[aklug] KRACK attack on WiFi at the protocol level (*all* clients affected)
Christopher Howard
christopher at alaskasi.com
Mon Oct 16 07:37:35 AKDT 2017
Does the server/router side stuff needs to be patched as well? I saw a
hostapd security patch in master branch of the librecmc git repo this
morning, so I patched my router. But am wondering about all the dd-
wrt/open-wrt routers out there that perhaps never get security
updates...
On Mon, 2017-10-16 at 06:23 -0800, Royce Williams wrote:
> Flaw with the protocol itself - so *anything* speaking Wi-Fi will
> need
> to be patched, including the long tail of legacy, EOL, and cheap IoT
> gear that will likely never be patched. Assume all Wi-Fi networks are
> observable until then (core mitigations is to use a VPN). Long term,
> recommend adding to RFPs for any gear (not just wireless) to ensure
> updates for X period of time.
>
> Main announcement:
> https://www.krackattacks.com/
>
> Paper with background:
> https://papers.mathyvanhoef.com/ccs2017.pdf
>
> I will assemble what I know here:
> http://www.techsolvency.com/story-so-far/krackattack/
>
> Other good meta-threads and summaries, keep an eye on these:
> https://github.com/kristate/krackinfo
> https://www.reddit.com/r/sysadmin/comments/76lj5q/this_is_a_core_
> protocollevel_flaw_in_wpa2_wifi/
>
>
> Per-vendor stuff:
>
> Aruba:
> http://community.arubanetworks.com/t5/Wireless-Access/Core-level-
> protocol-flaw-in-WPA2/td-p/310038
> http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007_FAQ_
> Rev-1.pdfhttp://www.arubanetworks.com/support-services/security-
> bulletins/
>
> wpa_supplicant:
> https://w1.fi/cgit/hostap/commit/
>
>
> News:
>
> https://arstechnica.com/information-technology/2017/10/severe-flaw-in
> -wpa2-protocol-leaves-wi-fi-traffic-open-to-eavesdropping/
> https://www.alexhudson.com/2017/10/15/wpa2-broken-krack-now/
>
>
> CVEs:
>
> CWE-323
> CVE-2017-13077
> CVE-2017-13078
> CVE-2017-13079
> CVE-2017-13080
> CVE-2017-13081
> CVE-2017-13082
> CVE-2017-13083
> CVE-2017-13084
> CVE-2017-13085
> CVE-2017-13086
> CVE-2017-13087
>
> Royce
> _______________________________________________
> aklug mailing list
> aklug at aklug.org
> https://lists.aklug.org/mailman/listinfo/aklug
--
Christopher Howard
Enterprise Solutions Manager
Alaska Satellite Internet
3239 La Ree Way
Fairbanks, Alaska 99709
1-888-396-5623
https://alaskasatelliteinternet.com
personal web site: https://qlfiles.net
https://emailselfdefense.fsf.org/en/
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 488 bytes
Desc: This is a digitally signed message part
URL: <http://lists.aklug.org/pipermail/aklug/attachments/20171016/1bc7a3f9/attachment.asc>
More information about the aklug
mailing list