cve-2017-13077 - WPA2 security vulni
David Wolfskill
david at catwhisker.org
Tue Oct 17 16:57:10 UTC 2017
On Tue, Oct 17, 2017 at 12:51:23PM -0400, Allan Jude wrote:
> ....
> > Question: Should one expect a wpa_supplicant-2.6_2 executable built
> > under FreeBSD stable/11 (amd64) to work on the same hardware, but
> > running head?
>
> Did you run the version from ports, or did you run the base /etc/rc.d
> script with your rc.conf set to point to the ports binary? This will run
> the command with -c /etc/wpa_supplicant.conf overriding the ports default.
>
> So this is expected to work in this way.
Ah. When I installed the port, I was reminded:
| ...
| ===> Registering installation for wpa_supplicant-2.6_2
| Installing wpa_supplicant-2.6_2...
| To use the ports version of WPA Supplicant instead of the base, add:
|
| wpa_supplicant_program="/usr/local/sbin/wpa_supplicant"
|
| to /etc/rc.conf
|
| ===> SECURITY REPORT:
| ....
So I did that. I did not do anything to the existing
/etc/rc.d/wpa_supplicant, which had been installed as part of base
FreeBSD.
> ....
Peace,
david
--
David H. Wolfskill david at catwhisker.org
Unsubstantiated claims of "Fake News" are evidence that the claimant lies again.
See http://www.catwhisker.org/~david/publickey.gpg for my public key.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 603 bytes
Desc: not available
URL: <http://lists.freebsd.org/pipermail/freebsd-current/attachments/20171017/77e4a605/attachment.sig>
More information about the freebsd-current
mailing list