Bad password in WPA-PSK cannot be deteced in handshake?

Joshua Wright jwright at hasborg.com
Thu May 26 17:00:01 EDT 2005


The 802.11i specification indicates that the AP should silently 
discontinue the four-way handshake.  This makes it more difficult for an 
attacker to mount an online dictionary attack.

-Josh

Beat Meier wrote:
> Is it not possible to detect a bad passwd in the Handshake of WPA-PSK?
> At the moment the wpa_supplicant always get through EAPOL stage 1 and 2 
> of handshake

-- 
-Joshua Wright
jwright at hasborg.com
http://home.jwu.edu/jwright/

pgpkey: http://home.jwu.edu/jwright/pgpkey.htm
fingerprint: FDA5 12FC F391 3740 E0AE BDB6 8FE2 FC0A D44B 4A73

Today I stumbled across the world's largest hotspot.  The SSID is "linksys".



More information about the HostAP mailing list