>Reading the Wifi report, it seems their customers stampeded them and
>demanded that the security hole be fixed, fixed a damned lot sooner
>than they intended to fix it.
Which is sort of a shame, in a way. 802.11b has no pretense of media
layer security. I've been thinking of that as an opportunit
> James A. Donald[SMTP:[EMAIL PROTECTED]] wrote:
>
>
> Reading the Wifi report,
> http://www.weca.net/OpenSection/pdf/Wi-
> Fi_Protected_Access_Overview.pdf
> it seems their customers stampeded them and demanded that the
> security hole be fixed, fixed a damned lot sooner than they
> intended to
David Wagner said:
> It's not clear to me if WPA products come with encryption turned on by
> default. This is probably the #1 biggest source of vulnerabilities in
> practice, far bigger than the weaknesses of WEP.
Maybe this is the case in the USA but from my own informal surveys in
Helsinki and
--
Reading the Wifi report,
http://www.weca.net/OpenSection/pdf/Wi-
Fi_Protected_Access_Overview.pdf
it seems their customers stampeded them and demanded that the
security hole be fixed, fixed a damned lot sooner than they
intended to fix it.
I am struck the contrast between the seemingly str
Well, you see some of the people working on improving 802.11 security,
in particular some members of 802.11 Task Group i noted that IEEE
procedures have no interoperability demonstration requirements. So they
formed a little group that took a subset of the then current 802.11i
draft and tried to im
See the following two Intel links with detailed discussions of TKIP
and Michael which i found via Google:
Increasing Wireless Security with TKIP
Forwarded from: "eric wolbrom, CISSP", sa ISN-a...
http://www.secadministrator.com/Articles/Index.cfm?ArticleID=27064
Mark Joseph Edwards
October 23,
Perry E. Metzger wrote:
>Does anyone know details of the new proposed protocols?
WPA seems to be TKIP (a short-term improvement to WEP) + 802.1x (user
authentication, typically hooked into RADIUS?). The background is that
the IEEE 802.11i working group is developing two fixes to WEP: TKIP,
the sh
It uses:
-IEEE 802.1x for access control and authentication
-RC4 but with a new key mixing/generation method called TKIP that
provides for per packet keys and eliminates the Fluhrer et. al.
attack. Russ Housely, Doug Whitting, and Nils Ferguson designed TKIP.
-Michael is the MAC/MIC that p
At 03:32 PM 11/6/02 -0500, Perry E. Metzger wrote:
>Does anyone know details of the new proposed protocols?
Small article at:
http://www.eetimes.com/story/OEG20021031S0007
Somewhere I read a larger article; things that
stuck in memory are: No AES, a cipher called "Michael"
being used; also, th