From owner-freebsd-current@freebsd.org Tue Oct 17 06:17:31 2017 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 001AEE2E5A8 for ; Tue, 17 Oct 2017 06:17:30 +0000 (UTC) (envelope-from franco@lastsummer.de) Received: from host64.shmhost.net (host64.shmhost.net [213.239.241.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id B943E864; Tue, 17 Oct 2017 06:17:30 +0000 (UTC) (envelope-from franco@lastsummer.de) Received: from [IPv6:2001:470:25:233:e0d6:b7ed:5952:4c9d] (unknown [IPv6:2001:470:25:233:e0d6:b7ed:5952:4c9d]) by host64.shmhost.net (Postfix) with ESMTPSA id 0A30D160856; Tue, 17 Oct 2017 08:17:24 +0200 (CEST) Content-Type: text/plain; charset=us-ascii Mime-Version: 1.0 (Mac OS X Mail 10.3 \(3273\)) Subject: Re: cve-2017-13077 - WPA2 security vulni From: Franco Fichtner In-Reply-To: <20171016223231.923A0191@spqr.komquats.com> Date: Tue, 17 Oct 2017 08:17:22 +0200 Cc: "Rodney W. Grimes" , Kevin Oberman , Adrian Chadd , Lev Serebryakov , blubee blubeeme , Poul-Henning Kamp , FreeBSD current Content-Transfer-Encoding: quoted-printable Message-Id: References: <20171016223231.923A0191@spqr.komquats.com> To: Cy Schubert X-Mailer: Apple Mail (2.3273) X-Virus-Scanned: clamav-milter 0.99.2 at host64.shmhost.net X-Virus-Status: Clean X-Spam-Flag: NO X-Spam-Score: -1.0 X-Spam-Status: No score=-1.0 tagged_above=10.0 required=10.0 tests=[ALL_TRUSTED] X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 17 Oct 2017 06:17:31 -0000 > On 17. Oct 2017, at 12:32 AM, Cy Schubert = wrote: >=20 > I'll test it when I get home tonight. The WiFi here at the tech park = is open so, I couldn't test here. Tested: hostapd 2.6_1 wpa_supplicant 2.6_2 No apparent issues with the ports, preliminary connectivity checks work as expected. Started a public CFT over at OPNsense to gather more feedback. Cheers, Franco=