Hi all! I finally had some time to do some more KRACK research and it appears there is a complete AP-side workaround for KRACK vulnerability linked below:
https://w1.fi/cgit/hostap/commit/?id=6f234c1e2ee1ede29f2412b7012b3345ed8e52d3
This workaround was theorized by the original bug finders here:
https://www.krackattacks.com/#ap-mitigations
Is it possible to use this hostap option with our firmwares (either the 380.x or 382.x)? Admittedly there are possible negative effects from turning on this option but the benefits might outweigh the negatives. Can this be run in a script or would it need to be built-in to the firmware?
Thanks all for your contributions!!!
https://w1.fi/cgit/hostap/commit/?id=6f234c1e2ee1ede29f2412b7012b3345ed8e52d3
This workaround was theorized by the original bug finders here:
https://www.krackattacks.com/#ap-mitigations
Is it possible to use this hostap option with our firmwares (either the 380.x or 382.x)? Admittedly there are possible negative effects from turning on this option but the benefits might outweigh the negatives. Can this be run in a script or would it need to be built-in to the firmware?
Thanks all for your contributions!!!