Dealing with bad EAPOL 4/4 messages

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



While testing my eapol corruptions patch, I noticed this behaviour:

station sends corrupted 4/4 EAPOL msg
AP appears to reject it, sends new 3/4 msg to station.

But, when STA tries to resend 4/4, it seems the driver (or firmware, specifically)
still has an encryption key set, and for ath10k, that causes a corrupted 4/4 on
the air.  I am not sure if this is just a CT ath10k firmware issue or not...so:

What is expected behaviour in the case where the 4/4 is rejected by the AP?

Should the supplicant clear the key, resend 4/4, and then re-apply the key?

Does it do that now?

Thanks,
Ben

--
Ben Greear <greearb@xxxxxxxxxxxxxxx>
Candela Technologies Inc  http://www.candelatech.com


_______________________________________________
Hostap mailing list
Hostap@xxxxxxxxxxxxxxxxxxx
http://lists.infradead.org/mailman/listinfo/hostap



[Index of Archives]     [Linux Wireless]     [Linux Kernel]     [ATH6KL]     [Linux Bluetooth]     [Linux Netdev]     [Kernel Newbies]     [IDE]     [Security]     [Git]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Linux ATA RAID]     [Samba]     [Device Mapper]

  Powered by Linux