mirror of
https://github.com/vanhoefm/fragattacks.git
synced 2024-11-26 17:28:29 -05:00
bddc51e8e4
If WPA2-Enterprise connection with full EAP authentication (i.e., no PMKSA caching used) results in a PMKID that does not match the one the AP/Authenticator indicates in EAPOL-Key msg 1/4, there is not much point in trying to trigger full EAP authentication by sending EAPOL-Start since this sequence was immediately after such full authentication attempt. There are known examples of authentication servers with incorrect MSK derivation when TLS v1.2 is used (e.g., FreeRADIUS 2.2.6 or 3.0.7 when built with OpenSSL 1.0.2). Write a clear debug log entry and also send it to control interface monitors when it looks likely that this case has been hit. After doing that, stop the connection attempt by disassociating instead of trying to send out EAPOL-Start to trigger new EAP authentication round (such another try can be tried with a new association). Signed-off-by: Jouni Malinen <j@w1.fi> |
||
---|---|---|
.. | ||
Makefile | ||
peerkey.c | ||
peerkey.h | ||
pmksa_cache.c | ||
pmksa_cache.h | ||
preauth.c | ||
preauth.h | ||
tdls.c | ||
wpa_ft.c | ||
wpa_i.h | ||
wpa_ie.c | ||
wpa_ie.h | ||
wpa.c | ||
wpa.h |