> WPA using PSK (pre-shared key) is vulnerable to brute force attacks
> on the passphrase. This can be done off-line; the attacker can use
> saved packjets. The solution is to use good passphrases, and change
> them regularly. (I doubt it's a problem, unless someone has reason to
> be after your data.)
That's true, I guess you'll never have 2^128 possible keys if they all
started out from "common phrases", which there aren't 2^128 of...
I guess that can be solved by choosing a password with "a lot of
entropy" but that probably isn't common in practice...
Support Team.Net http://www.team.net/donate.html
Shop-talk mailing list