Browse Source

README.md: clarify Wi-Fi Alliance tests section

vanhoefm 7 years ago
parent
commit
bcd1970b8d
1 changed files with 11 additions and 7 deletions
  1. 11 7
      README.md

+ 11 - 7
README.md

@@ -34,13 +34,17 @@ So concretely, we recommend running the following tests:
 
 ## Correspondence to Wi-Fi Alliance tests
 
-- 4.1.1: Plaintext retransmission of EAPOL Message 3. We currently do not support this test.
-- 4.1.2: Immediate retransmission of EAPOL M3 in plaintext. We currently do not suppor this test.
-- 4.1.3: Immediate retransmission of encrypted EAPOL M3 during pairwise rekey handshake. This corresponds to `./krack-test-client.py` except that encrypted EAPOL M3 are sent periodically instead of immediately.
-- 4.1.5: PTK reinstallation in 4-way handshake when STA uses Temporal PTK construction (same ANonce). Execue this test using `./krack-test-client.py --tptk`.
-- 4.1.6: PTK reinstallation in 4-way handshake when STA uses Temporal PTK construction (random ANonce). Execue this test using `./krack-test-client.py --tptk-rand`.
-- 4.2.1: Group key handshake vulnerability test on STA. Execue this test using `./krack-test-client.py --group`.
-- 4.3.1: Reinstallation of GTK and IGTK on STA supporting WNM sleep mode. We currently do not support this test (and neither does the Wi-Fi Alliance).
+The [Wi-Fi Alliance created a custom vulnerability detection tool](https://www.wi-fi.org/security-update-october-2017) based on our scripts.
+At the time of writing, this tool is only accessible to Wi-Fi Alliance members.
+Their tools supports several different tests, and these tests correspond to the functionality in our script as follows:
+
+- 4.1.1 (Plaintext retransmission of EAPOL Message 3). We currently do not support this test.
+- 4.1.2 (Immediate retransmission of EAPOL M3 in plaintext). We currently do not suppor this test.
+- 4.1.3 (Immediate retransmission of encrypted EAPOL M3 during pairwise rekey handshake). This corresponds to `./krack-test-client.py` except that encrypted EAPOL M3 are sent periodically instead of immediately.
+- 4.1.5 (PTK reinstallation in 4-way handshake when STA uses Temporal PTK construction, same ANonce). Execue this test using `./krack-test-client.py --tptk`.
+- 4.1.6 (PTK reinstallation in 4-way handshake when STA uses Temporal PTK construction, random ANonce). Execue this test using `./krack-test-client.py --tptk-rand`.
+- 4.2.1 (Group key handshake vulnerability test on STA). Execue this test using `./krack-test-client.py --group`.
+- 4.3.1 (Reinstallation of GTK and IGTK on STA supporting WNM sleep mode). We currently do not support this test (and neither does the Wi-Fi Alliance).
 
 # Testing Access Points: Detecting a vulnerable FT Handshake (802.11r)