On Mon, 20 Aug 2001, Andrew Sharp wrote:
> Colin Walters wrote: > > > > Michael Flaig <[EMAIL PROTECTED]> writes: > > > > > Well ... no encryption is bad :-( Everyone with a laptop in front of > > > my door could sniff my network, or isn´t it so easy ? > > > > As I understand it, WEP is bad becuase the key size is far too small. > > This means an attacker would only have to make a slight amount of > > effort to break the encryption through brute force. > > Which is better than no encryption, hello. Also, the key size is > not fixed but only depends on how you set it up. A key size of 40 > bits prevents casual sniffing of your "conversations" while not > adding significant cost to the parts. A key size of 128 bits > prevents any timely cracking of your network traffic, and access > points with that capability are ~$250. SMC makes a decent one. Sorry, but you are wrong. 128-bit WEP encryption can be broken in a few minutes using everyday desktop CPUs and any 802.11b radio. Anyone relying on WEP to secure their traffic is fooling themselves. -jwb