mirror of
https://github.com/vanhoefm/fragattacks.git
synced 2024-11-28 18:28:23 -05:00
fragattack: support SAE with hash-to-element method
This commit is contained in:
parent
f988e85c95
commit
f7d7681386
@ -1012,3 +1012,12 @@ seems this should work with all already supported dongles. Note that I
|
||||
haven't tested this in detail: my assumption has been that whether a
|
||||
device is operating in WPA2 or WPA3 mode won't impact test results.
|
||||
|
||||
The provided `client.conf` by default enables both the hunting-and-pecking method and
|
||||
the hash-to-element method. To set up an AP that supports hash-to-element (and thereby
|
||||
test the latest WPA3/SAE clients) you can modify `hostapd.conf` and set the parameter:
|
||||
|
||||
sae_pwe=2
|
||||
|
||||
By setting this value the AP will accept both the hunting-and-pecking method and
|
||||
the hash-to-element method.
|
||||
|
||||
|
@ -1,22 +1,29 @@
|
||||
ctrl_interface=wpaspy_ctrl
|
||||
|
||||
# Simple home network
|
||||
# WPA3/SAE: support both hunting-and-pecking loop and hash-to-element
|
||||
sae_pwe=2
|
||||
|
||||
# WPA2 home network
|
||||
network={
|
||||
ssid="testnetwork"
|
||||
psk="abcdefgh"
|
||||
disable_ht=1
|
||||
|
||||
pairwise=CCMP
|
||||
#group=CCMP
|
||||
|
||||
# Enable these to test WPA3/SAE APs
|
||||
#key_mgmt=SAE
|
||||
#ieee80211w=1
|
||||
|
||||
# Might be useful in very noisy environments
|
||||
#disable_ht=1
|
||||
}
|
||||
|
||||
# WPA3 home network
|
||||
network={
|
||||
ssid="test-wpa3"
|
||||
psk="abcdefgh"
|
||||
|
||||
ieee80211w=1
|
||||
key_mgmt=SAE
|
||||
}
|
||||
|
||||
# Enterprise network
|
||||
network={
|
||||
ssid="peaptest"
|
||||
@ -31,7 +38,7 @@ network={
|
||||
#group=CCMP
|
||||
}
|
||||
|
||||
# EAP-PWD with dynamic WEP keys
|
||||
# EAP-PWD with dynamic WEP keys (for research purposes)
|
||||
network={
|
||||
ssid="weptests"
|
||||
key_mgmt=IEEE8021X
|
||||
|
Loading…
Reference in New Issue
Block a user