I have been trying to reproduce the FT handshake vulnerability with mac80211/hwsim and hostapd but it doesn't work anymore.
Firstly, I though that it could be related to the hostap version. Hence, I've installed v2.6 and I've moved the client to a new AP with the roam command provided by wpa_supplicant. According to the messages below, krack-ft-test.py can detect the FT reassociation but the AP doesn't reinstall the same IV.
[08:06:44] Detected Authentication frame, clearing client state
[08:06:44] Detected Authentication frame, clearing client state
[08:06:44] Detected FT reassociation frame
[08:06:45] Replaying Reassociation Request
[08:06:45] Detected FT reassociation frame
[08:06:46] Replaying Reassociation Request
[08:06:59] AP transmitted data using IV=1 (seq=24)
[08:06:59] Replaying Reassociation Request
[08:06:59] Detected FT reassociation frame
[08:06:59] AP transmitted data using IV=1 (seq=26)
[08:07:00] AP transmitted data using IV=2 (seq=27)
[08:07:00] Replaying Reassociation Request
[08:07:00] Detected FT reassociation frame
[08:07:00] AP transmitted data using IV=1 (seq=29)
[08:07:01] AP transmitted data using IV=2 (seq=30)
[08:07:01] Replaying Reassociation Request
[08:07:01] Detected FT reassociation frame
[08:07:01] AP transmitted data using IV=1 (seq=32)
[08:07:02] Replaying Reassociation Request
[08:07:02] Detected FT reassociation frame
[08:07:02] AP transmitted data using IV=1 (seq=35)
Then, I've found this commit and I though that it could be related to the kernel version. However, I've installed the kernel version 4.8 and the result is still the same.
Can you help me with this issue? I was able to reproduce the vulnerability three years ago and I don't know what I'm doing wrong now.
Thoughs?
I have been trying to reproduce the FT handshake vulnerability with mac80211/hwsim and hostapd but it doesn't work anymore.
Firstly, I though that it could be related to the
hostapversion. Hence, I've installed v2.6 and I've moved the client to a new AP with theroamcommand provided bywpa_supplicant. According to the messages below,krack-ft-test.pycan detect theFT reassociationbut the AP doesn't reinstall the same IV.Then, I've found this commit and I though that it could be related to the kernel version. However, I've installed the kernel version 4.8 and the result is still the same.
Can you help me with this issue? I was able to reproduce the vulnerability three years ago and I don't know what I'm doing wrong now.
Thoughs?