Unable to connect to AP via WPA-PKS/CCMP

Bryan Kadzban bryan
Sun Oct 9 20:05:23 PDT 2005

Thomas Heinz wrote:
> There is one more issue, I would like to know. Do the log files or 
> `hostap_diag -a wlan0` reveal any information that makes breaking the
>  encryption easier compared to sniffing the packets? I noticed
> several "[REMOVED]" tags in the logs so I guess it is at least not
> obvious.

Not sure about hostap_diag, but yes, the [REMOVED] tags in the logs are
probably there because those logs would otherwise contain the pairwise
and group keys being used by your clients.  The pairwise key may not be
a huge deal to post to a list (it'll hopefully be changed by the time
anyone reading the list would get a chance to use it, and it's only good
for one particular client MAC address anyway), but it's probably still
not a good idea.  The group key is definitely not a good thing to post
to a list, because (depending on your AP) it may never be changed.  I
don't know what hostap's policy is with that.

Those keys are all encrypted during the 4-way handshake, using part of
the PSK.  So this would also be more information than what's available
from a packet sniff, yes.  (Unless AES gets broken.)
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 256 bytes
Desc: OpenPGP digital signature
Url : http://lists.shmoo.com/pipermail/hostap/attachments/20051009/f640d56d/attachment.pgp 

More information about the Hostap mailing list