Browse Source

krackattacks: generate new GTKs when testing replay counter installation

Mathy Vanhoef 7 years ago
parent
commit
1803754909
2 changed files with 18 additions and 1 deletions
  1. 11 0
      hostapd/ctrl_iface.c
  2. 7 1
      krackattack/krack-test-client.py

+ 11 - 0
hostapd/ctrl_iface.c

@@ -2747,6 +2747,14 @@ static int hostapd_get_tk(struct hostapd_data *hapd, const char *txtaddr, char *
 
 	return res;
 }
+
+static int hostapd_renew_gtk(struct hostapd_data *hapd)
+{
+	wpa_gtk_rekey(hapd->wpa_auth);
+	poc_log(NULL, "Renewed the group key\n");
+
+	return 0;
+}
 #endif
 
 
@@ -3127,6 +3135,9 @@ static int hostapd_ctrl_iface_receive_process(struct hostapd_data *hapd,
 #ifdef KRACK_TEST_CLIENT
 	} else if (os_strncmp(buf, "GET_TK ", 7) == 0) {
 		reply_len = hostapd_get_tk(hapd, buf + 7, reply, reply_size);
+	} else if (os_strcmp(buf, "RENEW_GTK") == 0) {
+		if (hostapd_renew_gtk(hapd))
+			reply_len = -1;
 #endif
 	} else if (os_strcmp(buf, "TERMINATE") == 0) {
 		eloop_terminate();

+ 7 - 1
krackattack/krack-test-client.py

@@ -449,7 +449,13 @@ class KRAckAttackClient():
 
 			# Periodically send the replayed broadcast ARP requests to test for group key reinstallations
 			if time.time() > self.next_arp:
-				hostapd_command(self.hostapd_ctrl, "RESET_PN FF:FF:FF:FF:FF:FF")
+				# When testing if the replay counter of the group key is properly installed, always install
+				# a new group key. Otherwise KRACK patches might interfere with this test.
+				# Otherwise just reset the replay counter of the current group key.
+				if self.options.variant in [TestOptions.Fourway, TestOptions.Groupkey] and self.options.gtkinit:
+					hostapd_command(self.hostapd_ctrl, "RENEW_GTK")
+				else:
+					hostapd_command(self.hostapd_ctrl, "RESET_PN FF:FF:FF:FF:FF:FF")
 
 				self.next_arp = time.time() + HANDSHAKE_TRANSMIT_INTERVAL
 				for client in self.clients.values():