Date: Tue, 17 Oct 2017 08:17:22 +0200 From: Franco Fichtner <franco@lastsummer.de> To: Cy Schubert <Cy.Schubert@komquats.com> Cc: "Rodney W. Grimes" <freebsd-rwg@pdx.rh.CN85.dnsmgr.net>, Kevin Oberman <rkoberman@gmail.com>, Adrian Chadd <adrian.chadd@gmail.com>, Lev Serebryakov <lev@freebsd.org>, blubee blubeeme <gurenchan@gmail.com>, Poul-Henning Kamp <phk@phk.freebsd.dk>, FreeBSD current <freebsd-current@freebsd.org> Subject: Re: cve-2017-13077 - WPA2 security vulni Message-ID: <FE754A9E-BE47-4843-AB3A-2619665F1657@lastsummer.de> In-Reply-To: <20171016223231.923A0191@spqr.komquats.com> References: <20171016223231.923A0191@spqr.komquats.com>
next in thread | previous in thread | raw e-mail | index | archive | help
> On 17. Oct 2017, at 12:32 AM, Cy Schubert <Cy.Schubert@komquats.com> = wrote: >=20 > I'll test it when I get home tonight. The WiFi here at the tech park = is open so, I couldn't test here. Tested: hostapd 2.6_1 wpa_supplicant 2.6_2 No apparent issues with the ports, preliminary connectivity checks work as expected. Started a public CFT over at OPNsense to gather more feedback. Cheers, Franco=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?FE754A9E-BE47-4843-AB3A-2619665F1657>