In message 962j9b$bd5$[EMAIL PROTECTED], David Wagner writes:
* Use a VPN with strong end-to-end cryptographic authentication
and encryption (e.g., IPSEC or equivalent)
At CITI, we protect the traffic between base station and wavelan
clients via IPsec. The setup is very simple and it works
WF1
In WF1 the 802.11 WEP keys would be changed many times each hour, say
every 10 minutes. A parameter, P , determines how many time per hour
the key is to be changed, where P must divide 3600 evenly. The WEP
keys are derived from a master key, M, by taking the low order N
bits (N = 40,
At 5:55 AM +0900 2/10/2001, [EMAIL PROTECTED] wrote:
WF1
In WF1 the 802.11 WEP keys would be changed many times each hour, say
every 10 minutes. A parameter, P , determines how many time per hour
the key is to be changed, where P must divide 3600 evenly. The WEP
keys are derived from a master
At 12:05 PM -0500 on 2/8/01, Arnold G. Reinhold wrote:
Thus there is a need for a short term remedy that can work with the
existing standard.
Not to pull your leg (too hard), or anything, but, we were told, at
mac-crypto, that it's called "super-encryption". ;-)
IPSec anyone?
Cheers,
RAH
Arnold G. Reinhold wrote:
Thus there is a need for a short term remedy that can work with the
existing standard.
Maybe the easiest short term remedy that does not require
any changes to hardware is the following:
* Put the wireless network outside your firewall
(or place a firewall
The draft paper by Borisov, Goldberg, and Wagner
http://www.isaac.cs.berkeley.edu/isaac/wep-draft.pdf presents a
number of practical attacks on 802.11 Wired Equivalent Privacy (WEP).
The right way to fix them, as the paper points out, is to rework the
802.11 protocol to use better encryption
Unfortunately these are not new attacks. Some IETFers were talking
about these as long as 1.5 years ago. This new paper is just a
formalization of the (previously known, or at least guessed) attacks.
About a year ago we theorized that we could guess a key by passive
eavesdropping. However
as reported on Good Morning Silicon Valley:
Researchers from UC Berkeley and private security firm Zero-Knowledge
Systems have uncovered a means of disrupting the Wired Equivalent Privacy
(WEP) algorithm, an important part of the 802.11 corporate standard for
wireless computer networks. While