Send connman mailing list submissions to
[email protected]
To subscribe or unsubscribe via the World Wide Web, visit
https://lists.01.org/mailman/listinfo/connman
or, via email, send a message with subject or body 'help' to
[email protected]
You can reach the person managing the list at
[email protected]
When replying, please edit your Subject line so it is more specific
than "Re: Contents of connman digest..."
Today's Topics:
1. Statement on KRACK? (Craig McQueen)
2. RE: Statement on KRACK? (Craig McQueen)
3. Re: Statement on KRACK? (Xiaodong Sun)
4. Re: Statement on KRACK? (Julien Massot)
5. Re: Statement on KRACK? (Patrik Flykt)
----------------------------------------------------------------------
Message: 1
Date: Fri, 3 Nov 2017 09:56:45 +1100
From: Craig McQueen <[email protected]>
To: "[email protected]" <[email protected]>
Subject: Statement on KRACK?
Message-ID:
<5500469a22567c4baf673a6e86afa3a40295f094b...@ir-central.corp.innerrange.com>
Content-Type: text/plain; charset="us-ascii"
It would be helpful to have a status about KRACK in relation to Connman.
* Is Connman directly affected by the KRACK Wi-Fi vulnerability?
* Is Connman indirectly affected by the KRACK Wi-Fi vulnerability, e.g. via
wpa_supplicant or Linux kernel?
* What steps, if any, are required to patch a system using Connman, to secure
against KRACK?
--
Craig McQueen
------------------------------
Message: 2
Date: Fri, 3 Nov 2017 12:19:01 +1100
From: Craig McQueen <[email protected]>
To: "[email protected]" <[email protected]>
Subject: RE: Statement on KRACK?
Message-ID:
<5500469a22567c4baf673a6e86afa3a40295f094b...@ir-central.corp.innerrange.com>
Content-Type: text/plain; charset="us-ascii"
I wrote:
>
> It would be helpful to have a status about KRACK in relation to Connman.
>
> * Is Connman directly affected by the KRACK Wi-Fi vulnerability?
> * Is Connman indirectly affected by the KRACK Wi-Fi vulnerability, e.g. via
> wpa_supplicant or Linux kernel?
> * What steps, if any, are required to patch a system using Connman, to
> secure against KRACK?
As far as I can tell from my initial investigation, Connman relies on
wpa_supplicant for low-level Wi-Fi protocol handling. So wpa_supplicant needs
to be patched to fix KRACK vulnerabilities, while Connman itself doesn't need
patching. Is that correct?
It's not 100% clear to me what the status is for access point mode (tethering
in Connman). It looks as though Connman must also use wpa_supplicant for
tethering support. So a patched wpa_supplicant would also fix KRACK
vulnerability for access point mode. Is that correct?
--
Craig McQueen
------------------------------
Message: 3
Date: Thu, 2 Nov 2017 19:36:25 -0700
From: Xiaodong Sun <[email protected]>
To: Craig McQueen <[email protected]>
Cc: "[email protected]" <[email protected]>
Subject: Re: Statement on KRACK?
Message-ID:
<caeobsrqp4_st9o7pyaayjwqyzpcoym+m+tdbfyaj65ozghc...@mail.gmail.com>
Content-Type: text/plain; charset="utf-8"
I think you are right, Craig! The WPA2 security vulnerability exists in
wpa_supplicant, not in Connman. The patch should be in wpa_supplicant.
On Thu, Nov 2, 2017 at 6:19 PM, Craig McQueen <[email protected]>
wrote:
> I wrote:
> >
> > It would be helpful to have a status about KRACK in relation to Connman.
> >
> > * Is Connman directly affected by the KRACK Wi-Fi vulnerability?
> > * Is Connman indirectly affected by the KRACK Wi-Fi vulnerability, e.g.
> via
> > wpa_supplicant or Linux kernel?
> > * What steps, if any, are required to patch a system using Connman, to
> > secure against KRACK?
>
> As far as I can tell from my initial investigation, Connman relies on
> wpa_supplicant for low-level Wi-Fi protocol handling. So wpa_supplicant
> needs to be patched to fix KRACK vulnerabilities, while Connman itself
> doesn't need patching. Is that correct?
>
> It's not 100% clear to me what the status is for access point mode
> (tethering in Connman). It looks as though Connman must also use
> wpa_supplicant for tethering support. So a patched wpa_supplicant would
> also fix KRACK vulnerability for access point mode. Is that correct?
>
> --
> Craig McQueen
>
> _______________________________________________
> connman mailing list
> [email protected]
> https://lists.01.org/mailman/listinfo/connman
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL:
<http://lists.01.org/pipermail/connman/attachments/20171102/d542d635/attachment-0001.html>
------------------------------
Message: 4
Date: Fri, 3 Nov 2017 08:50:40 +0100
From: Julien Massot <[email protected]>
To: [email protected]
Cc: Craig McQueen <[email protected]>,
"[email protected]" <[email protected]>
Subject: Re: Statement on KRACK?
