diff options
author | Damien Miller <djm@cvs.openbsd.org> | 2008-11-13 08:37:20 +0000 |
---|---|---|
committer | Damien Miller <djm@cvs.openbsd.org> | 2008-11-13 08:37:20 +0000 |
commit | f62a97eb1122c01341591b3119d47583c8f4326c (patch) | |
tree | 901dd6d2858b6f75e4764f129590473af42ff429 /share/man/man4/bce.4 | |
parent | c2b74ebe1c99739ea6e77be3bc7228d335800f8c (diff) |
Mitigate the new WPA attack described in Beck, M. and Tews S. "Practical
attacks against WEP and WPA". The attack works by using the MIC failure
notification messages sent station->AP on MIC failure as an oracle to
verify guesses to reverse the CRC.
To stop this, we can skip sending these notify frames except when we
are going into "countermeasures" mode (drop the AP association, do not
process traffic for 60s). When we go into countermeasures, I send two
MIC failure notifications in a row - this should force the AP into
countermeasures too.
ok damien@
Diffstat (limited to 'share/man/man4/bce.4')
0 files changed, 0 insertions, 0 deletions