-
Notifications
You must be signed in to change notification settings - Fork 770
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
FT handshake vulnerability #84
Comments
That kernel commit can indeed prevent the attack even when using an unpatched Another tip: run hostapd will extra debug output such as |
I am testing various configurations too, in particular using as AP the latest Kali and trying to find something that reinstalls an all-zero key, but even theoretically vulnerable systems (Ubuntu 16.04/17.10 with old kernel and vulnerable wpa_supplicant) are reported as not vulnerable. (They reuse a key, but not the all-zero apparently) For the AP test I'm in the same situation as Ramon and I am sure to be using a fully non-patched system. |
I realize this is an older issue. But if this still a problem (or for someone reading this now): feel free to attach a packet capture and a debug output log to investigate this further. |
I can reproduce the same output as Ramon using Ubuntu 16.04, kernel 4.4.0 and wpa_supplicant built from this report along with hostapd built from https://github.com/intrig-unicamp/mininet-wifi/tree/krack-attack . IVs are reset after replaying reassociation request but the script doesn't output the "final" state "this is bad" or "this is good" (packet capture). |
The script should display something like |
Yeah sorry, I was referring to that line. It's not shown, like the snippet in the first post of this issue. |
I'm not sure why that's not shown. Are you using the virtual Python environment? I, unfortunately, don't have time to debug this currently. Manually seeing that IVs are being reused is currently probably sufficient to determine that the AP is vulnerable. |
Yes, I'm using the Python3 virtual environment. This is the output of the script
Great, thanks |
Based on that output I would say the AP is vulnerable. I'm going to reopen this issue since there's indeed something wrong with the code (if anyone reads this: pull requests to fix it are welcome). |
To get the message to appear in a likely vulnerable environment I checked out that removing an IV list reset on every FT reassoc packet makes For my needs at the moment it's good, but I did not test it in a not vulnerable environment, for example. |
I have been trying to reproduce the FT handshake vulnerability with mac80211/hwsim and hostapd but it doesn't work anymore.
Firstly, I though that it could be related to the
hostap
version. Hence, I've installed v2.6 and I've moved the client to a new AP with theroam
command provided bywpa_supplicant
. According to the messages below,krack-ft-test.py
can detect theFT reassociation
but the AP doesn't reinstall the same IV.Then, I've found this commit and I though that it could be related to the kernel version. However, I've installed the kernel version 4.8 and the result is still the same.
Can you help me with this issue? I was able to reproduce the vulnerability three years ago and I don't know what I'm doing wrong now.
Thoughs?
The text was updated successfully, but these errors were encountered: