A new attack was discovered which allows cracking a WPA2 passphrase without needing to capture the 4-way handshake. While this doesn't weaken the password itself, it does mean that an attacker can begin their cracking attempts without needing to force deauthentication in order to actually capture the handshake. I am wondering how this can be most effectively mitigated.
Since this attack requires roaming, is it enough to ensure that 802.11r is not enabled and to set rsn_preauth=0
in the hostapd configuration to disable 802.11i/RSN/WPA2 pre-authentication?