Message-ID:
<CADGp=QcFN6DQL8gWfRvc1jVxjD+ZBx9GSyhFxczTB+=8zws...@mail.gmail.com>
Content-Type: text/plain; charset="UTF-8"
Hi,
On Fri, Nov 3, 2017 at 3:36 AM, Xiaodong Sun <[email protected]> wrote:
> I think you are right, Craig! The WPA2 security vulnerability exists in
> wpa_supplicant, not in Connman. The patch should be in wpa_supplicant.
>
> On Thu, Nov 2, 2017 at 6:19 PM, Craig McQueen <[email protected]>
> wrote:
>>
>> I wrote:
>> >
>> > It would be helpful to have a status about KRACK in relation to Connman.
>> >
>> > * Is Connman directly affected by the KRACK Wi-Fi vulnerability?
No
>> > * Is Connman indirectly affected by the KRACK Wi-Fi vulnerability, e.g.
>> > via
>> > wpa_supplicant or Linux kernel?
by wpa_supplicant.
>> > * What steps, if any, are required to patch a system using Connman, to
>> > secure against KRACK?
You should go to hostap ML
Please read this mail:
http://lists.infradead.org/pipermail/hostap/2017-October/037989.html
Regards,
Julien
--
*This email and any attachment thereto are confidential and intended solely
for the use of the individual or entity to whom they are addressed.If you
are not the intended recipient, please be advised that disclosing, copying,
distributing or taking any action in reliance on the contents of this email
is strictly prohibited. In such case, please immediately advise the sender,
and delete all copies and attachment from your system.This email shall not
be construed and is not tantamount to an offer, an acceptance of offer, or
an agreement by SoftBank Robotics Europe on any discussion or contractual
document whatsoever. No employee or agent is authorized to represent or
bind SoftBank Robotics Europe to third parties by email, or act on behalf
of SoftBank Robotics Europe by email, without express written confirmation
by SoftBank Robotics Europe? duly authorized representatives.*
------------------------------
*Ce message ?lectronique et ?ventuelles pi?ces jointes sont confidentiels,
et exclusivement destin?s ? la personne ou l'entit? ? qui ils sont
adress?s.Si vous n'?tes pas le destinataire vis?, vous ?tes pri? de ne pas
divulguer, copier, distribuer ou prendre toute d?cision sur la foi de ce
message ?lectronique. Merci d'en aviser imm?diatement l'exp?diteur et de
supprimer toutes les copies et ?ventuelles pi?ces jointes de votre
syst?me.Ce message ?lectronique n'?quivaut pas ? une offre, ? une
acceptation d?offre, ou ? un accord de SoftBank Robotics Europe sur toute
discussion ou document contractuel quel qu?il soit, et ne peut ?tre
interpr?t? comme tel. Aucun employ? ou agent de SoftBank Robotics Europe
n'est autoris? ? repr?senter ou ? engager la soci?t? par email, ou ? agir
au nom et pour le compte de la soci?t? par email, sans qu?une confirmation
?crite soit donn?e par le repr?sentant l?gal de SoftBank Robotics Europe ou
par toute autre personne ayant re?u d?l?gation de pouvoir appropri?e.*
------------------------------
Message: 5
Date: Fri, 03 Nov 2017 12:45:56 +0200
From: Patrik Flykt <[email protected]>
To: Craig McQueen <[email protected]>,
"[email protected]" <[email protected]>
Subject: Re: Statement on KRACK?
Message-ID: <[email protected]>
Content-Type: text/plain; charset="UTF-8"
On Fri, 2017-11-03 at 12:19 +1100, Craig McQueen wrote:
> I wrote:
> >
> > It would be helpful to have a status about KRACK in relation to
> > Connman.
> >
> > * Is Connman directly affected by the KRACK Wi-Fi vulnerability?
No.
> > * Is Connman indirectly affected by the KRACK Wi-Fi vulnerability,
> > e.g. via
> > wpa_supplicant or Linux kernel?
Yes, via wpa_supplicant.
> > * What steps, if any, are required to patch a system using Connman,
> > to secure against KRACK?
Update wpa_supplicant. All major distros and upstream wpa_supplicant
have been updated by now.
> As far as I can tell from my initial investigation, Connman relies on
> wpa_supplicant for low-level Wi-Fi protocol handling. So
> wpa_supplicant needs to be patched to fix KRACK vulnerabilities,
> while Connman itself doesn't need patching. Is that correct?
Yes.
> It's not 100% clear to me what the status is for access point mode
> (tethering in Connman). It looks as though Connman must also use
> wpa_supplicant for tethering support. So a patched wpa_supplicant
> would also fix KRACK vulnerability for access point mode. Is that
> correct?
Yes.
Patrik
------------------------------
Subject: Digest Footer
_______________________________________________
connman mailing list
[email protected]
https://lists.01.org/mailman/listinfo/connman
------------------------------
End of connman Digest, Vol 25, Issue 1
**************************************