The attack described at https://hashcat.net/forum/thread-7717.html
performs a brute-force hash cracking attack on data voluntarily
sent by access points which support 802.1x authentication with
a pre-shared passphrase and have a feature known as "fast roaming"
enabled.

At present, OpenBSD-based access points support neither 802.1x
authentication nor fast roaming. (There is some 802.1x code in
the kernel, but it is only used in client mode and only in
conjunction with the wpa_supplicant program from ports.)

Lack of 802.1x support means the WPA key configured with ifconfig
acts as the pairwise master key (PMK). It has always been possible
to capture a 4-way handshake and attempt to crack the passphrase
which hashed data exposed during the 4-way handshake is based on.
This is referred to as one of the "existing attacks" in the hashcat
forum post and this attack vector is even mentioned in the spec
(802.11 2012, section 4.10.3.4 "Alternate operations with PSK"):
   """
   This operation has security vulnerabilities when used with
   a low-entropy key and is recommended to be used only after
   taking that into account.
   """

So the bottom line is:

  - Never rely on WPA passphrases for end-to-end security regardless
    of how "strong" your passphrase seems to be. WPA passphrases may
    be used for access control (i.e. authorization) but they provide
    neither authenticity nor privacy.

  - If you care, configure a "strong" WPA passphrase on your access point.
    The maximum length is 63 characters. A command such as pwgen -s 63
    will suggest a WPA passphrase which is hard to crack (pwgen is in ports).

Reply via email to