Rest in pieces, WEP: Retire your WEP based WLAN equipment today

I've always had this uneasy feeling about WEP secured wireless networks, so when I moved to my current apartment a year ago I purchased WPA enabled devices. Unfortunately this means I cannot use and will not buy a number of nice devices (such as digital cameras with WLAN) secured only by WEP. A lot of equipment still does not do WPA, or perfoms sluggish when using WPA. All those devices should no longer be used. Changing my home network to WPA was sort of painful, but it paid off. 

Because it finally happened: WEP is dead. A paper recently published by Andreas Bittau, Mark Henley (both researching at the University College of London) and Joshua Lackey (Microsoft) describes a new, devastating attack. (Download their research paper here: ) The new attack relies on packet fragmentation and use of the known 8-byte LLC/SNAP headers to speed up decryption.

Basically it is so efficient it renders WEP useless. Totally useless.

The method described in the paper breaks WEP in seconds. That said, mechanisms like EAP, changing WEP keys every few minutes, are useless as well. To proof their point, the paper refers to a tool called "wesside". The paper claims it can break many WEP networks in seconds. (For the curious: The tool is written for FreeBSD, and relies on low level functions of the Atheros WLAN card. Source is provided here: Rest assured that someone has ported this to other platforms and alternate hardware by now.

To illustrate the gravity of the situation: according to the paper, typically around 76% of WLANs in the London Area are secured by WEP, in the Seattle Area an estimated number of 85% is given. Only 20% (London)/14%(Seattle) of WLANs use WPA, practically no one uses 802.11i

The consequence: Switch from WEP to WPA or 802.11i. Retire all your WEP-only equipment today. Methods relying on frequent change of WEP keys will no longer save you.