Re: New Protection for 802.11

2002-11-07 Thread Donald Eastlake 3rd
Well, you see some of the people working on improving 802.11 security, in particular some members of 802.11 Task Group i noted that IEEE procedures have no interoperability demonstration requirements. So they formed a little group that took a subset of the then current 802.11i draft and tried to

Re: New Protection for 802.11

2002-11-07 Thread thomas lakofski
David Wagner said: It's not clear to me if WPA products come with encryption turned on by default. This is probably the #1 biggest source of vulnerabilities in practice, far bigger than the weaknesses of WEP. Maybe this is the case in the USA but from my own informal surveys in Helsinki and

Re: New Protection for 802.11

2002-11-07 Thread Nelson Minar
Reading the Wifi report, it seems their customers stampeded them and demanded that the security hole be fixed, fixed a damned lot sooner than they intended to fix it. Which is sort of a shame, in a way. 802.11b has no pretense of media layer security. I've been thinking of that as an opportunity

Re: New Protection for 802.11

2002-11-07 Thread James A. Donald
-- Reading the Wifi report, http://www.weca.net/OpenSection/pdf/Wi- Fi_Protected_Access_Overview.pdf it seems their customers stampeded them and demanded that the security hole be fixed, fixed a damned lot sooner than they intended to fix it. I am struck the contrast between the seemingly

RE: New Protection for 802.11

2002-11-07 Thread Trei, Peter
James A. Donald[SMTP:[EMAIL PROTECTED]] wrote: Reading the Wifi report, http://www.weca.net/OpenSection/pdf/Wi- Fi_Protected_Access_Overview.pdf it seems their customers stampeded them and demanded that the security hole be fixed, fixed a damned lot sooner than they intended to fix it.

Re: New Protection for 802.11

2002-11-06 Thread David Honig
At 03:32 PM 11/6/02 -0500, Perry E. Metzger wrote: Does anyone know details of the new proposed protocols? Small article at: http://www.eetimes.com/story/OEG20021031S0007 Somewhere I read a larger article; things that stuck in memory are: No AES, a cipher called Michael being used; also, the

Re: New Protection for 802.11

2002-11-06 Thread William Arbaugh
It uses: -IEEE 802.1x for access control and authentication -RC4 but with a new key mixing/generation method called TKIP that provides for per packet keys and eliminates the Fluhrer et. al. attack. Russ Housely, Doug Whitting, and Nils Ferguson designed TKIP. -Michael is the MAC/MIC that

Re: New Protection for 802.11

2002-11-06 Thread Arnold G. Reinhold
See the following two Intel links with detailed discussions of TKIP and Michael which i found via Google: Increasing Wireless Security with TKIP Forwarded from: eric wolbrom, CISSP, sa ISN-a... http://www.secadministrator.com/Articles/Index.cfm?ArticleID=27064 Mark Joseph Edwards October 23,