TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Call for WPA3

4 pointsby TrickyRickover 7 years ago

1 comment

viraptorover 7 years ago
&gt; That&#x27;s pretty simple: don&#x27;t accept DEAUTH packets from strangers.<p>Doesn&#x27;t that basically enable stuck sessions? Unless you&#x27;ve got a perfect, proven session recovery system that can work with any amount and selection of dropped &#x2F; error frames, you&#x27;ll need a way to say &quot;I don&#x27;t know what&#x27;s going on, let&#x27;s start again&quot;. With TCP you simply drop the connection and start again. With Wifi, what&#x27;s the solution?<p>&gt; This can be achieved using key derivation functions like PBKDF2 or Scrypt.<p>Yeah... no. That simply moves the cracking from the &quot;crack the passphrase&quot; to &quot;crack the resulting hash&quot; scenario. We&#x27;re already at that stage and that&#x27;s what&#x27;s currently broken in attacks on the downgrade to RC4. It doesn&#x27;t matter what the original passphrase was.<p>&gt; The problem exists because WPA2 has a fatal cryptographic flaw which allows the derivation of the master key which is shared across all connected peers.<p>Only in WPA2 personal. At this point I give up. This is not a proposal... It&#x27;s more of a rant about the current state of things.