>From my understanding, is the latter. Lee
Lee H. Badman Wireless/Network Engineer Information Technology and Services Syracuse University 315 443-3003 -----Original Message----- From: The EDUCAUSE Wireless Issues Constituent Group Listserv [mailto:[EMAIL PROTECTED] On Behalf Of Joshua Wright Sent: Thursday, December 04, 2008 12:35 PM To: [email protected] Subject: [WIRELESS-LAN] MIC talk [WAS: Aruba ARM 2.0] -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Lee H Badman wrote: > I do know that it is standard (but concerning) practice to take the MIC > timer from 60 seconds down to zero to overcome clients that trigger the > countermeasure and thus cause what amounts to a DDOS- is sort of a > damned if you do, damned if you don't situation. What isn't clear to me with this recommendation is this: if you reduce the MIC timer to 0, does that stop the AP from triggering countermeasures altogether (client stays connected regardless of multiple failures) or does the AP deauth the client without forcing them to wait any time before reconnecting? It seem ambiguous to me. If it's the former, then it's very dangerous in terms of attacking TKIP. If it's the latter, then, honestly, I don't have an issue with it. I think we're much too aggressive about TKIP MIC countermeasures anyway. - -Josh -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (MingW32) iEYEARECAAYFAkk4FLUACgkQapC4Te3oxYxnRgCfdbirowSezMAHJ3AbvOvUSPbH fwoAn0p2SPKVKWULdCXtokUoY4Ng8SmP =ZZPL -----END PGP SIGNATURE----- ********** Participation and subscription information for this EDUCAUSE Constituent Group discussion list can be found at http://www.educause.edu/groups/. ********** Participation and subscription information for this EDUCAUSE Constituent Group discussion list can be found at http://www.educause.edu/groups/.
