From owner-freebsd-wireless@freebsd.org Mon Oct 16 12:03:58 2017 Return-Path: Delivered-To: freebsd-wireless@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 838F2E38B8E; Mon, 16 Oct 2017 12:03:58 +0000 (UTC) (envelope-from SRS0=qApe=BP=quip.cz=000.fbsd@elsa.codelab.cz) Received: from elsa.codelab.cz (elsa.codelab.cz [94.124.105.4]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 41FB67DB52; Mon, 16 Oct 2017 12:03:57 +0000 (UTC) (envelope-from SRS0=qApe=BP=quip.cz=000.fbsd@elsa.codelab.cz) Received: from elsa.codelab.cz (localhost [127.0.0.1]) by elsa.codelab.cz (Postfix) with ESMTP id 2A1C728416; Mon, 16 Oct 2017 14:03:49 +0200 (CEST) Received: from illbsd.quip.test (ip-86-49-16-209.net.upcbroadband.cz [86.49.16.209]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by elsa.codelab.cz (Postfix) with ESMTPSA id 4F56128411; Mon, 16 Oct 2017 14:03:48 +0200 (CEST) Subject: =?UTF-8?Q?Re:_WPA2_vulnerabilities_=e2=80=94_is_FreeBSD-as-AP_affec?= =?UTF-8?Q?ted=3f?= To: lev@FreeBSD.org, freebsd-security , freebsd-wireless References: <3bcef903-4d27-b49f-81aa-9e055e22efa5@FreeBSD.org> From: Miroslav Lachman <000.fbsd@quip.cz> Message-ID: <59E4A024.6070708@quip.cz> Date: Mon, 16 Oct 2017 14:03:48 +0200 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:42.0) Gecko/20100101 Firefox/42.0 SeaMonkey/2.39 MIME-Version: 1.0 In-Reply-To: <3bcef903-4d27-b49f-81aa-9e055e22efa5@FreeBSD.org> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-BeenThere: freebsd-wireless@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: "Discussions of 802.11 stack, tools device driver development." List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 16 Oct 2017 12:03:58 -0000 Lev Serebryakov wrote on 10/16/2017 13:56: > > There are whole lot of new vulnerabilities in WPA2 [implementations?]: > CVE-2017-13077, CVE-2017-13078, CVE-2017-13079, CVE-2017-13080, > CVE-2017-13081, CVE-2017-13082, CVE-2017-13084, CVE-2017-13086, > CVE-2017-13087, CVE-2017-13088. > > Does anybody know, is FreeBSD (our WiFi stack + hostapd / > wpa_supplicant) affected? Yes. it is discussed at current@ with patch https://lists.freebsd.org/pipermail/freebsd-current/2017-October/067193.html Miroslav Lachman