[17362] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Bluetooth cracked further

daemon@ATHENA.MIT.EDU (Olle Mulmo)
Sat Jun 4 16:57:42 2005

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
X-PDC-Rcpt-To: unknown
X-PDC-Mail-From: mulmo@pdc.kth.se
In-Reply-To: <42A19AAA.8000804@88.net>
Cc: Matt Crawford <crawdad@fnal.gov>, Olle Mulmo <mulmo@pdc.kth.se>,
	"Perry E. Metzger" <perry@piermont.com>, cryptography@metzdowd.com
From: Olle Mulmo <mulmo@pdc.kth.se>
Date: Sat, 4 Jun 2005 22:45:23 +0200
To: Thomas Lakofski <thomas@88.net>


On Jun 4, 2005, at 14:12, Thomas Lakofski wrote:

> Finally, the PIN length ranges from 8 to 128 bits. Most manufacturers 
> use a 4 digit PIN and supply it with the device. Obviously, customers 
> should demand the ability to use longer PINs.

Correction: Most manufacturers hardcode the 4-digit PIN to 0000. It has 
been known for some time that those "gadgets" need to be paired in an 
Faradayic environment: if I recall correctly, a paper being presented 
on this at the RSA conference ~2001 or so.

The forced re-pairing vulnerability is news to me. It makes me very 
concerned about Bluetooth keyboards...

/O


---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post