[PATCH] security breech when wpa_supplicant connects to an AP in TSN mode
Assaf Harel
AssafH
Mon Aug 13 06:10:34 PDT 2007
> Hi Jouni,
> This patch resolves 2 issues with wpa_supplicant trying to connect an
> AP in Transient Security Network (TSN) mode like Cisco Aironet 1200
> (which is a part of wifi testbed).
> The patch allows the supplicant to connect to the AP only when the
> supplicant is configured to WEP mode. It doesn't allow the supplicant
> to connect in any of the WPA modes (the current state is the other way
> around, which is a security breech for the supplicant, since the AP
> allows both WPA and WEP access, so less privileged users might gain
> access to WPA privileged data.
> The patch was built and tested against 0.4.9, but I can do it on the
> latest 0.4.10 / 0.5.8 if you insist.
> Regards,
> Ran & Assaf
>
> <<events.patch>>
>
-- Disclaimer: --
This e-mail is intended solely for the person to whom it is addressed and may contain confidential or legally privileged information. Access to this e-mail by anyone else is unauthorized. If an addressing or transmission error has misdirected this e-mail, please notify the author by replying to this e-mail and destroy this e-mail and any attachments.
E-mail may be susceptible to data corruption, interception, unauthorized amendment, viruses and delays or the consequences thereof. If you are not the intended recipient, be advised that you have received this email in error and that any use, dissemination, forwarding, printing or copying of this email is strictly prohibited.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.shmoo.com/pipermail/hostap/attachments/20070813/a1dc9236/attachment.htm
-------------- next part --------------
A non-text attachment was scrubbed...
Name: events.patch
Type: application/octet-stream
Size: 1800 bytes
Desc: events.patch
Url : http://lists.shmoo.com/pipermail/hostap/attachments/20070813/a1dc9236/attachment.obj
More information about the Hostap
mailing list