Not remove interface when wpa_supplicant shuts down
Tue Jun 15 15:13:03 PDT 2010
On Mon, 2010-06-14 at 01:17 +0100, Panagiotis Georgopoulos wrote:
> Well, am I not correct in thinking though, that getting another
> device to sniff packets (get a wifi card to monitor in promiscuous mode) is
> counter with the end goal of securing and authenticating a client
> successfully? I guess that the new device will not be able to see *all* the
> packets as the AP sees them, and more specifically not see their content
> unencrypted. Unless you suggest to remove security as much possible for the
> sake of debugging, but in the end that is what I want to debug... am I
> missing something obvious in your suggestion?
I think you have unrealistic expectations. I don't think there is a
universal way to get all traffic (not just data frames) in unencrypted
form from one interface.
You'll get encrypted data on the air, but you'll still have some
information, such as the frame types and timings, which may be useful
There are command line tools for decryption, such as the openssl binary
that comes with OpenSSL. You should be able to decrypt the traffic.
Alternatively, you can dump the specific packets by changing the code of
hostapd or the kernel.
More information about the Hostap