From owner-freebsd-hackers@freebsd.org Mon Oct 16 14:00:13 2017 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id CDA73E3B6E3 for ; Mon, 16 Oct 2017 14:00:13 +0000 (UTC) (envelope-from mozolevsky@gmail.com) Received: from mail-wm0-x22e.google.com (mail-wm0-x22e.google.com [IPv6:2a00:1450:400c:c09::22e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 62D7881D36 for ; Mon, 16 Oct 2017 14:00:13 +0000 (UTC) (envelope-from mozolevsky@gmail.com) Received: by mail-wm0-x22e.google.com with SMTP id q132so3652798wmd.2 for ; Mon, 16 Oct 2017 07:00:13 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:sender:in-reply-to:references:from:date:message-id :subject:to:cc; bh=9bWt62l7vwDulr3bAB3LoyCLT9ZmRBpYHdqTzyjDkRc=; b=tUl04N9pWiOaDv6TlxwI+KuMFt1toYNpU9iRGyIRLOQvPwGgFbg31b8IRWWe2XhS8j usbdBwCk7c9SffjGyvvtppH2kc+sPn5lXoBgLrkikCXK9cPKWvKLPkBJq3uNGCnOfuKp LuCD5AomxzbKPq0+quSPSyA88yxbGi/v5q4JdJs2NosLlsh+OG899bqzyoiaql6vt13+ v/qX6/cGY9mJakGz+yqQgnkadKp+yfJHi0dLWysnujNdY8wbiMhDul/aqPCq+RO4eI5v c+be/u5WXbT1M3k85LX908zW4JXgaVORc+ZnwdMttSbWCq7jgg7WPeh/OLKyEuVXPFHH +jcw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:sender:in-reply-to:references:from :date:message-id:subject:to:cc; bh=9bWt62l7vwDulr3bAB3LoyCLT9ZmRBpYHdqTzyjDkRc=; b=Z8YKmUgyZEiHoyoNZ97a95haXCAfNlpZFadCR1oZIQfZmoYrLifJS8dS77hmRm0SjR mo9xfIE7yB+brk/o32UtFKc+nZu9p5Yzjs77XtEmgFsMcQ1XYoxeokytk0nxaoh7xpbg 9ROZlb5oTfiP5Q8xvGYo7W8UW1ybMukm0P8Pjo51VfgnYHLKgkK5TehFtC2OvFimrYE2 KVzPvSETDmDAiTvPh6a9oln08bHJ8UczdyLhIywIUxbzuq/rWAhLigB0LoQFuiLuwxLH nKD2+GTqCCjZ8890qk579zDDBBXE1z/Mwt0SF4ew+S3j1rUuDCA1X4m0/BOw0WQy1qPg K6Gg== X-Gm-Message-State: AMCzsaXZma4zkeZP0M8lQwo/uAQOuClFIOcv0yA2kcnWYJNGt2QFXKMk 0jqEZ42/KyhUBjjPu5UKL1cGlPcewNNs5OfwAllXQg== X-Google-Smtp-Source: ABhQp+SP6aKVH28beJXxyp1YXsW5uYRT57Kzfkn1Otc/MIawTl5poxATvbIZf8IgO/5ncAb7meunE1QEtZ1Y4vbqcds= X-Received: by 10.223.163.208 with SMTP id m16mr800414wrb.63.1508162411698; Mon, 16 Oct 2017 07:00:11 -0700 (PDT) MIME-Version: 1.0 Sender: mozolevsky@gmail.com Received: by 10.28.135.205 with HTTP; Mon, 16 Oct 2017 06:59:31 -0700 (PDT) In-Reply-To: <9cc89278-17dc-d6a0-5cab-1a02fd6a5036@m5p.com> References: <9cc89278-17dc-d6a0-5cab-1a02fd6a5036@m5p.com> From: Igor Mozolevsky Date: Mon, 16 Oct 2017 14:59:31 +0100 X-Google-Sender-Auth: SQ8eQClLe3DWeLqzIbSkxj3AyMo Message-ID: Subject: Re: WPA2 attack? To: George Mitchell Cc: Hackers freeBSD Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.23 X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 16 Oct 2017 14:00:13 -0000 On 16 October 2017 at 14:51, George Mitchell wrote: > Is our community working on mitigating this problem? > https://arstechnica.com/information-technology/2017/ > 10/severe-flaw-in-wpa2-protocol-leaves-wi-fi-traffic- > open-to-eavesdropping/ It's quite FUD-dy, from their conference paper at https://papers.mathyvanhoef.com/ccs2017.pdf: 3.2 The Key Reinstallation Attack Our key reinstallation attack is now easy to spot: because the supplicant still accepts retransmissions of message 3, even when it is in the PTK-DONE state, we can force a reinstallation of the PTK. More precisely, we first establish a man-in-the-middle (MitM) position between the supplicant and authenticator. We use this MitM position to trigger retransmissions of message 3 by preventing message 4 from arriving at the authenticator. As a result, it will retransmit message 3, which causes the supplicant to reinstall an already-in-use PTK. -- Igor M.