Hacker News new | past | comments | ask | show | jobs | submit login

Semi-related: has anyone read this paper which claims to have a WPA2 rekeying vulnerability and evaluated it? They published in a journal I don't have access to, and don't have a preprint online, so it's probably not very important, but I'm still curious.

Achilleas Tsitroulis, Dimitris Lampoudis, Emmanuel Tsekleves. Exposing WPA2 security protocol vulnerabilities. International Journal of Information and Computer Security, 2014; 6 (1): 93 DOI: 10.1504/IJICS.2014.059797

(Fucking journals are extortion; the system must be destroyed.)




All of the tor exit nodes on campuses with good journal subscriptions have disappeared or they have been marked as open proxies by the journal cabal. I used to be able to get any journal pub via an exit node at BostonU or GaTech.

dx.doi.org needs to disappear too. Two of the three ipv6 endpoints are always down and unbound never seems to shuffle the addresses in such a way I get the working address first:

  dfc@ronin:~$ wget http://dx.doi.org/10.1504/IJICS.2014.059797
  --2014-04-21 00:32:13--  http://dx.doi.org/10.1504/IJICS.2014.059797
  Resolving dx.doi.org (dx.doi.org)... 2001:550:100:6::203, 2001:550:100:6::202, 2a00:1a48:7805:112:2c13:65be:ff08:2e89, ...
  Connecting to dx.doi.org (dx.doi.org)|2001:550:100:6::203|:80... failed: Connection timed out.
  Connecting to dx.doi.org (dx.doi.org)|2001:550:100:6::202|:80... failed: Connection timed out.
  Connecting to dx.doi.org (dx.doi.org)|2a00:1a48:7805:112:2c13:65be:ff08:2e89|:80... connected.


I remember that paper. The researchers ran a de-auth attack and then attempted to brute force the key.

It isn't worth reading.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: