(no title)
AlyssaRowan | 7 years ago
Don't use SAE (which is, indeed, an instantiation of Dragonfly). I have a strong suspicion that the way it is used, there will be a practical attack.
AlyssaRowan | 7 years ago
Don't use SAE (which is, indeed, an instantiation of Dragonfly). I have a strong suspicion that the way it is used, there will be a practical attack.
zokier|7 years ago
xenithorb|7 years ago
tgsovlerkhgsel|7 years ago
Basically, take the original password/secret, derive two secrets A and B, run SAE with A as the secret, get a session key K, then use hash(K|B) as the actual session key.
If they don't have anything like that, I wouldn't be surprised if real-world implementations end up being less secure than up-to-date WPA2.
mey|7 years ago
zokier|7 years ago
https://news.ycombinator.com/item?id=6942145
https://news.ycombinator.com/item?id=7017160