Nov 11, 2019 To assist administrators in creating correct WEP keys, some brands of wireless network equipment automatically generate WEP keys from regular text (sometimes called a passphrase). Additionally, some public web sites offer automatic WEP key generators that generate random key values that are difficult for outsiders to guess. Nov 20, 2010 On a side note, that password box is really annoying on these Verizon routers. Resetting the Password for Your Verizon Router. Each of the Verizon routers will have a Reset button on the back side somewhere, usually with a red circle around it.
xv920 join:2002-08-27 San Jose, CA | 2004-Jun-19 7:57 pm generate WEP key from passphraseI'm looking for a wep key generator that can generate a wep key from a passphrase - the same one - everytime as long as the passphrase remains the same. I tried Ben Braly's generator but it changes the key everytime despite of using the same passphrase. I just bought a laptop computer with an embedded G device for which you must enter the wep key yourself, instead of entering a passphrase and let it generate one for you. I have been successfully using a wireless network with one access point and two clients for last two years now and all devices are configured with a passphrase thus the key is automatically generated. The thing is you can not see the generated key digits anywhere. They are all masked by *. Now I have to enter these digits directly. I know the passphrase. All I need is a key generator. Thanks. | |
inmuck Idiot In The East Premium Member join:2003-01-29 Raleigh, NC | 2004-Jun-20 12:16 pm said by xv920:I'm looking for a wep key generator that can generate a wep key from a passphrase - the same one - everytime as long as the passphrase remains the same.Did you tried this one »www.warewolflabs.com/por ··· skg.html | |
2004-Jun-21 1:44 am We re-aligned our behavior with the mainstream OpenSSH in this area.' Keys added to the keychain via ssh-add -K are not automatically re-added to the ssh-agent after a reboot. Mac generate ssh key for git file. Solutions Solution 1 (recommended)Apple updated its to indicate that since 10.12.2, macOS includes version 7.3p1 of OpenSSH and its new behaviors.In /.ssh create config file with the following content: Host. (asterisk for all hosts or add specific host)AddKeysToAgent yesUseKeychain yesIdentityFile (e.g. As Apple Developer stated:'That’s expected. I saw it while I was searching, and tried. If you give the passphrase in the Custom WEP Key section, it only gives you back a hexadecimal representation of whatever you have just typed. For example, if you type 'abced', then it gives you '6162636465'. This is not how it works. Are you kidding? I need something that takes any-length character string as an input passphrase and then generates 13 bytes of information that you can use as a 128(104)-bit WEP key. | ||
Shootist Premium Member join:2003-02-10 Decatur, GA | 2004-Jun-21 6:14 am 2 simple facts 1. Don't use a passphrase, just make up a key, write it down, and type it in by hand. 2. There is NO embedded wireless G device, in any notebook from any manufacturer of any model. All internal wireless cards are in the MiniPCI slot and can be removed/replaced. | |
jpg366 join:2004-04-09 Humble, TX | 2004-Jun-21 9:55 pm Why don't you write a small program that will xor your passphrase with a key (you pick it and embed it in your program) and clip the highest 13 bytes from the result, and display it as hex? You're after encoding, not randomness. The commercial programs do something similar but add a pseudrandom part, probably based on the system clock value. | |
1 edit | 2004-Jun-22 12:27 pm I don't want to change anything in existing, working equipment. There are two wireless clients and a wireless router up and running happily for two years and I don't want to ruin that. A few days ago I bought a laptop computer with a built-in wireless interface and I just wanted to use it in my existing wireless network. For that, why would you need to do anything in any existing equipment? You would configure the new laptop the same way everybody else is working, wouldn't you? I just wanted to see this new laptop can access Internet. Two wireless venders are mixed in this network and all 3 equipments let the user enter a passphrase and then generate the WEP key from it. There should be a 'standard' way to do that. I mean, to generate a WEP key from a passphrase. I would like to write such a program myself. Can you help me? | |
Foxbat121 join:2001-04-25 Herndon, VA | 2004-Jun-22 2:44 pm Some company (I believe it is InterSil) holds the license or patent for passphrase generation. Almost all the new wireless products stop offering passphrase generation capability now to avoid paying license fee. | |
Shootist Premium Member join:2003-02-10 Decatur, GA | 2004-Jun-22 3:10 pm You're right there should be a standard but there isn't. | |
