Sake Blok wrote:

> May I have your votes please? ;-)
> 
> 1) Don't include the code at all

There are enough weak key identifiers out there without burdening
Wireshark with a CPU intensive test for a one off problem. The next time
someone finds a weakness it is bound to be a different problem needing
different discovery.

I don't want to have anyone in our networks using a version of Wireshark
with the ability to crack keys. It will panic the security people and
they will ban Wireshark totally. Wireshark it too useful to let that happen.

-- 
There's no point in being grown up if you can't be childish sometimes.
                -- Dr. Who
_______________________________________________
Wireshark-dev mailing list
Wireshark-dev@wireshark.org
https://wireshark.org/mailman/listinfo/wireshark-dev

Reply via email to