Bad password in WPA-PSK cannot be deteced in handshake?

Joshua Wright jwright at
Thu May 26 17:00:01 EDT 2005

The 802.11i specification indicates that the AP should silently 
discontinue the four-way handshake.  This makes it more difficult for an 
attacker to mount an online dictionary attack.


Beat Meier wrote:
> Is it not possible to detect a bad passwd in the Handshake of WPA-PSK?
> At the moment the wpa_supplicant always get through EAPOL stage 1 and 2 
> of handshake

-Joshua Wright
jwright at

fingerprint: FDA5 12FC F391 3740 E0AE BDB6 8FE2 FC0A D44B 4A73

Today I stumbled across the world's largest hotspot.  The SSID is "linksys".

More information about the HostAP mailing list