SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : The *NEW* Frank Coluccio Technology Forum

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
To: Frank A. Coluccio who wrote (3671)8/14/2001 2:11:22 AM
From: Hands Off  Read Replies (1) of 46821
 
WEP security flaw update.

Several papers were published last week detailing how to attack 802.11b security. I email'd ISIL tech support for a response and this is their reply:

Suggested Solution
---------------------------------------------------------------
At 08/13/2001 09:03 AM we wrote - We are preparing a firmware patch which will filter out the weak keys (initialization vectors) identifed in this paper. That is the short term solution. We are still investigating longer term solutions. The issue with longer term solutions is that they all appear to have interoperability implications and as such we are trying not to do things completely on our own and are working with other vendors. The firmware patch will address the weakness identified and a new firmware build should be available in 30-60 days.
**********************************************
Also, extracting from the article:
Representatives from the Wireless Ethernet Compatibility Alliance (WECA), a promotional body for WLAN advocates, align with Bellovin's point of view. "We perceive this as serious and different from the previous attacks, and we're not going to say 'Don't worry about it,' " said Phil Belanger, past chairman and current marketing director of WECA. "However, we've always said that if privacy is a concern, you need to be using end-to-end security mechanisms, like virtual private networks [VPNs, based on IPsec], along with the WLAN. Even if WEP wasn't compromised, you ought to be doing that."

"The good thing is that Wi-Fi integrates very well with these and other technologies; VPN, Radius [a network authentication scheme] or whatever the enterprise wants to use," said WECA chairman David Cohen.
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext