What's new

AP-Side Workaround for Key Reinstallation Attacks (KRACK)

  • SNBForums Code of Conduct

    SNBForums is a community for everyone, no matter what their level of experience.

    Please be tolerant and patient of others, especially newcomers. We are all here to share and learn!

    The rules are simple: Be patient, be nice, be helpful or be gone!

VinnieT

New Around Here
Hi all! I finally had some time to do some more KRACK research and it appears there is a complete AP-side workaround for KRACK vulnerability linked below:

https://w1.fi/cgit/hostap/commit/?id=6f234c1e2ee1ede29f2412b7012b3345ed8e52d3

This workaround was theorized by the original bug finders here:

https://www.krackattacks.com/#ap-mitigations

Is it possible to use this hostap option with our firmwares (either the 380.x or 382.x)? Admittedly there are possible negative effects from turning on this option but the benefits might outweigh the negatives. Can this be run in a script or would it need to be built-in to the firmware?

Thanks all for your contributions!!!
 
Is it possible to use this hostap option with our firmwares (either the 380.x or 382.x)?

No, Broadcom does not use hostpad.
 
Thanks for the quick response Eric! Does Broadcom have an equivalent that I could research to control the same functionality?

Their nas daemon is closed source, so it cannot be modified.
 
Well darn, that frees up my Sunday ;-)

Just checking but NAS Daemon as in Network Attached Storage? Hostapd (Host access point daemon) is a user space software access point capable of turning normal network interface cards into access points and authentication servers. I didn't think it handles storage. I'll dig around and see if I can find a Broadcom equivalent.
 

Latest threads

Sign Up For SNBForums Daily Digest

Get an update of what's new every day delivered to your mailbox. Sign up here!
Top