[12126] in cryptography@c2.net mail archive
Re: DOS attack on WPA 802.11?
daemon@ATHENA.MIT.EDU (James A. Donald)
Sun Dec 8 21:17:53 2002
Date: Sun, 08 Dec 2002 17:31:51 -0800
From: "James A. Donald" <jamesd@echeque.com>
In-reply-to: <v04210101ba153ce8d1cd@[192.168.0.3]>
To: cryptography@wasabisystems.com
--
Arnold G. Reinhold
> Cryptographic standards should be judged on their merits, not
> on the bureaucratic difficulties in changing them. Specs have
> been amended before. Even NSA was willing to revise its
> original secure hash standard. That's why we have SHA1. If I
> am right and WPA needlessly introduces a significant denial
> of service vulnerability, then it should be fixed.
I do not think the DOS is significant, since one can do the
same thing with a spark emitter. The person doing the DOS has
to bring his equipment up to the target, which makes attacker
vulnerable to BBRS (Baseball bat restoration of service)
--digsig
James A. Donald
6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
z9usqTFDdak6fIXLvMz4FRjtDX9LwX0psRJRmfeP
4JZ85epzXMA2AbDtWU3mqFXAi8Pu30SKDhyrx2bRN
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com