View Single Post
Old 10-28-2017, 02:36 AM   #13
DNSB
Bibliophagist
DNSB ought to be getting tired of karma fortunes by now.DNSB ought to be getting tired of karma fortunes by now.DNSB ought to be getting tired of karma fortunes by now.DNSB ought to be getting tired of karma fortunes by now.DNSB ought to be getting tired of karma fortunes by now.DNSB ought to be getting tired of karma fortunes by now.DNSB ought to be getting tired of karma fortunes by now.DNSB ought to be getting tired of karma fortunes by now.DNSB ought to be getting tired of karma fortunes by now.DNSB ought to be getting tired of karma fortunes by now.DNSB ought to be getting tired of karma fortunes by now.
 
DNSB's Avatar
 
Posts: 47,105
Karma: 169815798
Join Date: Jul 2010
Location: Vancouver
Device: Kobo Sage, Libra Colour, Lenovo M8 FHD, Paperwhite 4, Tolino epos
Quote:
Originally Posted by eenk View Post
wrong. the attack is on the client side, also called station side afaik. Also, most wireless APs, that's the other side, implement the client side, so APs usually won't be vulnerable.
From what I've read, the nonce reuse vulnerability needs to be on both ends of the connection to allow the man in the middle attack to work. It would appear that Apple and Microsoft—for supported products—are releasing/have released patches while some Linux distributions have patches available. Pretty much leaving Android devices as the potential victims.

Last edited by DNSB; 10-28-2017 at 02:40 AM.
DNSB is offline   Reply With Quote