From owner-freebsd-wireless@freebsd.org Mon Oct 16 11:56:19 2017 Return-Path: Delivered-To: freebsd-wireless@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 75355E37F8D; Mon, 16 Oct 2017 11:56:19 +0000 (UTC) (envelope-from lev@FreeBSD.org) Received: from onlyone.not-for.work (onlyone.not-for.work [IPv6:2a01:4f8:201:6350::2]) by mx1.freebsd.org (Postfix) with ESMTP id 3AEBB7D30C; Mon, 16 Oct 2017 11:56:19 +0000 (UTC) (envelope-from lev@FreeBSD.org) Received: from [192.168.17.133] (unknown [89.113.128.32]) (Authenticated sender: lev@serebryakov.spb.ru) by onlyone.not-for.work (Postfix) with ESMTPSA id 80018A6B; Mon, 16 Oct 2017 14:56:17 +0300 (MSK) To: freebsd-security , freebsd-wireless Reply-To: lev@FreeBSD.org From: Lev Serebryakov Subject: =?UTF-8?Q?WPA2_vulnerabilities_=e2=80=94_is_FreeBSD-as-AP_affected?= =?UTF-8?Q?=3f?= Organization: FreeBSD Message-ID: <3bcef903-4d27-b49f-81aa-9e055e22efa5@FreeBSD.org> Date: Mon, 16 Oct 2017 14:56:08 +0300 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.4.0 MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="wDVabAT7U1AH8f66Tatx4BlhKi3ws0KsS" X-BeenThere: freebsd-wireless@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: "Discussions of 802.11 stack, tools device driver development." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 16 Oct 2017 11:56:19 -0000 This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --wDVabAT7U1AH8f66Tatx4BlhKi3ws0KsS Content-Type: multipart/mixed; boundary="WJAspIE6aNJWHLWocJRKofqW4MqGJm3Gh"; protected-headers="v1" From: Lev Serebryakov Reply-To: lev@FreeBSD.org To: freebsd-security , freebsd-wireless Message-ID: <3bcef903-4d27-b49f-81aa-9e055e22efa5@FreeBSD.org> Subject: =?UTF-8?Q?WPA2_vulnerabilities_=e2=80=94_is_FreeBSD-as-AP_affected?= =?UTF-8?Q?=3f?= --WJAspIE6aNJWHLWocJRKofqW4MqGJm3Gh Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: quoted-printable There are whole lot of new vulnerabilities in WPA2 [implementations?]: CVE-2017-13077, CVE-2017-13078, CVE-2017-13079, CVE-2017-13080, CVE-2017-13081, CVE-2017-13082, CVE-2017-13084, CVE-2017-13086, CVE-2017-13087, CVE-2017-13088. Does anybody know, is FreeBSD (our WiFi stack + hostapd / wpa_supplicant) affected? --=20 // Lev Serebryakov --WJAspIE6aNJWHLWocJRKofqW4MqGJm3Gh-- --wDVabAT7U1AH8f66Tatx4BlhKi3ws0KsS Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- iQJ8BAEBCgBmBQJZ5J5fXxSAAAAAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXRGOTZEMUNBMEI1RjQzMThCNjc0QjMzMEFF QUIwM0M1OEJGREM0NzhGAAoJEOqwPFi/3EePlwMP/1Ko+dNF9CHmgJhtZ48EjbPk WO9S9cuI4+T2fB9DgmVvWovmYhwoi+msp4dudUU09PrzC/PdrrdTGtwBZ+wF4vbO TuaO+B5HLCjKt2QIvsZSxifaQ+yox8zu6dOuUAzdy0rw/DydbqtY7CLLiDQhkpWr YSMkIYv9BY/MrjIsLKKpxMCw0jsC2qbA9E9R9mHCdLN+IxtQXWGQ786OYfqDJE9B CQVY1CY7gZ3aUPFOhM7ZB2uKFSkeR83oxDLT00ha8sdrAR1joPzEl4+tAWyHYIz6 KnpRuODOLekfIIkVOEIxby3DdR/WIiVjE4HQtt4dVI3i2h2y3O7eo/NaMCYODW2J WQUS3KQLCoOX/vxvm0yEWdBT5ZwmeJ5CmuWyZc//10p0wyv5JjONYwmxGbiclcgy sbW42BxkNqcEiy7pg3zpx0IThZNjtly93TEQT5Dht0lG2RDju0PaIEAGz2f3N1MH wF6N2j5lAUy4l0Alw4v+uy2ZX22mXTnXfX7OzwPXtQzdMXpx9A+UTOVWy3sObtNf KpTBFOwb8/mh6mPryAYwve5zVQ5IGCXARvRQCFsnvZOuREXDzW2F/qU7JmPzhsoZ efu6SlK6T5cyR7ovBrAHeDjkJRW5bfMpn71vGvzbh+xoYD+hOVwReCMmWcmqf/j6 bJzwBrR21WeSc6b4wPck =u62x -----END PGP SIGNATURE----- --wDVabAT7U1AH8f66Tatx4BlhKi3ws0KsS--