On 05/01/16 10:58, Johannes Berg wrote:
On Tue, 2016-01-05 at 10:47 +0100, Matthias May wrote:
We've encountered exactly this problem in a mix of devices where one
applies key material faster than the other. (ath9k and aquilla)
As a workaround we check on the STA if we are authorized when
updating/checking CCMP. (see attached patches)
Those don't really seem safe to use either.
johannes
Not safe as in "access to stuff which has to be locked", or not safe as
in "a CCMP replay attack is possible"?
When changing this we argumented that since we are not really connected
yet, a CCMP replay attack doesn't really make sense.
Matthias
--
To unsubscribe from this list: send the line "unsubscribe linux-wireless" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html