[17362] in cryptography@c2.net mail archive
Re: Bluetooth cracked further
daemon@ATHENA.MIT.EDU (Olle Mulmo)
Sat Jun 4 16:57:42 2005
X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
X-PDC-Rcpt-To: unknown
X-PDC-Mail-From: mulmo@pdc.kth.se
In-Reply-To: <42A19AAA.8000804@88.net>
Cc: Matt Crawford <crawdad@fnal.gov>, Olle Mulmo <mulmo@pdc.kth.se>,
"Perry E. Metzger" <perry@piermont.com>, cryptography@metzdowd.com
From: Olle Mulmo <mulmo@pdc.kth.se>
Date: Sat, 4 Jun 2005 22:45:23 +0200
To: Thomas Lakofski <thomas@88.net>
On Jun 4, 2005, at 14:12, Thomas Lakofski wrote:
> Finally, the PIN length ranges from 8 to 128 bits. Most manufacturers
> use a 4 digit PIN and supply it with the device. Obviously, customers
> should demand the ability to use longer PINs.
Correction: Most manufacturers hardcode the 4-digit PIN to 0000. It has
been known for some time that those "gadgets" need to be paired in an
Faradayic environment: if I recall correctly, a paper being presented
on this at the RSA conference ~2001 or so.
The forced re-pairing vulnerability is news to me. It makes me very
concerned about Bluetooth keyboards...
/O
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com