Not sure how these two things even relateCan't coonnect to router in Linux??? I get the unable to connect to server,
I heard about a big bug & wanted to see if a patch was out... I use to connect just fine, not 1 thing changed...
watch?v=VI89hpI5pos
MAJOR Wi-Fi Exploit Found! ALL Your Devices At Risk! (How "Krack Attack" Works)
Our main attack is against the 4-way handshake of the WPA2 protocol. This handshake is executed when a client wants to join a protected Wi-Fi network, and is used to confirm that both the client and access point possess the correct credentials (e.g. the pre-shared password of the network). At the same time, the 4-way handshake also negotiates a fresh encryption key that will be used to encrypt all subsequent traffic.
In a key reinstallation attack, the adversary tricks a victim into reinstalling an already-in-use key. This is achieved by manipulating and replaying cryptographic handshake messages.
All companies are working to fix this vulnerability but no success till now
Lots of patches already outAll companies are working to fix this vulnerability but no success till now
Arch Linux
Arch has pushed out updates for wpa_supplicant and hostapd
Debian
Debian posted an advisory to the Debian Security Announce mailing list with information on updates that resolve the Krack vulnerability.
LineageOS
LineageOS has had patches merged to prevent the Krak vulns.
Linux
According to the vulnerability release, "Our attack is especially catastrophic against version 2.4 and above of wpa_supplicant, a Wi-Fi client commonly used on Linux.". Patches can be found here.
Netgear
Netgear has released an advisory that contains a list of products affected by KRACK and associated updates.
OpenBSD
OpenBSD was provided a patch that was used to silently update and fix this vulnerability.
Ubiquiti (UniFi, AmpliFi, airMax)
Ubiquiti have posted an advisory that provides details on what UniFi, AmpliFi, and airMax products are affected by the KRACK vulnerability. This advisory also provides links to the updates that resolve this attack.
Ubuntu
Ubuntu has released an advisory with information on how to update wpa_supplicant and hostapd in order to resolve this vulnerability.