wpa_supplicant: hostapd: Remove man-in-the-middle
Replace man-in-the-middle attacks with on-path attacks which is gender-neutral and commonly used. Signed-off-by: Arowa Suliman <arowa@chromium.org>
This commit is contained in:
parent
2e122945fa
commit
2fb33ce4b6
2 changed files with 2 additions and 2 deletions
|
@ -1837,7 +1837,7 @@ own_ip_addr=127.0.0.1
|
||||||
#assoc_sa_query_retry_timeout=201
|
#assoc_sa_query_retry_timeout=201
|
||||||
|
|
||||||
# ocv: Operating Channel Validation
|
# ocv: Operating Channel Validation
|
||||||
# This is a countermeasure against multi-channel man-in-the-middle attacks.
|
# This is a countermeasure against multi-channel on-path attacks.
|
||||||
# Enabling this depends on the driver's support for OCV when the driver SME is
|
# Enabling this depends on the driver's support for OCV when the driver SME is
|
||||||
# used. If hostapd SME is used, this will be enabled just based on this
|
# used. If hostapd SME is used, this will be enabled just based on this
|
||||||
# configuration.
|
# configuration.
|
||||||
|
|
|
@ -988,7 +988,7 @@ fast_reauth=1
|
||||||
# WPA3-Personal-only mode: ieee80211w=2 and key_mgmt=SAE
|
# WPA3-Personal-only mode: ieee80211w=2 and key_mgmt=SAE
|
||||||
#
|
#
|
||||||
# ocv: whether operating channel validation is enabled
|
# ocv: whether operating channel validation is enabled
|
||||||
# This is a countermeasure against multi-channel man-in-the-middle attacks.
|
# This is a countermeasure against multi-channel on-path attacks.
|
||||||
# Enabling this automatically also enables ieee80211w, if not yet enabled.
|
# Enabling this automatically also enables ieee80211w, if not yet enabled.
|
||||||
# 0 = disabled (default)
|
# 0 = disabled (default)
|
||||||
# 1 = enabled if wpa_supplicant's SME in use. Otherwise enabled only when the
|
# 1 = enabled if wpa_supplicant's SME in use. Otherwise enabled only when the
|
||||||
|
|
Loading…
Reference in a new issue