Berkeley CSUA MOTD:Entry 21289
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2024/11/23 [General] UID:1000 Activity:popular
11/23   

2001/5/16-17 [Computer/Networking, Computer/SW/Security] UID:21289 Activity:moderate
5/15    http://edge.mcs.drexel.edu/GICL/people/sevy/airport/128bit.html
        (How to get 128-bit encryption from your Airport base station)
        \_ too bad you cant get 128bit from the builtin airport interface
           on their laptops. --jon
        \_ Rumor has it that 802.11b (including AirPort) are going
           to 54mbps w/128bit encryption in the coming months.
           Also, above url states AirPort has 64bit encryption,
           which is wrong, it's 40bit, which everyone knows
           you can pretty much break on the fly with your laptop
           and a little reciever.
           \_ 802.11b will never be 54 MBit. 802.11a will be. Its
              scheduled to be released in the fall/winter of this
              year.
              Most people say that you will probably need a new
              Airport card, but that you can probably upgrade
              your base station.
       \_ Uh, wtf is the point?  The Gold and Silver levels of 802.11b
          encryption have both been cracked.  Run IPsec with however many
          bits you want...
          \_ Its not "encryption" is Wireless Equivalent Privacy. The
             protection it provides is the same as what cat5 cable
             provides. No more, no less.
2024/11/23 [General] UID:1000 Activity:popular
11/23   

You may also be interested in these entries...
2012/7/26-9/24 [Computer/Networking] UID:54445 Activity:nil
7/26    Why big mega cable companies rule:
        http://arstechnica.com/tech-policy/2012/07/how-big-cable-killed-the-open-set-top-box-and-what-to-do-about-it
	...
2012/4/26-6/4 [Computer/Networking] UID:54371 Activity:nil
4/26    I see that soda has an ipv6 address but ipv6 traffic from this box
        doesn't actually work (ping6 <DEAD>ipv6.google.com<DEAD>, ping6 http://www.v6.facebook.com
        Is this expected to work?
        \_ Soda doesn't have a real IPv6 address.  The IPv6 addresses you see
           in ifconfig are just link-local addresses; any IPv6-capable machine
           will autogenerate these, whether or not it's connected to an IPv6
	...
2010/11/1-2011/1/13 [Computer/Networking] UID:54002 Activity:nil
11/1    I'm moving from a home in Fremont to another home within the same ZIP
        code in Fremont, and AT&T customer service says I cannot transfer my
        DSL service because DSL is not available at my new home.  Is that BS?
        Are they just trying to push me to subscribe to their more expensive
        U-verse service?  I'm not asking for any lightening-speed connection.
            \_ could be
	...
2009/5/22-29 [Computer/HW/Laptop, Computer/HW/Display] UID:53032 Activity:low
5/22    Are LED monitors much better than LCD monitors?
        \_ OLED is still too new to know.  They're direct emitters, so don't
           have a backlight, and can turn completely off, hence better black.
           The early news was that blue pixels burn out relatively quickly.
           \_ FWIW, Zune HD will use OLED.
        \_ Dunno, but I saw a very nice LED TV for just $2K. Wouldn't that
	...
2009/5/2-6 [Computer/HW/Laptop, Computer/HW/Drives] UID:52933 Activity:kinda low
5/2     I have a 1Gbps switch. It is connected to a SANS RAID-1 with
        two WD Green 1T that takes 1Gbps connection, as well as a laptop
        that is also 1Gbps. Online benchmarks show *sustained* transfer
        rate of about 1/2 of 1Gbps with the WD Green... cool!!! But
        in practice, I'm only getting 68Mbps (read SANS->PC file transfer),
        far below what I expected. The switch says both devices are using
	...
2010/3/9-30 [Computer/HW/CPU, Computer/SW] UID:53748 Activity:nil
3/9     http://www.engadget.com/2010/03/09/1024-bit-rsa-encryption-cracked-by-carefully-starving-cpu-of-ele
        I failed to see why you must starve the CPU of electricity. Why
        can't you just simulate that in software?
        \_ And if you can simulate that in software, why not just single-
           stepping the simulated CPU and get the key out?
	...
2009/12/29-2010/1/19 [Computer/SW/Security] UID:53607 Activity:nil
12/29   Sounds like the GSM encryption key has been recovered via a
        brute force attack:
        http://www.nytimes.com/2009/12/29/technology/29hack.html
	...
