Please note: This project is no longer active. The website is kept online for historic purposes only.
If you´re looking for a Linux driver for your Atheros WLAN device, you should continue here .

Ticket #1232 (new task)

Opened 12 years ago

Last modified 12 years ago

Avoiding greater range of weak WEP IVs

Reported by: mrenzmann Assigned to:
Priority: minor Milestone: version 0.9.x - progressive release candidate phase
Component: madwifi: driver Version: trunk
Keywords: Cc:
Patch is attached: 0 Pending:


As reported by user no_maam in #madwifi there are a few classes of known-to-be-weak WEP IVs that MadWifi most probably does not avoid so far. Although WEP generally should be avoided by users, some devices don't allow using enhanced encryption methods. Therefore this issue should be addressed.

This document provides further information, and aircrack-ng is said to use one of the methods described in there ("Korek attack").

Change History

04/23/07 22:54:33 changed by anonymous

After the release of aircrack-ptw I think fixing this is worthless.

04/24/07 01:17:02 changed by mentor

I'm tempted to just remove WEP support entirely.

04/24/07 06:41:26 changed by mrenzmann

Although WEP is known to be weak, it's still necessary to access a number of networks. Hence I'm against removing WEP support. But we could print a big fat warning for the user to make him aware of the WEP weakness. This warning could also point to a wiki page, for example, which provides further information about the various ways to attack WEP.