Search Linux Wireless

Re: TR: Clear data transit during WPA negociation in case of reassociation

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thu, 2012-10-18 at 09:30 +0200, Cedric Debarge wrote:
> Hi all,
> 
> 	I am not sure if this is the right place to post my question. Please forgive me if not.
> 
> 	I am experimenting roaming between two APs with wpa_supplicant (WPA2 + EAP-TLS).
> 	When WPA_Supplicant come back from an AP for which it has already cached the key, I saw that during WPA2 4 Handshake (in case of reassociation), data are sent through wpa_supplicant unencrypted.
> 
> 	As soon as the WPA2 successfully ends its negotiation, the data are sent encrypted back.
> 
> 	I attached to this email a Wireshark capture of the wireless transaction. Before this capture the frames were correctly encrypted. 
> 	You can see the start of the WPA2 4 Handshake protocol at packet number 10.
> 	During this 4 Handshake protocol you could see unencrypted iperf (UDP 5001) packets N°12/17/18/22/24.. until packet 55. 
> 	4 Handshake protocol ends at packet 49.
> 
> 	Can you give me some clue how to work it out ?

Can you show the wpa_supplicant debug log for this?

johannes

--
To unsubscribe from this list: send the line "unsubscribe linux-wireless" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[Index of Archives]     [Linux Host AP]     [ATH6KL]     [Linux Wireless Personal Area Network]     [Linux Bluetooth]     [Linux Netdev]     [Kernel Newbies]     [Linux Kernel]     [IDE]     [Git]     [Netfilter]     [Bugtraq]     [Yosemite Hiking]     [MIPS Linux]     [ARM Linux]     [Linux RAID]

  Powered by Linux