[Bug 165489] New: Review Request: Wireless LAN (WLAN) tool which recovers encryption keys
bugzilla at redhat.com
bugzilla at redhat.com
Tue Aug 9 19:15:04 UTC 2005
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug report.
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=165489
Summary: Review Request: Wireless LAN (WLAN) tool which recovers
encryption keys
Product: Fedora Extras
Version: devel
Platform: All
URL: http://airsnort.shmoo.com/
OS/Version: Linux
Status: NEW
Severity: normal
Priority: normal
Component: Package Review
AssignedTo: gdk at redhat.com
ReportedBy: andreas.bierfert at lowlatency.de
QAContact: dkl at redhat.com
CC: fedora-extras-list at redhat.com
Spec Name or Url: http://fedora.lowlatency.de/review/airsnort.spec
SRPM Name or Url: http://fedora.lowlatency.de/review/airsnort-0.2.7e-3.src.rpm
Description:
AirSnort is a wireless LAN (WLAN) tool which recovers encryption keys.
AirSnort operates by passively monitoring transmissions, computing the
encryption key when enough packets have been gathered.
802.11b, using the Wired Equivalent Protocol (WEP), is crippled with numerous
security flaws. Most damning of these is the weakness described in " Weaknesses
in the Key Scheduling Algorithm of RC4 " by Scott Fluhrer, Itsik Mantin and Adi
Shamir. Adam Stubblefield was the first to implement this attack, but he has
not made his software public. AirSnort, along with WEPCrack, which was released
about the same time as AirSnort, are the first publicly available
implementaions of this attack.
AirSnort requires approximately 5-10 million encrypted packets to be gathered.
Once enough packets have been gathered, AirSnort can guess the encryption
password in under a second.
--
Configure bugmail: https://bugzilla.redhat.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug, or are watching someone who is.
More information about the fedora-extras-list
mailing list