this post was submitted on 22 Feb 2026
8 points (90.0% liked)
Cryptography @ Infosec.pub
610 readers
1 users here now
Questions, answers, discussions, and literature on the theory and practice of cryptography
Rules (longer version here)
- Stick to cryptography / infosec
- Be a good netizen - be kind, act in good faith, maintain high quality, don't mislead
- Link directly to original sources
- Don't use us to cheat on challenges or tests!
- Crypto review requests must show the algorithm
- CTF / challenges and puzzles must use modern crypto
- Avoid making duplicate posts
- All use of AI / LLM and their prompts MUST be disclosed in your submissions and comments
##Related resources;
- Reddit cryptography forums 1 & 2; /r/crypto /r/cryptography
- Cryptology ePrint archive
- Discussion site for ePrint papers
- Libera Chat's IRC:s #crypto - (IRC protocol URL)
- Metzdowd cryptography mailing list
- Randombit cryptography mailing list
- StackExchange cryptography community
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Having skimmed through the paper, the lack of coordination between 802.11, L2 switching, and L3 routing is indeed alarming. But I think this one takes the cake:
If only the first packet between the AP and real RADIUS server is necessary to bypass the encryption between those two and compute the message authentication hash, then the encryption is hideously broken. That is to say, the encryption is not protecting anything and that alone sets a false expectation, even when the first packet can't be intercepted.
That aaid, the manner of this interception of uplink-bound traffic is really sad: what sort of routing config would allow going downstream for the RADIUS serve? Something would have to be deeply wrong with how the control plane is configured, but I do concede that there are plausible networks that do this.
I'm assuming this is the same type of attack as against WiFi passwords in general, bruteforce of weak passwords. But otherwise yes, a PAKE algorithm instead for auth would completely prevent the ability to bruteforce based on watching traffic alone, and WPA3 already uses a PAKE and it should be used for everything which could be low entropy