From owner-freebsd-hackers@freebsd.org Mon Oct 16 13:55:07 2017 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id B664EE3B395 for ; Mon, 16 Oct 2017 13:55:07 +0000 (UTC) (envelope-from george+freebsd@m5p.com) Received: from mailhost.m5p.com (mailhost.m5p.com [207.172.210.101]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 5C76B81982 for ; Mon, 16 Oct 2017 13:55:06 +0000 (UTC) (envelope-from george+freebsd@m5p.com) Received: from [IPv6:2001:470:1f07:15ff::1f] (haymarket.m5p.com [IPv6:2001:470:1f07:15ff::1f]) (authenticated bits=0) by mailhost.m5p.com (8.15.2/8.15.2) with ESMTPSA id v9GDpe8f038980 (version=TLSv1.2 cipher=DHE-RSA-AES128-SHA bits=128 verify=NO) for ; Mon, 16 Oct 2017 09:51:46 -0400 (EDT) (envelope-from george+freebsd@m5p.com) To: freebsd-hackers@FreeBSD.org From: George Mitchell Subject: WPA2 attack? Message-ID: <9cc89278-17dc-d6a0-5cab-1a02fd6a5036@m5p.com> Date: Mon, 16 Oct 2017 09:51:40 -0400 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:52.0) Gecko/20100101 Thunderbird/52.4.0 MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="rOUkOlD4jR0980DXC8ajeMF2ruQ8iJieN" X-Spam-Status: No, score=0.2 required=10.0 tests=HELO_MISC_IP, RP_MATCHES_RCVD, TVD_SPACE_RATIO autolearn=no autolearn_force=no version=3.4.1 X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on mattapan.m5p.com X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.6.2 (mailhost.m5p.com [IPv6:2001:470:1f07:15ff::f7]); Mon, 16 Oct 2017 09:51:49 -0400 (EDT) X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 16 Oct 2017 13:55:07 -0000 This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --rOUkOlD4jR0980DXC8ajeMF2ruQ8iJieN Content-Type: multipart/mixed; boundary="HW03Iudfi0xE7QSPNxWVNpwlmS6NUnKDQ"; protected-headers="v1" From: George Mitchell To: freebsd-hackers@FreeBSD.org Message-ID: <9cc89278-17dc-d6a0-5cab-1a02fd6a5036@m5p.com> Subject: WPA2 attack? --HW03Iudfi0xE7QSPNxWVNpwlmS6NUnKDQ Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: quoted-printable Is our community working on mitigating this problem? https://arstechnica.com/information-technology/2017/10/severe-flaw-in-wpa= 2-protocol-leaves-wi-fi-traffic-open-to-eavesdropping/ -- George --HW03Iudfi0xE7QSPNxWVNpwlmS6NUnKDQ-- --rOUkOlD4jR0980DXC8ajeMF2ruQ8iJieN Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEENdM4ZHktsJW5kKZXwRES3m+p4fkFAlnkuWwACgkQwRES3m+p 4flKdw//bul5+/IX9O5eN4sO7dH/3APG8BI0e6EUIVTIdc/YeSqxFqV4Osgg5GdM 9yCKSWbgC5Ml/wHudu/clVcuqFLn3eToyQomwL7CkFHCzTEeOhncRbrQYAeIhzRn seW9Qz0NQnRJLS7QLd3vVT6V36rt/b7Ouh0WAFXLVLsYLuw89KazFAlWLf3ZO72Q CVxC81HpMv/OfRjEMoWapHE/A/hUJ0JdrdH22oBtup2yyqRTfxWfoTtDf4hDCGsq LpNEsBpbh1zVezfYeoWg9CNJht2SMdrHX9QTq2blyddLE63ncVGWNw+fDeeWJwQH wAKwVKa9SWzb1X4otc+Hgg0hIanxPiKCJ365GUBJp7pYMfpjMLClor76DV1JrYwG N5JhEfR7KFHMVHfZ+oLEb6T3mYr3Xz49jN4cwFtVDlfZamzr4KDmVdbx9g5cD8js rwgSgflKSKr8kMVoBuAFBSbq84PHm0AWXAdHouXLabHImzv+w/uYqauFcHerM0DK H1nP3gcuvDlJ/05bYuNlJxrtCotXW6d8N9UPsOH/QPKmhNrCumN4YB/YmuxwQwkH gcstlRpsKmyyjMJsMULi+JkdRezjd7Mu94qD5IqdilHBr0OQ0CkSlnFax2te1DDw SCf6CxNfKE06s82HLcbPOz4c0m5Yq5MluvaG0iGscqOsbYe8TNI= =UadB -----END PGP SIGNATURE----- --rOUkOlD4jR0980DXC8ajeMF2ruQ8iJieN--