https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6022
Summary: 802.11 Disassociation Packet's "Reason Code" field is
imprecisely decoded/described.
Product: Wireshark
Version: SVN
Platform: x86-64
OS/Version: Debian
Status: NEW
Severity: Enhancement
Priority: Low
Component: Wireshark
AssignedTo: wireshark-bugs@xxxxxxxxxxxxx
ReportedBy: ali_bugs@xxxxxxxxxxxxxxx
Build Information:
him@hashbang Wed Jun 15 12:02:25 ~# wireshark -v
wireshark 1.6.0rc1 (SVN Rev Unknown from unknown)
Copyright 1998-2011 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Compiled (64-bit) with GTK+ 2.20.1, with GLib 2.24.2, with libpcap 1.1.1, with
libz 1.2.3.4, without POSIX capabilities, without libpcre, without SMI, without
c-ares, without ADNS, without Lua, without Python, without GnuTLS, without
Gcrypt, without Kerberos, without GeoIP, without PortAudio, without AirPcap.
Running on Linux 3.0.0-rc2-wl_m_Sat12jun2011, with libpcap version 1.1.1, with
libz 1.2.3.4.
Built using gcc 4.4.5.
him@hashbang Wed Jun 15 12:02:28 ~#
--
Line 11170 of
http://anonsvn.wireshark.org/wireshark/trunk/epan/dissectors/packet-ieee80211.c
decodes the 0x0E Reason Code as "Michael MIC failure". (This is in the
reason_codes[] array.)
However, the latest 802.11 Standard, ieee_std_802.11-2007, defines this as only
a "Message integrity code (MIC) failure". (See section 7.3.1.7 Reason Code
field, Table 7-22--Reason codes.)
The distinction is important, because Michael MICs are specific to TKIP
packets, whereas such a Disassociation can occur in response to other causes
e.g. a failed 4-way handshake involving EAPoL packets.
The fix:
Only the text string on line 11170 needs to be changed to "Message integrity
code (MIC) failure".
--
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.