I-Dragonblood: Ubungozi bokuqala be-Wi-Fi WPA3 Buveziwe

Ngo-Okthoba 2017, kwatholakala kungalindelekile ukuthi iphrothokholi ye-Wi-Fi Protected Access II (WPA2) yokubethela ithrafikhi ye-Wi-Fi yayisengozini enkulu engaveza amaphasiwedi omsebenzisi bese ilalela ukuxhumana kwesisulu. Ukuba sengozini kwabizwa ngokuthi i-KRACK (okufushane kwe-Key Reinstallation Attack) futhi kukhonjwe ochwepheshe u-Mathy Vanhoef no-Eyal Ronen. Ngemva kokutholwa, ukuba sengozini kwe-KRACK kwavalwa nge-firmware elungisiwe yamadivayisi, futhi iphrothokholi ye-WPA2 eyathatha indawo ye-WPA3 ngonyaka odlule kufanele ngabe ikhohlwe ngokuphelele ngezinkinga zokuphepha kumanethiwekhi e-Wi-Fi. 

I-Dragonblood: Ubungozi bokuqala be-Wi-Fi WPA3 Buveziwe

Maye, ochwepheshe abafanayo bathola ubungozi obuncane kuphrothokholi ye-WPA3. Ngakho-ke, udinga ukulinda futhi uthembele ku-firmware entsha yezindawo zokufinyelela ezingenantambo namadivayisi, ngaphandle kwalokho kuzodingeka uphile nolwazi lobungozi basekhaya kanye namanethiwekhi omphakathi we-Wi-Fi. Ubungozi obutholakala ku-WPA3 ngokuhlangene bubizwa nge-Dragonblood.

Izimpande zenkinga, njengangaphambili, zilele ekusebenzeni komshini wokusungula uxhumano noma, njengoba zibizwa ngendlela evamile, "ukuxhawula". Lo mshini ubizwa ngokuthi Ujekamanzi ngokwezinga le-WPA3. Ngaphambi kokutholakala kwe-Dragonblood, yayibhekwa njengevikelwe kahle. Sekukonke, iphakheji ye-Dragonblood ihlanganisa ubungozi obuhlanu: ukunqatshelwa kwesevisi, ukuba sengozini okubili kokwehlisa, kanye nokuba sengozini kwesiteshi esiseceleni okubili.


I-Dragonblood: Ubungozi bokuqala be-Wi-Fi WPA3 Buveziwe

Ukunqatshelwa kwesevisi akuholeli ekuvuzeni kwedatha, kodwa kungaba umcimbi ongemnandi kumsebenzisi ongakwazi ngokuphindaphindiwe ukuxhuma endaweni yokufinyelela. Ubungozi obusele buvumela umhlaseli ukuthi aphinde athole amaphasiwedi okuxhuma umsebenzisi endaweni yokufinyelela futhi alandelele noma yiluphi ulwazi olubalulekile kumsebenzisi.

Ukuhlasela okwehlisa ukuvikeleka kwenethiwekhi kukuvumela ukuthi uphoqe ukushintshela kunguqulo endala yephrothokholi ye-WPA2 noma ezinguqulweni ezibuthakathaka ze-algorithms yokubethela ye-WPA3, bese uqhubeka nokugebenga usebenzisa izindlela ezaziwayo kakade. Ukuhlaselwa kwesiteshi esiseceleni kusebenzisa izici zama-algorithms e-WPA3 kanye nokusetshenziswa kwawo, okuvumela futhi ukusetshenziswa kwezindlela ezaziwa ngaphambilini zokugqekeza amaphasiwedi. Funda kabanzi lapha. Isethi yamathuluzi okuhlonza ubungozi be-Dragonblood ingatholakala kulesi sixhumanisi.

I-Dragonblood: Ubungozi bokuqala be-Wi-Fi WPA3 Buveziwe

I-Wi-Fi Alliance, enesibopho sokuthuthukisa amazinga e-Wi-Fi, yazisiwe ngobungozi obutholakele. Kubikwa ukuthi abakhiqizi bemishini balungiselela i-firmware eguquliwe ukuze bavale izimbobo zokuphepha ezitholiwe. Ngeke kube nesidingo sokushintsha noma ukubuyisela okokusebenza.




Source: 3dnews.ru

Engeza amazwana