[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: [OT] Breaking WPA2 by forcing nonce reuse



Ron Leach wrote:
> On 19/10/2017 16:56, Dan Purgert wrote:
>> Brian wrote:
>>> [...]
>>> Isn't it sufficient to fix one end of the
>>> connection to dispose of the vulnerability?
>>>
>>
>> KRACK is an attack against the *client* side.  It MUST (rfc2119) be that
>> device that is patched against the attack.
>>
>
> Dan, I'm not sure it's that simple, either.
> [...]
>
> Your advice is extremely close, and very pertinent, but *both* clients 
> need to be fixed.  

I read his comment as "one side" being the AP side in the AP/Client
relationship ... not that you'd only need to patch "one client".

To be as clear as possible -- Any and all client devices MUST (rfc2119)
be patched to be secure from the KRACK attack.

-- 
|_|O|_| Registered Linux user #585947
|_|_|O| Github: https://github.com/dpurgert
|O|O|O| PGP: 05CA 9A50 3F2E 1335 4DC5  4AEE 8E11 DDF3 1279 A281


Reply to: