[Bug 165489] New: Review Request: Wireless LAN (WLAN) tool which recovers encryption keys

bugzilla at redhat.com bugzilla at redhat.com
Tue Aug 9 19:15:04 UTC 2005


Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug report.




https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=165489

           Summary: Review Request: Wireless LAN (WLAN) tool which recovers
                    encryption keys
           Product: Fedora Extras
           Version: devel
          Platform: All
               URL: http://airsnort.shmoo.com/
        OS/Version: Linux
            Status: NEW
          Severity: normal
          Priority: normal
         Component: Package Review
        AssignedTo: gdk at redhat.com
        ReportedBy: andreas.bierfert at lowlatency.de
         QAContact: dkl at redhat.com
                CC: fedora-extras-list at redhat.com


Spec Name or Url: http://fedora.lowlatency.de/review/airsnort.spec
SRPM Name or Url: http://fedora.lowlatency.de/review/airsnort-0.2.7e-3.src.rpm
Description: 
AirSnort is a wireless LAN (WLAN) tool which recovers encryption keys. 
AirSnort operates by passively monitoring transmissions, computing the
encryption key when enough packets have been gathered.

802.11b, using the Wired Equivalent Protocol (WEP), is crippled with numerous
security flaws. Most damning of these is the weakness described in " Weaknesses
in the Key Scheduling Algorithm of RC4 " by Scott Fluhrer, Itsik Mantin and Adi
Shamir. Adam Stubblefield was the first to implement this attack, but he has
not made his software public. AirSnort, along with WEPCrack, which was released
about the same time as AirSnort, are the first publicly available
implementaions of this attack.

AirSnort requires approximately 5-10 million encrypted packets to be gathered.
Once enough packets have been gathered, AirSnort can guess the encryption
password in under a second.

-- 
Configure bugmail: https://bugzilla.redhat.com/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug, or are watching someone who is.




More information about the fedora-extras-list mailing list