From owner-freebsd-current@freebsd.org Tue Oct 24 01:09:14 2017 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 57642E305C9; Tue, 24 Oct 2017 01:09:14 +0000 (UTC) (envelope-from cy.schubert@komquats.com) Received: from smtp-out-no.shaw.ca (smtp-out-no.shaw.ca [64.59.134.9]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "Client", Issuer "CA" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 093F3672B4; Tue, 24 Oct 2017 01:09:13 +0000 (UTC) (envelope-from cy.schubert@komquats.com) Received: from spqr.komquats.com ([96.50.22.10]) by shaw.ca with SMTP id 6niJel0M0I8mC6niLefG0E; Mon, 23 Oct 2017 19:09:06 -0600 X-Authority-Analysis: v=2.2 cv=HahkdmM8 c=1 sm=1 tr=0 a=jvE2nwUzI0ECrNeyr98KWA==:117 a=jvE2nwUzI0ECrNeyr98KWA==:17 a=kj9zAlcOel0A:10 a=02M-m0pO-4AA:10 a=YxBL1-UpAAAA:8 a=6I5d2MoRAAAA:8 a=BWvPGDcYAAAA:8 a=JAf30KXuAAAA:8 a=Rno1LH3gOPMaIAn70U4A:9 a=Se0Cl2mKAYU0ROgx:21 a=iKaslC__s1Pj0A4a:21 a=CjuIK1q_8ugA:10 a=UJ0tAi3fqDAA:10 a=Ia-lj3WSrqcvXOmTRaiG:22 a=IjZwj45LgO3ly-622nXo:22 a=pxhY87DP9d2VeQe4joPk:22 a=GEL62FyrTCmHtEug2d3R:22 Received: from slippy.cwsent.com (slippy [10.1.1.91]) by spqr.komquats.com (Postfix) with ESMTPS id 3014921D; Mon, 23 Oct 2017 18:09:03 -0700 (PDT) Received: from slippy (localhost [127.0.0.1]) by slippy.cwsent.com (8.15.2/8.15.2) with ESMTP id v9O192uc056659; Mon, 23 Oct 2017 18:09:02 -0700 (PDT) (envelope-from Cy.Schubert@cschubert.com) Message-Id: <201710240109.v9O192uc056659@slippy.cwsent.com> X-Mailer: exmh version 2.8.0 04/21/2012 with nmh-1.6 Reply-to: Cy Schubert From: Cy Schubert X-os: FreeBSD X-Sender: cy@cwsent.com X-URL: http://www.cschubert.com/ To: Adrian Chadd cc: Cy Schubert , "current@freebsd.org" , Allan Jude , "freebsd-current@freebsd.org" Subject: Re: cve-2017-13077 - WPA2 security vulni In-Reply-To: Message from Adrian Chadd of "Mon, 23 Oct 2017 14:33:57 -0700." Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Date: Mon, 23 Oct 2017 18:09:02 -0700 X-CMAE-Envelope: MS4wfDgfFm3z9vVRDi8l/SYGP87QgIXnXXyNSMoaIdLayj6536Vu8mfUHDaU0yppwoE8+XJQxJlv1UcF3Ak363bo5ygjOTQybLNINI4GTKXaa7SDdVDkG/JN hb0PLTsHQmF3Z9Srla098zgoVaRJFFgb6Iwz4cp0b0W8Reg5tzk47v6eghT0NAHSqL+FLdhHRuVlq6NEB7hIxZXSEy1kK2sVprUhzbTM2Oa580/8wvE8ZOrL AmFxpfcTiEv+LFip3RDjo2CjML8pxBNg16SeDLX8pZ97zDWl0ddMIRrMq2Kt+rZ/ X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 24 Oct 2017 01:09:14 -0000 Adrian, ??? Are you replying to me? -- Cheers, Cy Schubert FreeBSD UNIX: Web: http://www.FreeBSD.org The need of the many outweighs the greed of the few. In message , Adrian Chadd writes: > [snip] > > yes you need to rebuild; the ioctl layout changed between -11 and -12 > to account for the beginnings of 11ac. > > > > -adrian > > > On 17 October 2017 at 11:30, Cy Schubert wrote: > > I had no problems last night. It associated with one of my netgear APs. I u > sed /etc/wpa_supplicant.conf. > > > > I am running head and all my ports are built on head (most poudeiere and a > few by hand). > > > > --- > > Sent using a tiny phone keyboard. Apologies for any typos and autocorrect. > > > > Cy Schubert > > or > > > > -----Original Message----- > > From: David Wolfskill > > Sent: 17/10/2017 09:57 > > To: Allan Jude > > Cc: freebsd-current@freebsd.org > > Subject: Re: cve-2017-13077 - WPA2 security vulni > > > > On Tue, Oct 17, 2017 at 12:51:23PM -0400, Allan Jude wrote: > >> .... > >> > Question: Should one expect a wpa_supplicant-2.6_2 executable built > >> > under FreeBSD stable/11 (amd64) to work on the same hardware, but > >> > running head? > >> > >> Did you run the version from ports, or did you run the base /etc/rc.d > >> script with your rc.conf set to point to the ports binary? This will run > >> the command with -c /etc/wpa_supplicant.conf overriding the ports default. > >> > >> So this is expected to work in this way. > > > > Ah. When I installed the port, I was reminded: > > > > | ... > > | ===> Registering installation for wpa_supplicant-2.6_2 > > | Installing wpa_supplicant-2.6_2... > > | To use the ports version of WPA Supplicant instead of the base, add: > > | > > | wpa_supplicant_program="/usr/local/sbin/wpa_supplicant" > > | > > | to /etc/rc.conf > > | > > | ===> SECURITY REPORT: > > | .... > > > > So I did that. I did not do anything to the existing > > /etc/rc.d/wpa_supplicant, which had been installed as part of base > > FreeBSD. > > > >> .... > > > > Peace, > > david > > -- > > David H. Wolfskill david@catwhisker.org > > Unsubstantiated claims of "Fake News" are evidence that the claimant lies a > gain. > > > > See http://www.catwhisker.org/~david/publickey.gpg for my public key. > > _______________________________________________ > > freebsd-current@freebsd.org mailing list > > https://lists.freebsd.org/mailman/listinfo/freebsd-current > > To unsubscribe, send any mail to "freebsd-current-unsubscribe@freebsd.org"