mirror of
https://github.com/vanhoefm/fragattacks.git
synced 2024-12-01 11:48:23 -05:00
2cde175a93
This verifies that hostapd uses Session-Timeout value from Access-Accept as the lifetime for the PMKSA cache entries and expires entries both while the station is disconnected and during an association. Signed-off-by: Jouni Malinen <j@w1.fi>
81 lines
2.3 KiB
Plaintext
81 lines
2.3 KiB
Plaintext
"pwd user" PWD "secret password"
|
|
"pwd.user@test123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890.example.com" PWD "secret password"
|
|
"gpsk user" GPSK "abcdefghijklmnop0123456789abcdef"
|
|
"sake user" SAKE 0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef
|
|
"eke user" EKE "hello"
|
|
"ikev2 user" IKEV2 "ike password"
|
|
"pax.user@example.com" PAX 0123456789abcdef0123456789abcdef
|
|
"psk.user@example.com" PSK 0123456789abcdef0123456789abcdef
|
|
"vendor-test" VENDOR-TEST "foo"
|
|
"osen@example.com" WFA-UNAUTH-TLS
|
|
"unauth-tls" UNAUTH-TLS
|
|
|
|
"vlan1" PAX 0123456789abcdef0123456789abcdef
|
|
radius_accept_attr=64:d:13
|
|
radius_accept_attr=65:d:6
|
|
radius_accept_attr=81:s:1
|
|
|
|
"vlan2" PAX 0123456789abcdef0123456789abcdef
|
|
radius_accept_attr=64:d:13
|
|
radius_accept_attr=65:d:6
|
|
radius_accept_attr=81:s:2
|
|
|
|
"test-class" PAX 0123456789abcdef0123456789abcdef
|
|
radius_accept_attr=25:x:00112233445566778899
|
|
|
|
"gpsk-cui" GPSK "abcdefghijklmnop0123456789abcdef"
|
|
radius_accept_attr=89:s:gpsk-chargeable-user-identity
|
|
radius_accept_attr=25:x:00112233445566778899aa
|
|
|
|
"gpsk-user-session-timeout" GPSK "abcdefghijklmnop0123456789abcdef"
|
|
radius_accept_attr=27:d:3
|
|
|
|
"020000000000" MACACL "020000000000"
|
|
|
|
"0232010000000000@ttls" TTLS,AKA
|
|
"0232010000000000@peap" PEAP,AKA
|
|
"0232010000000000@fast" FAST,AKA
|
|
"6555444333222111@both" AKA',AKA
|
|
|
|
"0"* AKA
|
|
"1"* SIM
|
|
"2"* AKA
|
|
"3"* SIM
|
|
"4"* AKA
|
|
"5"* SIM
|
|
"6"* AKA'
|
|
"7"* AKA'
|
|
"8"* AKA'
|
|
* TTLS,TLS,PEAP,FAST,SIM,AKA',AKA
|
|
|
|
"0"* AKA [2]
|
|
"1"* SIM [2]
|
|
"2"* AKA [2]
|
|
"3"* SIM [2]
|
|
"4"* AKA [2]
|
|
"5"* SIM [2]
|
|
"6"* AKA' [2]
|
|
"7"* AKA' [2]
|
|
"8"* AKA' [2]
|
|
|
|
"pap user" TTLS-PAP "password" [2]
|
|
"chap user" TTLS-CHAP "password" [2]
|
|
"mschap user" TTLS-MSCHAP "password" [2]
|
|
"DOMAIN\mschapv2 user" TTLS-MSCHAPV2 hash:8846f7eaee8fb117ad06bdd830b7586c [2]
|
|
"hs20-test" TTLS-MSCHAPV2 "password" [2]
|
|
"utf8-user" TTLS-MSCHAPV2 "secret-åäö-€-password" [2]
|
|
"utf8-user-hash" TTLS-MSCHAPV2 hash:bd5844fad2489992da7fe8c5a01559cf [2]
|
|
|
|
"user" MSCHAPV2,MD5,GTC "password" [2]
|
|
"cert user" TLS [2]
|
|
|
|
"hs20-deauth-test" TTLS-MSCHAPV2 "password" [2]
|
|
radius_accept_attr=26:x:00009f680405016400
|
|
|
|
"hs20-subrem-test" TTLS-MSCHAPV2 "password" [2]
|
|
radius_accept_attr=26:x:00009f6801170168747470733a2f2f6578616d706c652e636f6d2f
|
|
|
|
"hs20-session-info-test" TTLS-MSCHAPV2 "password" [2]
|
|
radius_accept_attr=27:d:63
|
|
radius_accept_attr=26:x:00009f6805170168747470733a2f2f6578616d706c652e636f6d2f
|