Bad password in WPA-PSK cannot be deteced in handshake?
Joshua Wright
jwright
Thu May 26 14:00:01 PDT 2005
The 802.11i specification indicates that the AP should silently
discontinue the four-way handshake. This makes it more difficult for an
attacker to mount an online dictionary attack.
-Josh
Beat Meier wrote:
> Is it not possible to detect a bad passwd in the Handshake of WPA-PSK?
> At the moment the wpa_supplicant always get through EAPOL stage 1 and 2
> of handshake
--
-Joshua Wright
jwright at hasborg.com
http://home.jwu.edu/jwright/
pgpkey: http://home.jwu.edu/jwright/pgpkey.htm
fingerprint: FDA5 12FC F391 3740 E0AE BDB6 8FE2 FC0A D44B 4A73
Today I stumbled across the world's largest hotspot. The SSID is "linksys".
More information about the Hostap
mailing list