[PATCH v8 1/2] wpa_supplicant: hostapd: Remove man-in-the-middle.

Arowa Suliman arowa at chromium.org
Wed Oct 20 16:44:24 PDT 2021


Replace man-in-the-middle attacks with on-path attacks which
is gender-neutral and commonly used.

Signed-off-by: Arowa Suliman <arowa at chromium.org>
---
 hostapd/hostapd.conf               | 2 +-
 wpa_supplicant/wpa_supplicant.conf | 2 +-
 2 files changed, 2 insertions(+), 2 deletions(-)

diff --git a/hostapd/hostapd.conf b/hostapd/hostapd.conf
index dbdd3d7fb..6b807f489 100644
--- a/hostapd/hostapd.conf
+++ b/hostapd/hostapd.conf
@@ -1837,7 +1837,7 @@ own_ip_addr=127.0.0.1
 #assoc_sa_query_retry_timeout=201
 
 # ocv: Operating Channel Validation
-# This is a countermeasure against multi-channel man-in-the-middle attacks.
+# This is a countermeasure against multi-channel on-path attacks.
 # Enabling this depends on the driver's support for OCV when the driver SME is
 # used. If hostapd SME is used, this will be enabled just based on this
 # configuration.
diff --git a/wpa_supplicant/wpa_supplicant.conf b/wpa_supplicant/wpa_supplicant.conf
index e3ae77114..fa257f3de 100644
--- a/wpa_supplicant/wpa_supplicant.conf
+++ b/wpa_supplicant/wpa_supplicant.conf
@@ -988,7 +988,7 @@ fast_reauth=1
 # WPA3-Personal-only mode: ieee80211w=2 and key_mgmt=SAE
 #
 # ocv: whether operating channel validation is enabled
-# This is a countermeasure against multi-channel man-in-the-middle attacks.
+# This is a countermeasure against multi-channel on-path attacks.
 # Enabling this automatically also enables ieee80211w, if not yet enabled.
 # 0 = disabled (default)
 # 1 = enabled if wpa_supplicant's SME in use. Otherwise enabled only when the
-- 
2.33.0.1079.g6e70778dc9-goog




More information about the Hostap mailing list