On Mon, Dec 15, 2008 at 5:04 PM, Dan Williams <dcbw@xxxxxxxxxx> wrote: > On Mon, 2008-12-15 at 16:47 +0100, Stefanik Gábor wrote: >> This patch regressed support for aireplay-ng's "fragmentation attack" feature! >> >> Prior to the landing of this patch (as commit >> caeb36d73b23b52a0ea2a8368502ef8230fa67b3), applying the patch @ >> http://patches.aircrack-ng.org/mac80211_2.6.28-rc4-wl_frag+ack_v2.patch >> allowed aireplay-ng's fragmentation attack to work with almost all >> mac80211 drivers, including ath5k. After the landing of this patch, >> the attack fails with "No answer, repeating...". (Regression found >> using git bisect, and verified by local backout of commit >> caeb36d73b23b52a0ea2a8368502ef8230fa67b3.) > > Unless I misunderstand... but not all drivers will report their MAC > address until they have opened the device (ie, add_interface time), > because not all devices load firmware until the interface is opened, and > thus some cannot read their MAC address until that time. > > So aireplay-ng is broken if it relies on the device having a valid mac > address before the device is opened. > > Dan > That is not the problem - aireplay-ng operates on a monitor interface that is already up. Likely this patch somehow misses monitor interfaces. -- Vista: [V]iruses, [I]ntruders, [S]pyware, [T]rojans and [A]dware. :-) -- To unsubscribe from this list: send the line "unsubscribe linux-wireless" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html