efflandt 1 editjoin:2002-01-25 Elgin, IL | 2004-Jun-22 7:02 pm Some methods generate different keys from password/passphrase than others. For example a Linux utility generates same hex key as my Linksys WAP11 v2.2 for 64(40) bit keys, but for 128(104) bit keys they differ. I think that is because Linksys generates a hex key sequence that can alternately be used for 64 or 128 bit WEP. So if you have different hardware, it is best to use actual hex keys instead of password/passphrase/ascii string. But even when I generated hex key from passphrase for Linksys WET11, it only generated the first key. I had to fill in the blanks for the other 3 alternate keys. Also sometimes the numbering of the keys varies. In Linux wlan-ng labels them 0-3 and Linksys labels them 1-4, so to use the second key would be key 1 for Linux and key 2 for Linksys. | |
Rally1 join:2000-06-12 Long Beach, CA | 2004-Sep-17 5:48 pm »www.clariondeveloper.com/wepgen/ | |
sirozha join:2001-11-18 Kennesaw, GA | 2004-Sep-17 7:08 pm The key factor in the generation of strategies is. The WEP key you are talking about is a static key. Your access point or your other laptop doesn't generate the same new Hex key every time you connect. It is the same exact key that you initially entered. You could have entered it directly in Hex characters or as a passphrase. So, just access your router or your other laptop and copy the Hex key to your new laptop. I don't understand why you need a program that generates the same Hex key every time. If there's such a program, than it would be even easier to break your WEP key (not that it is very difficult now. It takes only about 20 min to break it). But if you use this kind of program to generate the WEP key, than one could use a dictionary attack method to guess it. | |
Shady Bimmer Premium Member join:2001-12-03 | 2004-Sep-23 8:36 am said by xv920:If you give the passphrase in the Custom WEP Key section,Actually, that is exactly 'how it works'. If you want randomness then use the random generation buttons. If you want repeatable output based on repeatable input, then you are getting exactly what you are asking for. I know it may not be easy to understand, but there is no difference in security given any function f that accepts input x and returns y (y=f(x)). If the function instead doubled the ascii value, modded 255, then displayed the hex representation you likely would never know the difference, yet it achieves the exact same thing as just returning the character itself. quote: I need something that takes any-length character stringYou got that at the link above. But, to re-iterate what someone else said - why do you want something reproducable? If this is that important the link above is indeed what you want. To be honest, though, using reproducable keys is not the best practice. Why not use a random generator to give you the correct size key then apply that key to all your devices at the same time? Then you don't need to remember the key or how it was derived. In fact it is good practice to change keys on a regular basis anyway. | |
2004-Sep-23 8:46 am said by xv920:There are two wireless clients and a wireless quote: For that, why would you need to do anything in anyIf you've had multiple devices all using the same 128-bit key for two years (never changed) then you might as well not use encryption at all (in all honesty). If someone were interested in your network they'd have broken in long ago. The simplest method (by all means) is use a random generator to create the key you want and apply it to all the devices together. Oh - did you actually *try* to use the hex output from the link above in your device that only accepts hex? Enter the known passphrase then copy the hex. If you have multiple vendors that each accepts a passphrase and they all work together then it is very possible they are doing nothing more than this page. At worst it simply won't work and will have cost you 2 minutes time. | ||
RomanySaad Premium Member join:2001-07-31 Egypt | 2004-Sep-23 10:07 am
| |
claudeo join:2000-02-23 Redmond, WA | 2004-Sep-23 7:43 pm If you are mixing brands it is most likely that the hex key that is generated from the same passphrase will be different. I have never found two to match (but then I stopped looking pretty fast after realizing it was a waste of time). Just make up a hex key and use that. For WEP 128bit, you need 13 hex values, each of which is a pair of characters from the set 0123456789ABCDEF, or exactly 26 characters. You can even make it sort of mnemonic, but don't use something like 11223344. The hex values, or some of them, might correspond to letters or numbers, or not; it does not matter. Even better, make a list of several such keys and rotate them regularly. | |
zodiackiller @dsl.lsan03.pacbell.n | 2004-Oct-2 5:32 am Thanks. I've been searching for something like this. | |
stemeyda join:2004-01-18 Oviedo, FL | 2004-Nov-2 4:18 pm This tool ROCKS!!!! This tool will take an ascii passphrase of ANY length and generate a good 10 digit hex for 40 / 64 bit and will generate a 26 digit hex for 104 / 128 bit codes. This tool may not work on every router as the algorithm is not a standard but I have tried it now on 3 different routers and it hasn't failed me yet. If you are a traveler it is an absolute necessity to have this tool! |