Have a read of http://bit.ly/2iej5kE
Causing a stir today in networking and security circles. The authors propose a new way of random number generation to help combat some of
the identified issues.
Are you sure??
That reads very much like their last years work.
I assume you mean this paper:
https://papers.mathyvanhoef.com/ccs2017.pdf
from the same people.
"Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2"
KRACK for short ;)
I assume you mean this paper:
https://papers.mathyvanhoef.com/ccs2017.pdf
from the same people.
"Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2"
KRACK for short ;)
Caused me some headaches yesterday at work ...
I assume you mean this paper:Yes. That's the one.
https://papers.mathyvanhoef.com/ccs2017.pdf
from the same people.
"Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2"
KRACK for short ;)
Caused me some headaches yesterday at work ...It will continute to do so for a while ...
Vendor feedback was generally along the lines:
"We are not affected as we do not offer client functionality. Detailed review of the information will be done in the next time."
Vendor feedback was generally along the lines:Gee that sounds like 'all care and no responsibility'
"We are not affected as we do not offer client functionality.
Detailed review of the information will be done in the next
time."
Sysop: | digital man |
---|---|
Location: | Riverside County, California |
Users: | 1,043 |
Nodes: | 16 (0 / 16) |
Uptime: | 109:41:54 |
Calls: | 500,961 |
Calls today: | 1 |
Files: | 109,378 |
D/L today: |
318 files (63,891K bytes) |
Messages: | 304,914 |