Hi folks, 

 

In a Cisco environment there is a workaround for the client vulnerability :

 

Workaround for CVE-2017-13077, CVE-2017-13078, CVE-2017-13079, CVE-2017-13080 
and CVE-2017-13081

Please read : 
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpa#workarounds
 

 

And read https://twitter.com/vanhoefm/status/923651649595478018 

 

Workaround is very simple (!) :

 

Global Config, (CLI only option)

 

config advanced eap eapol-key-retries 0

 

 

 

(5520) >show advanced eap

EAP-Identity-Request Timeout (seconds)……….. 30

EAP-Identity-Request Max Retries…………….. 2

EAP Key-Index for Dynamic WEP……………….. 0

EAP Max-Login Ignore Identity Response……….. enable

EAP-Request Timeout (seconds)……………….. 30

EAP-Request Max Retries…………………….. 2

EAPOL-Key Timeout (milliseconds)…………….. 1000

EAPOL-Key Max Retries………………………. 0

EAP-Broadcast Key Interval………………….. 3600

 

 

Regards,

 

Gertjan Scharloo

ICT Consultant

_____

 

Universiteit van Amsterdam | Hogeschool van Amsterdam

 

ICT Services

Leeuwenburg | kamer A9.44

Weesperzijde 190 | 1097 DZ Amsterdam

+31 (0)20 525 4885

Mobiel : +31(0) 61013-5880

www.uva.nl

uva.nl/profile/g.scharloo

twitter : wireless_kid

Beschikbaar : Ma | - | Wo | Do | Vr |

 

 

From: wireless-lan <WIRELESS-LAN@listserv.educause.edu> on behalf of Jake 
Snyder <jsnyde...@gmail.com>
Reply-To: wireless-lan <WIRELESS-LAN@listserv.educause.edu>
Date: Thursday, 19 October 2017 at 15:24
To: wireless-lan <WIRELESS-LAN@listserv.educause.edu>
Subject: Re: [WIRELESS-LAN] Big flaw in WPA2

 

You have more faith in the WFA than I.  I’m sure our next houses will be Wi-Fi 
certified Krack-Free.

Sent from my iPhone


On Oct 19, 2017, at 5:13 AM, Osborne, Bruce W (Network Operations) 
<bosbo...@liberty.edu> wrote:

The specification, like many, was vague in implementation details and 
practically all vendors chose a poor, insecure design.  The only claw in WPA2 
was vagueness in the specification. I understand the Wi-Fi Alliance is working 
on remedying that as well as specifically testing for KRACK in its 
certification testing.

 

Since many implementations were likely based off the chipmakers reference 
designs, this is not very surprising.

 

 

Bruce Osborne

Senior Network Engineer

Network Operations - Wireless

 (434) 592-4229

LIBERTY UNIVERSITY

Training Champions for Christ since 1971

 

From: Marcelo Maraboli [mailto:marcelo.marab...@uc.cl] 
Sent: Wednesday, October 18, 2017 11:56 AM
Subject: Re: Big flaw in WPA2

 

if it were a Design Flaw, no patch can fix it.... we would need to upgrade to 
WPA3 or something.

the fact that there is patch going on, is that either every implementation is 
wrong (not likely) or
the specification (how to code the Design) did not address boundaries or 
restrictions that should/must
be cared for.

or am I wrong ?


regards,

On 10/16/17 4:32 PM, Hector J Rios wrote:

The short answer is Yes. 

 

Hector Rios

Louisiana State University

 

From: The EDUCAUSE Wireless Issues Constituent Group Listserv 
[mailto:WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU] On Behalf Of Mike Cunningham
Sent: Monday, October 16, 2017 1:58 PM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: Re: [WIRELESS-LAN] Big flaw in WPA2

 

If this is a flaw in the design of the WPA2 protocol isn’t the fix going to 
need to be made on both sides of the communication link?  Access points will 
all need to be updated but also all client wifi drivers are going to need to be 
updated on all wifi enabled devices that support WPA2, right?

 

Mike Cunningham

 

 

From: The EDUCAUSE Wireless Issues Constituent Group Listserv 
[mailto:WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU] On Behalf Of Stephen Belcher
Sent: Monday, October 16, 2017 10:40 AM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: Re: [WIRELESS-LAN] Big flaw in WPA2

 

>From Cisco:

 

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpa

 

 

/ Stephen Belcher

Assistant Director of Network Operations 
WVU Information Technology Services

One Waterfront Place / PO Box 6500

Morgantown, WV  26506

 

(304) 293-8440 office 
(681) 214-3389 mobile 
steve.belc...@mail.wvu.edu

From: The EDUCAUSE Wireless Issues Constituent Group Listserv 
<WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU> on behalf of Richard Nedwich 
<rich.nedw...@brocade.com>
Sent: Monday, October 16, 2017 10:34:43 AM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: Re: [WIRELESS-LAN] Big flaw in WPA2 

 

Ruckus is providing a response today.

**********
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/discuss.

********** Participation and subscription information for this EDUCAUSE 
Constituent Group discussion list can be found at 
http://www.educause.edu/discuss. 

 

This email may contain confidential information about a Pennsylvania College of 
Technology student. It is intended solely for the use of the recipient. This 
email may contain information that is considered an “educational record” 
subject to the protections of the Family Educational Rights and Privacy Act 
Regulations. The regulations may be found at 34 C.F.R. Part 99 for your 
reference. The recipient may only use or disclose the information in accordance 
with the requirements of the Federal Educational Rights and Privacy Act 
Regulations. If you have received this transmission in error, please notify the 
sender immediately and permanently delete the email. 

********** Participation and subscription information for this EDUCAUSE 
Constituent Group discussion list can be found at 
http://www.educause.edu/discuss. 

********** Participation and subscription information for this EDUCAUSE 
Constituent Group discussion list can be found at 
http://www.educause.edu/discuss. 

 

-- 
Marcelo Maraboli Rosselott
Subdirector de Redes y Seguridad
Dirección de Informática
Pontificia Universidad Católica de Chile
http://informatica.uc.cl/
--
Campus San Joaquín, Av. Vicuña Mackenna 4860, Macul
Santiago, Chile
Teléfono: (56) 22354 1341

********** Participation and subscription information for this EDUCAUSE 
Constituent Group discussion list can be found at 
http://www.educause.edu/discuss. 

********** Participation and subscription information for this EDUCAUSE 
Constituent Group discussion list can be found at 
http://www.educause.edu/discuss. 

********** Participation and subscription information for this EDUCAUSE 
Constituent Group discussion list can be found at 
http://www.educause.edu/discuss. 


**********
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/discuss.

Attachment: smime.p7s
Description: S/MIME cryptographic signature

Reply via email to