[kismac] WPA-TKIP, Kismac, and my network

  • From: Glen MacPherson <tuffimak@xxxxxxxxx>
  • To: kismac@xxxxxxxxxxxxx
  • Date: Sat, 22 Jan 2005 13:10:52 -0800

Hi Again.

I fired up my network yesterday, using a Linksys WRT54G, configured to use WPA with TKIP encryption (using pre-shared key), using a long-ass random passphrase, deciding to leave my broadcast (non-hidden) SSID at 100 ms, but I'm going to play with that setting. MACs are filtered. My iBook airport software describes my network as WPA-Personal, and it very slickly joined the network. Using a different machine I aimed Kismac at it, noticing that WPA Managed was correctly identified, seeing my iBook as a client, and that my Linksys cycled through a certain range of channels.

1. Apart from a colossal brute-force, and assuming that Kismac is the sharpest knife in most toolkits, is my network secure enough to begin transmitting confidential research data?

2. Does Kismac (perhaps internally) differentiate between WPA-TKIP and WPA-AES?



Other related posts: