From the general description (I haven't been able to inspect a detailed demo), it looks like a cousin to the Diffie Hellman flaw described last year.
If so,
- All encrypted traffic including SSL/TLS, SSH, VPNs, etc should be
protected despite the researchers' suggestion that <might> also be
vulnerable. And, all User activity that involves exchanging passwords
on websites, Financial/Banking, email and other activity are covered
here.
- The other stuff about capturing, replaying and injecting content or
even false network settings is a different consideration, but if this
is not much different than what has always been possible using
aircrack-ng against WEP or WPA1, then there are practical
considerations which can make this kind of attack difficult although
possible... like...
The attacker might have to capture gigabytes of data to obtain the few
packets which contain a WPA handshake. Low activity APs might be more
vulnerable than heavily used.
Once captured, the attacker has to crack the keys. Depending on
strength and available machine resources plus method of crack (are
rainbow tables available and used?), this might take awhile
Once cracked, the keys are usable for only as long as the original
User has not yet closed his wireless session. Once the User has
disconnected, then a new session and handshake has to be cracked.
So,
Unless you're supporting a high security wireless network, I don't
think that anyone should be pressing any emergency buttons, and if you
were supporting a high security network then I'd be questioning why
you even have Wifi or not deploying WiFi that automatically rotates
new keys every few minutes.
Tony
On Mon, Oct 16, 2017 at 9:18 AM, James Knott
On 10/16/2017 09:43 AM, Richard Brown wrote:
But WPA2 comes in a couple variants. Does anyone know if any of them
are unaffected?
Thanks Greg I don't know, but I do know that SUSE are working on providing us fast updates for SLE (which Leap will get equally fast) and Tumbleweed
Would SUSE being up to date affect this? Or is it an attack on the access point?
-- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse+owner@opensuse.org
-- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse+owner@opensuse.org