ANNOUNCEMENT: Live Wireshark University & Allegro Packets online APAC Wireshark Training Session
April 17th, 2024 | 14:30-16:00 SGT (UTC+8) | Online

Wireshark-dev: Re: [Wireshark-dev] performing cpu/time intensive computation in a protocol diss

From: Joerg Mayer <jmayer@xxxxxxxxx>
Date: Wed, 6 Aug 2008 08:19:26 +0200
On Wed, Aug 06, 2008 at 01:47:22AM +0200, Luis EG Ontanon wrote:
> On the other hand someone has to tell the sysadmin to dump that key
> ASAP, bad guys know it's broken already. 65536 attempts to see if
> eventually we could decrypt and add an expert item in regarding the
> vulnerability would be appropriate.

That is my POV as well. We have 802.11 Weak Key detection, and this is
not really something different.
It should go in.

Ciao
      Joerg
-- 
Joerg Mayer                                           <jmayer@xxxxxxxxx>
We are stuck with technology when what we really want is just stuff that
works. Some say that should read Microsoft instead of technology.