Can this issue even be fixed on the AP side? You could change the AP‘s 
behaviour to never ever resend Message 3, but that seems very drastic.

As far as I understood the article by Vanhoef and Piessens, the vulnerability 
lies within the behavior of the client (that conforms to the 802.11i 
amendment), as it still accepts retransmissions of Message 3 even if it is 
already in the PTK-DONE state.

—
Nicolas Schmidt

> Am 17.10.2017 um 19:15 schrieb Matthew Graybosch <[email protected]>:
> 
> On Tue, 17 Oct 2017 19:09:29 +0200
> "Stephane HUC \"PengouinBSD\"" <[email protected]> wrote:
> 
>> Just for the fun:
>> http://www.commitstrip.com/en/2017/10/16/wpa2-vulnerability-just-a-small-update/
> 
> I saw somebody share that on Mastodon this morning. :)
> 
> On a more serious note; am I correct in assuming that the patch is
> already in 6.2?
> 
> -- 
> Matthew Graybosch
> https://matthewgraybosch.com
> 
> "If you didn't want me to say 'both', you should have used XOR."

Reply via email to