No. If you have physical access to the node and/or a valid login as Admin then any form of PSK is vulnerable.
If you are concerned about PSK's being exposed then you have the option to run 802.1x auth and issue issues tokens out of radius/IDM that is secured elsewhere than on the AP itself. On Fri, 17 Apr 2020 at 20:16, e9hack <e9h...@gmail.com> wrote: > Hi, > > the configuration files for hostapd (/var/run/hostapd-phyX.conf) are > readable for everyone. This means everyone can read the wifi passwords. If > a non privileged user calls 'uci show wireless', he will also get all wifi > passwords. This possible e.g. for user nobody and dnsmasq. > > Is this a a security issue? > > Regards, > Hartmut > > _______________________________________________ > openwrt-devel mailing list > openwrt-devel@lists.openwrt.org > https://lists.openwrt.org/mailman/listinfo/openwrt-devel >
_______________________________________________ openwrt-devel mailing list openwrt-devel@lists.openwrt.org https://lists.openwrt.org/mailman/listinfo/openwrt-devel