KRACKs fix needed, please!

[quote=“jfdhuiz, post:17, topic:34194, full:true”]PS: Recommend to not broadcast list of known APs via WiFi Privacy Police by UHasselt.
[/quote]
Thanks, I wasn’t aware of that one, sounds like an excellent idea! Also available on F-Droid here. We should crowdsource code reviews somehow :slight_smile:

3 Likes

The FAQ seems updated:

[quote]Is it sufficient to patch only the access point? Or to patch only clients?

Currently, all vulnerable devices should be patched. In other words, patching the AP will not prevent attacks against vulnerable clients. Similarly, patching all clients will not prevent attacks against vulnerable access points. Note that only access points that support the Fast BSS Transition handshake (802.11r) can be vulnerable.

That said, we are working on access points modifications that do prevent attacks against vulnerable clients. These modifications are different from the security patches for vulnerable access points! So unless your access point vendor explicitly mentions that their patches prevent attacks against clients, you must also patch clients.[/quote]

http://cve.circl.lu/cve/CVE-2017-13082

So you need to check if your router supports 802.11r.

PS: In case anyone missed it, Fairphone released 17.10.2 which fixes KRACK issues on the FP2.

4 Likes

The update for the Fairphone Open 17.10.2 is also released. https://forum.fairphone.com/t/fairphone-open-17-10-2-release-fixes-for-the-krack-vulnerabilities/34495/7

The link to Fairphone OS 17.10.2 is https://forum.fairphone.com/t/fairphone-os-17-10-2-fixes-for-the-krack-vulnerabilities/34455/14

7 Likes

This topic was automatically closed 2 days after the last reply. New replies are no longer allowed.