[aklug] Re: wpa_supplicant

From: barsalou <barjunk@attglobal.net>
Date: Thu Feb 28 2008 - 08:41:06 AKST

<snip>

> So that wouldn't tell you what you are trying to figure out, you would =20
> want to use kismet, airsniff, airsnort etc, etc. Then I asked the =20
> question and got this response:
>
> "WPA2 is a product certification that is available through the Wi-Fi =20
> Alliance. WPA2
> certifies that wireless equipment is compatible with the IEEE 802.11i =20
> standard. The WPA2
> product certification formally replaces Wired Equivalent Privacy (WEP) =20
> and the other
> security features of the original IEEE 802.11 standard. The goal of =20
> WPA2 certification is
> to support the additional mandatory security features of the IEEE =20
> 802.11i standard that
> are not already included for products that support WPA.
>
> The only way sniffing tools can tell that you're running 802.11i (WPA2) it b=
> y
> looking in the beacons (or probe responses) for Information Elements =20
> (IEs) that advertise TKIP (WPA) or CCMP (WPA2).
>
> So if the sniffing tools say you're running WPA2 (or 802.11i, or CCMP =20
> (AES), then its likely that you are, but...

So based on this I could try to:

- sniff the wire and look for the above mentioned info.
- turn off any possibility of TKIP running in the config file.

Thanks for the help Jon.

Mike B.

----------------------------------------------------------------
This message was sent using IMP, the Internet Messaging Program.

---------
To unsubscribe, send email to <aklug-request@aklug.org>
with 'unsubscribe' in the message body.
Received on Thu Feb 28 08:41:44 2008

This archive was generated by hypermail 2.1.8 : Thu Feb 28 2008 - 08:41:44 AKST