Is anyone else annoyed that the WPA2 KRACK paper author sat on it for >2mos before any disclosure and 5mos before public disclosure?
-
Show this thread
-
Amusingly, when I implement a protocol like this I pretty much always use an explicit state machine like that. Avoids this kind of problem.
1 reply 0 retweets 5 likes -
Replying to @marcan42
Seems it didn't entirely avoid it though: https://ftp.openbsd.org/pub/OpenBSD/patches/6.0/common/041_net80211_replay.patch.sig …
1 reply 0 retweets 0 likes -
Replying to @tavianator
Hmm, the memcmp part of that patch of old vs new key makes me wonder if you could flip-flop between two keys by replaying packets.
1 reply 0 retweets 0 likes -
Replying to @marcan42
Ha good question. Haven't read the code thoroughly, hopefully there's some reason a "message 3" from a different handshake would be rejected
1 reply 0 retweets 0 likes -
Replying to @tavianator @marcan42
Also here's some additional comments that were added yesterday: https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/sys/net80211/ieee80211_pae_input.c.diff?r1=1.30&r2=1.31 …
1 reply 0 retweets 0 likes
I *think* it's okay because different messages should have different replay counter values, but I haven't analyzed it in detail.
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.