mirror of
https://github.com/vanhoefm/fragattacks.git
synced 2024-11-26 01:08:22 -05:00
944814106e
As a compromise between usability and security, do not disable AP PIN permanently based on failed PIN validations. Instead, go to AP Setup Locked state for increasing amount of time between each failure to slow down brute force attacks against the AP PIN. This avoids problems with some external Registrars that may try to use the same PIN multiple times without user input. Now, the user will still be able to fix the PIN and try again later while a real attack is delayed enough to make it impractical. |
||
---|---|---|
.. | ||
ap | ||
common | ||
crypto | ||
drivers | ||
eap_common | ||
eap_peer | ||
eap_server | ||
eapol_auth | ||
eapol_supp | ||
l2_packet | ||
radius | ||
rsn_supp | ||
tls | ||
utils | ||
wps | ||
lib.rules | ||
Makefile |