"WPA Wi-fi Cracked (but it's not as bad as you think... yet)"
Jouni Malinen
j
Fri Nov 7 18:48:48 PST 2008
On Sat, Nov 08, 2008 at 01:17:25AM +0200, Jouni Malinen wrote:
> I'm also looking into a small change in wpa_supplicant that would make
> the chopchop part take considerably more time as a potential mitigation
> for this particular attack.
An experimental version of this workaround is now available in the Git
tree. It is disabled by default and can be enabled with
CONFIG_DELAYED_MIC_ERROR_REPORT=y in .config. In addition, if this
particular attack depends on the attacker receiving Michael MIC error
reports from the Supplicant, the attack may not be very feasible with an
AP that has an Authenticator that behaves like hostapd (i.e., that
forces rekeying of the PTK on the first Michael MIC error report).
Still, even if there are efficient countermeasures for this particular
attack, there will be more attacks coming in the future and TKIP cannot
really be recommended for any use anymore and anyone using it should
really move to CCMP as soon as possible.
--
Jouni Malinen PGP id EFC895FA
More information about the Hostap
mailing list