Browse Source

README: tests to run and comparison with wifi alliance

Mathy Vanhoef 7 years ago
parent
commit
2596112d9c
1 changed files with 17 additions and 1 deletions
  1. 17 1
      README.md

+ 17 - 1
README.md

@@ -24,7 +24,23 @@ To simulate an attack against a client follow the detailed instructions in `krac
 
 **Now follow the detail instructions that the script outputs.**
 The script assumes the client will use DHCP to get an IP.
-Remember to also perform extra tests using the `--tptk` and `--tptk-rand` parameters.
+Remember to also perform extra tests using the `--tptk` and `--tptk-rand` parameters, and using `--group` to test the group key handshake.
+So concretely, we recommend running the following tests:
+
+1. `./krack-test-client.py`
+2. `./krack-test-client.py --tptk`
+3. `./krack-test-client.py --tptk-rand`
+4. `./krack-test-client.py --group`
+
+## Correspondence to Wi-Fi Alliance tests
+
+- 4.1.1: Plaintext retransmission of EAPOL Message 3. We currently do not support this test.
+- 4.1.2: Immediate retransmission of EAPOL M3 in plaintext. We currently do not suppor this test.
+- 4.1.3: Immediate retransmission of encrypted EAPOL M3 during pairwise rekey handshake. This corresponds to `./krack-test-client.py` except that encrypted EAPOL M3 are sent periodically instead of immediately.
+- 4.1.5: PTK reinstallation in 4-way handshake when STA uses Temporal PTK construction (same ANonce). Execue this test using `./krack-test-client.py --tptk`.
+- 4.1.6: PTK reinstallation in 4-way handshake when STA uses Temporal PTK construction (random ANonce). Execue this test using `./krack-test-client.py --tptk-rand`.
+- 4.2.1: Group key handshake vulnerability test on STA. Execue this test using `./krack-test-client.py --group`.
+- 4.3.1: Reinstallation of GTK and IGTK on STA supporting WNM sleep mode. We currently do not support this test (and neither does the Wi-Fi Alliance).
 
 # Testing Access Points: Detecting a vulnerable FT Handshake (802.11r)