-
Notifications
You must be signed in to change notification settings - Fork 775
Open
Description
I have been trying to reproduce the FT handshake vulnerability with mac80211/hwsim and hostapd but it doesn't work anymore.
Firstly, I though that it could be related to the hostap version. Hence, I've installed v2.6 and I've moved the client to a new AP with the roam command provided by wpa_supplicant. According to the messages below, krack-ft-test.py can detect the FT reassociation but the AP doesn't reinstall the same IV.
[08:06:44] Detected Authentication frame, clearing client state
[08:06:44] Detected Authentication frame, clearing client state
[08:06:44] Detected FT reassociation frame
[08:06:45] Replaying Reassociation Request
[08:06:45] Detected FT reassociation frame
[08:06:46] Replaying Reassociation Request
[08:06:59] AP transmitted data using IV=1 (seq=24)
[08:06:59] Replaying Reassociation Request
[08:06:59] Detected FT reassociation frame
[08:06:59] AP transmitted data using IV=1 (seq=26)
[08:07:00] AP transmitted data using IV=2 (seq=27)
[08:07:00] Replaying Reassociation Request
[08:07:00] Detected FT reassociation frame
[08:07:00] AP transmitted data using IV=1 (seq=29)
[08:07:01] AP transmitted data using IV=2 (seq=30)
[08:07:01] Replaying Reassociation Request
[08:07:01] Detected FT reassociation frame
[08:07:01] AP transmitted data using IV=1 (seq=32)
[08:07:02] Replaying Reassociation Request
[08:07:02] Detected FT reassociation frame
[08:07:02] AP transmitted data using IV=1 (seq=35)
Then, I've found this commit and I though that it could be related to the kernel version. However, I've installed the kernel version 4.8 and the result is still the same.
Can you help me with this issue? I was able to reproduce the vulnerability three years ago and I don't know what I'm doing wrong now.
Thoughs?
Metadata
Metadata
Assignees
Labels
No labels