ANNOUNCEMENT: Live Wireshark University & Allegro Packets online APAC Wireshark Training Session
July 17th, 2024 | 10:00am-11:55am SGT (UTC+8) | Online

Wireshark-bugs: [Wireshark-bugs] [Bug 11172] New: IEEE 802.11: 802.1X (WPA-EAP) rekeying support

Date: Sun, 03 May 2015 19:52:27 +0000
Bug ID 11172
Summary IEEE 802.11: 802.1X (WPA-EAP) rekeying support - Proposed Fix in Gerrit
Product Wireshark
Version 1.12.4
Hardware x86-64
OS Gentoo
Status UNCONFIRMED
Severity Normal
Priority Low
Component Dissection engine (libwireshark)
Assignee [email protected]
Reporter [email protected]

Created attachment 13583 [details]
eap-tls rekey sample with CCMP

Build Information:
Paste the COMPLETE build information from "Help->About Wireshark", "wireshark
-v", or "tshark -v".
--
Wireshark is not able to decrypt packages after an WPA-rekey.
Proposed fix https://code.wireshark.org/review/#/c/8268/

The attached files can be used to test the patch.

You have to configure the following PSKs in wireshark to be able to fully
decode the EAP-TLS samples.

In these captures the Pairwaise Key was rekeyed every 120s and the group key
every 60s (very unusual, showcase only settings.):

eap-tls-rekey-sample-CCMP.pcap.gz:
a5001e18e0b3f792278825bc3abff72d7021d7c157b600470ef730e2490835d4
79258f6ceeecedd3482b92deaabdb675f09bcb4003ef5074f5ddb10a94ebe00a
23a9ee58c7810546ae3e7509fda9f97435778d689e53a54891c56d02f18ca162

eap-tls-rekey-sample-TKIP.pcap.gz:
7f715f60a434c7a15f0dbdfd33fc0d46ea3f0446b16918fb23ad8628ac2cc7d8
569bea0a3f5ac8f32a15395ee3c2eabc8ed90610bbf2cc2fbbef9636bdbefcc5
27ba90f9203b41513e2d42d0aa3256939226d810436f01c67dfb79c4a10339a4

Rekeys are also possible with WPA-PSK. Also one example for that:
PSK-rekey-sample.pcap.gz:
PSK: wireshark


You are receiving this mail because:
  • You are watching all bug changes.