Sponsored Content
Operating Systems BSD FreeBSD Wireless - Can do WPA but not WEP or even open Post 302227004 by kpedersen on Wednesday 20th of August 2008 11:20:00 AM
Old 08-20-2008
Quote:
Originally Posted by jb_bsd
no WPA nor WEP here. If so, I might have the process written down.
WPA isn't the problem, do you have a solution to OPEN?

kk, I guess I'll search more... and probs give the handbook another go

thanks,
 

7 More Discussions You Might Find Interesting

1. Programming

open an port on freebsd

i have made some thing with leds on it. i put it directly on the printer port. in dos and windows i can send data to it with outp(0x378,123); and then have some leds on and some leds off. i found out that it is possible linux with same assembly (after searching much.). but i want to have those led... (0 Replies)
Discussion started by: jurrien
0 Replies

2. Cybersecurity

WEP Crack Appz

Looking for a good app to go with my iBook/Airport Extreme card for testing WEP security on my own network... I have had a lot of luck with MacStumbler, but none with KisMAC... any suggestions? Jeffrey d9rw1n:/ root#grep ghost There's nothing like bludgeoning your self with a new box...... (0 Replies)
Discussion started by: f1r3g0dz
0 Replies

3. Windows & DOS: Issues & Discussions

WPA crash vista???

Okay. I need help since I barely use M$ any more, the last time I used it for something other than school, work, or AIM was back in the days of WIN98. I was just reading the article on this site, Is Microsoft about to release a Windows “kill switch”? | Ed Bott's Microsoft Report | ZDNet.com, and... (0 Replies)
Discussion started by: Texasone
0 Replies

4. Programming

Application crashes in FreeBSD 7.1 while working ok in FreeBSD 6.3

Hello there, My mulithreaded application (which is too large to represent the source code here) is crashing after installing FreeBSD 7.1-RELEASE/amd64. It worked properly on others machines (Dual Cores with 4GB of RAM - FreeBSD 6.2-RELEASE/i386). The current machine has 2x Core 2 Duo... (1 Reply)
Discussion started by: Seenquev
1 Replies

5. Red Hat

cannot set user id: Resource temporarily unavailable (not open file/open process related)

First post, sorry to be a bother but this one has been dogging me. I have a process user (java application server) that trips a resource limit every couple weeks and need help finding what limit we're hitting. First, this is what's running: This is the error when jobs are run or the... (0 Replies)
Discussion started by: Katahdin
0 Replies

6. Shell Programming and Scripting

FreeBSD rc.subr wireless script

Hi, This is my first thread on Unix forums, so be gentle.:o I'm trying to write a simple start/stop script for my wireless networking adapter, under FreeBSD, using the rc.subr framework. #!/bin/sh # PROVIDE Wireless # KEYWORDS shutdown . /etc/rc.subr name="wireless"... (1 Reply)
Discussion started by: regexp
1 Replies

7. Linux

Is possible to bridge wlan0 and eth0 using network manager?How to for wpa?

I have created a bridge with nmcli between eth0 and wlan0 I use this procedure sudo nmcli con add ifname br0 type bridge con-name br0 sudo nmcli con add type bridge-slave ifname eth0 master br0 sudo nmcli con add type bridge-slave ifname wlan0 master br0 sudo nmcli con modify br0... (1 Reply)
Discussion started by: Linusolaradm1
1 Replies
WPA_BACKGROUND(8)														 WPA_BACKGROUND(8)

NAME
wpa_background - Background information on Wi-Fi Protected Access and IEEE 802.11i WPA
The original security mechanism of IEEE 802.11 standard was not designed to be strong and has proven to be insufficient for most networks that require some kind of security. Task group I (Security) of IEEE 802.11 working group (http://www.ieee802.org/11/) has worked to address the flaws of the base standard and has in practice completed its work in May 2004. The IEEE 802.11i amendment to the IEEE 802.11 standard was approved in June 2004 and published in July 2004. Wi-Fi Alliance (http://www.wi-fi.org/) used a draft version of the IEEE 802.11i work (draft 3.0) to define a subset of the security enhancements that can be implemented with existing wlan hardware. This is called Wi-Fi Protected Access<TM> (WPA). This has now become a mandatory component of interoperability testing and certification done by Wi-Fi Alliance. Wi-Fi provides information about WPA at its web site (http://www.wi-fi.org/OpenSection/protected_access.asp). IEEE 802.11 standard defined wired equivalent privacy (WEP) algorithm for protecting wireless networks. WEP uses RC4 with 40-bit keys, 24-bit initialization vector (IV), and CRC32 to protect against packet forgery. All these choices have proven to be insufficient: key space is too small against current attacks, RC4 key scheduling is insufficient (beginning of the pseudorandom stream should be skipped), IV space is too small and IV reuse makes attacks easier, there is no replay protection, and non-keyed authentication does not protect against bit flipping packet data. WPA is an intermediate solution for the security issues. It uses Temporal Key Integrity Protocol (TKIP) to replace WEP. TKIP is a compro- mise on strong security and possibility to use existing hardware. It still uses RC4 for the encryption like WEP, but with per-packet RC4 keys. In addition, it implements replay protection, keyed packet authentication mechanism (Michael MIC). Keys can be managed using two different mechanisms. WPA can either use an external authentication server (e.g., RADIUS) and EAP just like IEEE 802.1X is using or pre-shared keys without need for additional servers. Wi-Fi calls these "WPA-Enterprise" and "WPA-Personal", respec- tively. Both mechanisms will generate a master session key for the Authenticator (AP) and Supplicant (client station). WPA implements a new key handshake (4-Way Handshake and Group Key Handshake) for generating and exchanging data encryption keys between the Authenticator and Supplicant. This handshake is also used to verify that both Authenticator and Supplicant know the master session key. These handshakes are identical regardless of the selected key management mechanism (only the method for generating master session key changes). IEEE 802.11I / WPA2 The design for parts of IEEE 802.11i that were not included in WPA has finished (May 2004) and this amendment to IEEE 802.11 was approved in June 2004. Wi-Fi Alliance is using the final IEEE 802.11i as a new version of WPA called WPA2. This includes, e.g., support for more robust encryption algorithm (CCMP: AES in Counter mode with CBC-MAC) to replace TKIP and optimizations for handoff (reduced number of mes- sages in initial key handshake, pre-authentication, and PMKSA caching). SEE ALSO
wpa_supplicant(8) LEGAL
wpa_supplicant is copyright (c) 2003-2007, Jouni Malinen <j@w1.fi> and contributors. All Rights Reserved. This program is dual-licensed under both the GPL version 2 and BSD license. Either license may be used at your option. 07 November 2012 WPA_BACKGROUND(8)
All times are GMT -4. The time now is 04:53 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy