. Reinhold
At 10:48 PM -0500 11/29/02, Donald Eastlake 3rd wrote: Arnold, If you want to play with this as in intellectual exercise, be my guest.  But the probability of changing the underlying IEEE 802.11i draft standard, which would take a 3/4 majority of the voting members of IEEE 802.11, or of making

Re: DOS attack on WPA 802.11?

2002-12-08 Thread Donald Eastlake 3rd
:18 -0500 From: Arnold G. Reinhold [EMAIL PROTECTED] To: Donald Eastlake 3rd [EMAIL PROTECTED] Cc: [EMAIL PROTECTED] Subject: Re: DOS attack on WPA 802.11? At 10:48 PM -0500 11/29/02, Donald Eastlake 3rd wrote: Arnold, If you want to play with this as in intellectual exercise, be my guest

Re: DOS attack on WPA 802.11?

2002-12-08 Thread David Wagner
Arnold G. Reinhold wrote: If I am right and WPA needlessly introduces a significant denial of service vulnerability, then it should be fixed. If I am wrong, no change is needed of course. But TKIP (the part of WPA you're talking about) is only a temporary measure, and will soon be replaced by

Re: DOS attack on WPA 802.11?

2002-12-08 Thread Derek Atkins
The answer is multi-fold. 1) The 802.11i standard wont be finished for a while. 2) There is an apparent Market Requirement for something better than WEP __NOW__. 3) The WPA can only change their requirements once per year, so even if 802.11i were ready in 3 months, it would still take

Re: DOS attack on WPA 802.11?

2002-12-08 Thread James A. Donald
-- Arnold G. Reinhold Cryptographic standards should be judged on their merits, not on the bureaucratic difficulties in changing them. Specs have been amended before. Even NSA was willing to revise its original secure hash standard. That's why we have SHA1. If I am right and WPA

Re: DOS attack on WPA 802.11?

2002-11-29 Thread Arnold G. Reinhold
At 4:57 AM +0100 11/19/02, Niels Ferguson wrote: At 21:58 18/11/02 -0500, Arnold G Reinhold wrote: ... Third, a stronger variant of WPA designed for 11a could also run on 11b hardware if there is enough processing power, so modularization is not broken. But there _isn't_ enough processing

Re: DOS attack on WPA 802.11?

2002-11-29 Thread Niels Ferguson
At 13:53 29/11/02 -0500, Arnold G. Reinhold wrote: But there _isn't_ enough processing power to run a super-Michael. If there were, I'd have designed Michael to be stronger. I'm not sure that is true for all existing 802.11b hardware. And vendors of new 802.11b hardware could certainly elect to

Re: DOS attack on WPA 802.11?

2002-11-29 Thread Donald Eastlake 3rd
incompatible with the standard, are close to zero. Fri, 29 Nov 2002, Arnold G. Reinhold wrote: Date: Fri, 29 Nov 2002 13:53:41 -0500 From: Arnold G. Reinhold [EMAIL PROTECTED] To: Niels Ferguson [EMAIL PROTECTED] Cc: [EMAIL PROTECTED] Subject: Re: DOS attack on WPA 802.11? At 4:57 AM

Re: DOS attack on WPA 802.11?

2002-11-19 Thread Niels Ferguson
At 00:55 14/11/02 -0800, Bill Stewart wrote: At 12:03 PM 11/11/2002 -0500, Arnold G. Reinhold wrote: One of the tenets of cryptography is that new security systems deserve to be beaten on mercilessly without deference to their creator. In particular, I'd be interested in finding out if the new

Re: DOS attack on WPA 802.11?

2002-11-19 Thread Arnold G Reinhold
[please ignore previous mesage, sent by mistake -- agr] On Sat, 16 Nov 2002, Niels Ferguson wrote: At 18:15 15/11/02 -0500, Arnold G Reinhold wrote: I agree that we have covered most of the issues. One area whre you have not responded is the use of WPa in 802.11a. I see no justification for

Re: DOS attack on WPA 802.11?

2002-11-13 Thread Arnold G. Reinhold
At 11:40 PM +0100 11/11/02, Niels Ferguson wrote: At 12:03 11/11/02 -0500, Arnold G. Reinhold wrote: [...] One of the tenets of cryptography is that new security systems deserve to be beaten on mercilessly without deference to their creator. I quite agree. I hope you won't mind another round

Re: DOS attack on WPA 802.11?

2002-11-13 Thread Niels Ferguson
We've gone through all the main argument here, and I think it is clear we don't agree. I started writing a detailed reply to your last message, but most of it was just argueing that we need authentication on 802.11 packets. TGi had a limited brief: improve the security for 802.11, and that

Re: DOS attack on WPA 802.11?

2002-11-11 Thread Niels Ferguson
At 12:03 11/11/02 -0500, Arnold G. Reinhold wrote: [...] One of the tenets of cryptography is that new security systems deserve to be beaten on mercilessly without deference to their creator. I quite agree. And I would argue that the Michael countermeasure is no ordinary design tradeoff. It

Re: DOS attack on WPA 802.11?

2002-11-08 Thread William Arbaugh
TGi has NEVER been all that interested in DOS attacks because a number of people argued that all you need to do is turn on a spark gap transmitter. While this is true, I think it is harder (one can argue how much) to get a spark gap transmitter and use it correctly than a laptop, NIC card, and

DOS attack on WPA 802.11?

2002-11-07 Thread Arnold G. Reinhold
The new Wi-Fi Protected Access scheme (WPA), designed to replace the discredited WEP encryption for 802.11b wireless networks, is a major and welcome improvement. However it seems to have a significant vulnerability to denial of service attacks. This vulnerability results from the proposed

Re: DOS attack on WPA 802.11?

2002-11-07 Thread Donald Eastlake 3rd
On Thu, 7 Nov 2002, Arnold G. Reinhold wrote: Date: Thu, 7 Nov 2002 16:17:48 -0500 From: Arnold G. Reinhold [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: DOS attack on WPA 802.11? The new Wi-Fi Protected Access scheme (WPA), designed to replace the discredited WEP encryption