Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 17 Oct 2017 08:17:22 +0200
From:      Franco Fichtner <franco@lastsummer.de>
To:        Cy Schubert <Cy.Schubert@komquats.com>
Cc:        "Rodney W. Grimes" <freebsd-rwg@pdx.rh.CN85.dnsmgr.net>, Kevin Oberman <rkoberman@gmail.com>, Adrian Chadd <adrian.chadd@gmail.com>, Lev Serebryakov <lev@freebsd.org>, blubee blubeeme <gurenchan@gmail.com>, Poul-Henning Kamp <phk@phk.freebsd.dk>, FreeBSD current <freebsd-current@freebsd.org>
Subject:   Re: cve-2017-13077 - WPA2 security vulni
Message-ID:  <FE754A9E-BE47-4843-AB3A-2619665F1657@lastsummer.de>
In-Reply-To: <20171016223231.923A0191@spqr.komquats.com>
References:  <20171016223231.923A0191@spqr.komquats.com>

next in thread | previous in thread | raw e-mail | index | archive | help

> On 17. Oct 2017, at 12:32 AM, Cy Schubert <Cy.Schubert@komquats.com> =
wrote:
>=20
> I'll test it when I get home tonight. The WiFi here at the tech park =
is open so, I couldn't test here.

Tested:

hostapd		2.6_1
wpa_supplicant	2.6_2

No apparent issues with the ports, preliminary connectivity
checks work as expected.  Started a public CFT over at OPNsense
to gather more feedback.


Cheers,
Franco=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?FE754A9E-BE47-4843-AB3A-2619665F1657>