Bug ID |
11172
|
Summary |
IEEE 802.11: 802.1X (WPA-EAP) rekeying support - Proposed Fix in Gerrit
|
Product |
Wireshark
|
Version |
1.12.4
|
Hardware |
x86-64
|
OS |
Gentoo
|
Status |
UNCONFIRMED
|
Severity |
Normal
|
Priority |
Low
|
Component |
Dissection engine (libwireshark)
|
Assignee |
[email protected]
|
Reporter |
[email protected]
|
Created attachment 13583 [details]
eap-tls rekey sample with CCMP
Build Information:
Paste the COMPLETE build information from "Help->About Wireshark", "wireshark
-v", or "tshark -v".
--
Wireshark is not able to decrypt packages after an WPA-rekey.
Proposed fix https://code.wireshark.org/review/#/c/8268/
The attached files can be used to test the patch.
You have to configure the following PSKs in wireshark to be able to fully
decode the EAP-TLS samples.
In these captures the Pairwaise Key was rekeyed every 120s and the group key
every 60s (very unusual, showcase only settings.):
eap-tls-rekey-sample-CCMP.pcap.gz:
a5001e18e0b3f792278825bc3abff72d7021d7c157b600470ef730e2490835d4
79258f6ceeecedd3482b92deaabdb675f09bcb4003ef5074f5ddb10a94ebe00a
23a9ee58c7810546ae3e7509fda9f97435778d689e53a54891c56d02f18ca162
eap-tls-rekey-sample-TKIP.pcap.gz:
7f715f60a434c7a15f0dbdfd33fc0d46ea3f0446b16918fb23ad8628ac2cc7d8
569bea0a3f5ac8f32a15395ee3c2eabc8ed90610bbf2cc2fbbef9636bdbefcc5
27ba90f9203b41513e2d42d0aa3256939226d810436f01c67dfb79c4a10339a4
Rekeys are also possible with WPA-PSK. Also one example for that:
PSK-rekey-sample.pcap.gz:
PSK: wireshark
You are receiving this mail because:
- You are watching all bug changes.