TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Call for WPA3

4 点作者 TrickyRick超过 7 年前

1 comment

viraptor超过 7 年前
&gt; That&#x27;s pretty simple: don&#x27;t accept DEAUTH packets from strangers.<p>Doesn&#x27;t that basically enable stuck sessions? Unless you&#x27;ve got a perfect, proven session recovery system that can work with any amount and selection of dropped &#x2F; error frames, you&#x27;ll need a way to say &quot;I don&#x27;t know what&#x27;s going on, let&#x27;s start again&quot;. With TCP you simply drop the connection and start again. With Wifi, what&#x27;s the solution?<p>&gt; This can be achieved using key derivation functions like PBKDF2 or Scrypt.<p>Yeah... no. That simply moves the cracking from the &quot;crack the passphrase&quot; to &quot;crack the resulting hash&quot; scenario. We&#x27;re already at that stage and that&#x27;s what&#x27;s currently broken in attacks on the downgrade to RC4. It doesn&#x27;t matter what the original passphrase was.<p>&gt; The problem exists because WPA2 has a fatal cryptographic flaw which allows the derivation of the master key which is shared across all connected peers.<p>Only in WPA2 personal. At this point I give up. This is not a proposal... It&#x27;s more of a rant about the current state of things.