>From my understanding, is the latter.

Lee

Lee H. Badman
Wireless/Network Engineer
Information Technology and Services
Syracuse University
315 443-3003

-----Original Message-----
From: The EDUCAUSE Wireless Issues Constituent Group Listserv
[mailto:[EMAIL PROTECTED] On Behalf Of Joshua Wright
Sent: Thursday, December 04, 2008 12:35 PM
To: [email protected]
Subject: [WIRELESS-LAN] MIC talk [WAS: Aruba ARM 2.0]

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Lee H Badman wrote:
> I do know that it is standard (but concerning) practice to take the
MIC
> timer from 60 seconds down to zero to overcome clients that trigger
the
> countermeasure and thus cause what amounts to a DDOS- is sort of a
> damned if you do, damned if you don't situation.

What isn't clear to me with this recommendation is this: if you reduce
the MIC timer to 0, does that stop the AP from triggering
countermeasures altogether (client stays connected regardless of
multiple failures) or does the AP deauth the client without forcing them
to wait any time before reconnecting?

It seem ambiguous to me.  If it's the former, then it's very dangerous
in terms of attacking TKIP.  If it's the latter, then, honestly, I don't
have an issue with it.  I think we're much too aggressive about TKIP MIC
countermeasures anyway.

- -Josh
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (MingW32)

iEYEARECAAYFAkk4FLUACgkQapC4Te3oxYxnRgCfdbirowSezMAHJ3AbvOvUSPbH
fwoAn0p2SPKVKWULdCXtokUoY4Ng8SmP
=ZZPL
-----END PGP SIGNATURE-----

**********
Participation and subscription information for this EDUCAUSE Constituent
Group discussion list can be found at http://www.educause.edu/groups/.

**********
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.

Reply via email to