mirror of
https://github.com/vanhoefm/fragattacks.git
synced 2024-11-25 08:48:31 -05:00
hostapd: Add logging around Michael MIC related failures
This can help one understand better why stations are failing to authentication/associate. Signed-off-by: Ben Greear <greearb@candelatech.com>
This commit is contained in:
parent
e7525a2954
commit
e2fc13d0ab
@ -1729,6 +1729,8 @@ static void handle_auth(struct hostapd_data *hapd,
|
||||
#endif /* CONFIG_NO_RC4 */
|
||||
|
||||
if (hapd->tkip_countermeasures) {
|
||||
wpa_printf(MSG_DEBUG,
|
||||
"Ongoing TKIP countermeasures (Michael MIC failure) - reject authentication");
|
||||
resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
|
||||
goto fail;
|
||||
}
|
||||
|
@ -71,6 +71,11 @@ int michael_mic_failure(struct hostapd_data *hapd, const u8 *addr, int local)
|
||||
struct os_reltime now;
|
||||
int ret = 0;
|
||||
|
||||
hostapd_logger(hapd, addr, HOSTAPD_MODULE_IEEE80211,
|
||||
HOSTAPD_LEVEL_INFO,
|
||||
"Michael MIC failure detected in received frame%s",
|
||||
local ? " (local)" : "");
|
||||
|
||||
if (addr && local) {
|
||||
struct sta_info *sta = ap_get_sta(hapd, addr);
|
||||
if (sta != NULL) {
|
||||
|
Loading…
Reference in New Issue
Block a user