2008/8/5-10 [Computer/HW/Laptop] UID:50783 Activity:nil
8/5     Laptop with names of 33K people in the 'Clear' program stolen.  Data
        was (of course) unencrypted.
        http://www.schneier.com/blog/archives/2008/08/laptop_with_tru.html
        \_ http://news.yahoo.com/s/nm/20080805/bs_nm/tjx_theft_charges_dc
           When are people going to learn to encrypt sensitive data?
           \_ When encryption becomes transparent enough that noone has
	...
2008/8/5-10 [Computer/HW/Laptop] UID:50787 Activity:nil
8/5     how is power usage on my laptop if i encrypt everything
        http://www.schneier.com/blog/archives/2008/08/laptop_with_tru.html
        \_ Steve Gibson's analysis on performance was that Trucrypt on a WinXP
           laptop was actually faster, but I don't know about battery.
           laptop was actually faster, but I don't know about battery life.
           \_faster?  How can that be?  Also, I don't see that in the article.
	...
2008/6/25-7/14 [Computer/SW/Security] UID:50380 Activity:nil
6/25    some XCF or CSUA person had a web page about a project they were
        working on where I set up a machine, and you set up a machine
        somewhere, and they both passively back each other, i believe with
        an encryption key so i can't read your backups.  when your disk
        catches on fire, i just give you a copy of your data.  anyone remember
        the name of this?
	...
2008/6/9-12 [Computer/SW/Languages/C_Cplusplus, Computer/SW/Security] UID:50194 Activity:nil
6/8     CSUA code guru please help. I need to see my random number
        generator with a good seed (I just need random 18 bit
        identifiers). The usual time(NULL) is OK, except my program
        might be invoked faster than once a second, and seeding using
        time() produced the same result. I tried clock() but it seems
        to return 0. My program needs to be run in Linux/DOS (Watcom
	...
2008/4/21-5/2 [Computer/SW/Security] UID:49787 Activity:nil
4/21    Yahoo Instant Messenger is not encrypted. Are there chat programs
        that are a bit more secure than YIM?
        \_ what OS are you using?
        \_ What are your goals? Corporate security, or preventing your wife
           from eavesdropping on you? If you're using IM for internal company
           communication, you shouldn't be using anything where you don't
	...
2008/2/21-25 [Computer/HW/Memory, Computer/SW/Security] UID:49208 Activity:nil
2/21    Cold Boot Attacks Against Disk Encryption:
        http://www.schneier.com/blog/archives/2008/02/cold_boot_attac.html
        http://citp.princeton.edu/memory
	...
2007/9/11-13 [Computer/SW/OS/FreeBSD] UID:48016 Activity:nil
9/11    Hi does anyone else run linux/freebsd on their Desktop?
        Do you encrypt your home directory?  How does that play nice
        with hibernation/suspend?  Do you have to enter in a secret
        key when you log in?  Could you give a short summary of how
        this all works?  thank you!
        \_ I'm a FreeBSD user.  I do not encrypt my home directory
	...
2006/10/27-30 [Computer/SW/Security] UID:45013 Activity:low
10/27   Anybody tried the "PDF decryptor" or "PDF password delete" type of
        software?  I have a PDF form file that won't let me save.  I'm
        considering getting one of those type of software to unlock the
        file.  I really don't want to pay to try it out though.  Are there
        free open source PDF unlock programs?  Thanks.
        \_ I've used Elcomsoft's (of "Free Dmitry Sklyarov!" fame) PDF
	...
Cache (1401 bytes)
edge.mcs.drexel.edu/GICL/people/sevy/airport/128bit.html
Why not just include a "switch" in the configurator specifying whether standard (64-bit) or enhanced (128-bit) should be used? Well, since a significant modification to the hardware is needed in order for the enhanced encryption to be useful - and enabling it without performing the modification will likely result in a non-functioning base station - it seemed unwise to make this an easily-selected option. Hey, if it's 128-bit encryption, why is the encryption key 13 bytes long instead of 16 bytes long? It's because the first 3 bytes of the key are supplied with each packet of information, at the beginning of the data. This 3-byte "initialization vector" is combined with the "too short" key you've configured into the base station (and your wireless card) to get a key of the correct length. Since the initialization vector is sent along with each packet, it can be changed frequently - in fact, a different initialization vector can be supplied with each packet. With this approach, a different encryption key is used to encrypt each packet, making it very difficult for a malicious listener to decrypt messages (even given that she knows the 3-byte initialization vector, which is sent unencrypted). Basically, it just changes the length of the encryption key field from 5 bytes to 13 bytes, and the value of the field that specifies the length of the encryption key from 5 to 13 (0D in hex).