Re: [OCLUG-Tech] WPA2 vulnerability

2017-10-20 Thread Alex Pilon
On Wed, Oct 18, 2017 at 02:28:01PM -0400, J C Nash wrote: > You are right that the audience needs to be identified. > > My view is that a lightning talk could present an overview of the exploit and > the measures that have been taken to address it. Then we'll have to presume only knowledge of Wi-F

Re: [OCLUG-Tech] WPA2 vulnerability

2017-10-18 Thread J C Nash
You are right that the audience needs to be identified. My view is that a lightning talk could present an overview of the exploit and the measures that have been taken to address it. Possibly particular places that might remain vulnerable (here I'm thinking of my 10 year old Linksys WRT54GL -- l

Re: [OCLUG-Tech] WPA2 vulnerability

2017-10-18 Thread Alex Pilon
On Wed, Oct 18, 2017 at 04:30:43PM +, John Nash wrote: > Via ACM, I came across That's an odd place to get such notices. Unfortunately, due to embargoes, you're unlikely to get advance notice of all issues to your liking. You can try and parse the flood of CVEs every day, or subscribe to your

Re: [OCLUG-Tech] WPA2 vulnerability

2017-10-18 Thread Richard Guy Briggs
On 2017-10-18 16:30, John Nash wrote: > Via ACM, I came across > > https://arstechnica.com/information-technology/2017/10/severe-flaw-in-wpa2-protocol-leaves-wi-fi-traffic-open-to-eavesdropping/ > > I'm wondering if anyone would give a lightning talk about this for the > November meeting. > > A

[OCLUG-Tech] WPA2 vulnerability

2017-10-18 Thread John Nash
Via ACM, I came across https://arstechnica.com/information-technology/2017/10/severe-flaw-in-wpa2-protocol-leaves-wi-fi-traffic-open-to-eavesdropping/ I'm wondering if anyone would give a lightning talk about this for the November meeting. Also if anyone has done any patching because of this ye