Browse Source

krackattacks: remember some TODOs

Mathy Vanhoef 7 years ago
parent
commit
e4cfc5b016
1 changed files with 7 additions and 1 deletions
  1. 7 1
      krackattack/krack-test-client.py

+ 7 - 1
krackattack/krack-test-client.py

@@ -14,10 +14,16 @@ from libwifi import *
 import sys, socket, struct, time, subprocess, atexit, select, os.path
 from wpaspy import Ctrl
 
+# TODOs:
+# - Always mention 4-way handshake attack test (normal, tptk, tptk-rand)
+# - Stop testing a client even when we think it's patched?
+# - The --gtkinit with the 4-way handshake is very sensitive to packet loss
+
 # Futute work:
 # - If the client installs an all-zero key, we cannot reliably test the group key handshake
 # - Automatically execute all relevant tests in order
 # - Force client to request a new IP address when connecting
+# - More reliable group key reinstall test: install very high RSC, then install a zero one
 
 # After how many seconds a new message 3, or new group key message 1, is sent.
 HANDSHAKE_TRANSMIT_INTERVAL = 2
@@ -459,7 +465,7 @@ class KRAckAttackClient():
 					if self.options.variant == TestOptions.Fourway and self.options.gtkinit and client.vuln_bcast != ClientState.VULNERABLE:
 						# Execute a new handshake to test stations that don't accept a retransmitted message 3
 						hostapd_command(self.hostapd_ctrl, "RENEW_PTK " + client.mac)
-						# TODO: wait untill 4-way handshake completed?
+						# TODO: wait untill 4-way handshake completed? And detect failures (it's sensitive to frame losses)?
 					elif self.options.variant == TestOptions.Fourway and not self.options.gtkinit and client.vuln_4way != ClientState.VULNERABLE:
 						# First inject a message 1 if requested using the TPTK option
 						if self.options.tptk == TestOptions.TptkReplay: