[12126] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: DOS attack on WPA 802.11?

daemon@ATHENA.MIT.EDU (James A. Donald)
Sun Dec 8 21:17:53 2002

Date: Sun, 08 Dec 2002 17:31:51 -0800
From: "James A. Donald" <jamesd@echeque.com>
In-reply-to: <v04210101ba153ce8d1cd@[192.168.0.3]>
To: cryptography@wasabisystems.com

    --
Arnold G. Reinhold
> Cryptographic standards should be judged on their merits, not
> on the bureaucratic difficulties in changing them. Specs have
> been amended before. Even NSA was willing to revise its
> original secure hash standard. That's why we have SHA1.  If I
> am right and WPA needlessly introduces a significant denial
> of service vulnerability, then it should be fixed.

I do not think the DOS is significant, since one can do the
same thing with a spark emitter.  The person doing the DOS has
to bring his equipment up to the target, which makes attacker
vulnerable to BBRS (Baseball bat restoration of service)

    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     z9usqTFDdak6fIXLvMz4FRjtDX9LwX0psRJRmfeP
     4JZ85epzXMA2AbDtWU3mqFXAi8Pu30SKDhyrx2bRN


---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post