am studying EAP-MD5 and attempting to interrupt it manually (like rfc says). However unable to get to the EAP negotiation. The supplicant is getting efficiently related to the AP however then its getting deauth simply after open authentication with purpose code 2. Logs from wpa_supplicant (sudo wpa_supplicant -i wlo1 -P wpa_md5.pid -c wpa_md5.conf
)
wlo1: CTRL-EVENT-EAP-STARTED EAP authentication began
wlo1: CTRL-EVENT-SUBNET-STATUS-UPDATE standing=0
wlo1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 methodology=4
wlo1: CTRL-EVENT-EAP-METHOD EAP vendor 0 methodology 4 (MD5) chosen
wlo1: CTRL-EVENT-EAP-SUCCESS EAP authentication accomplished efficiently
wlo1: CTRL-EVENT-DISCONNECTED bssid=42:f2:d5:36:72:f0 purpose=2
wlo1: Added BSSID 42:f2:d5:36:72:f0 into ignore listing, ignoring for 10 seconds
wlo1: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="MyEAP" auth_failures=1 period=10 purpose=CONN_FAILED
wlo1: CTRL-EVENT-SSID-REENABLED id=0 ssid="MyEAP"
wlo1: BSSID 42:f2:d5:36:72:f0 ignore listing rely incremented to 2, ignoring for 10 seconds
wlo1: Eliminated BSSID 42:f2:d5:36:72:f0 from ignore listing (clear)
wlo1: SME: Making an attempt to authenticate with 42:f2:d5:36:72:f0 (SSID='MyEAP' freq=2437 MHz)
wlo1: No community configuration discovered for the present AP
wlo1: CTRL-EVENT-DISCONNECTED bssid=5c:f9:fd:8b:f5:8d purpose=3 locally_generated=1
wlo1: Added BSSID 5c:f9:fd:8b:f5:8d into ignore listing, ignoring for 10 seconds
wlo1: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="MyEAP" auth_failures=2 period=27 purpose=CONN_FAILED
Logs from hostapd (sudo hostapd hostapd.conf
)
wlpap: STA 0c:dd:24:41:19:9b IEEE 802.11: authenticated
wlpap: STA 0c:dd:24:41:19:9b IEEE 802.11: authenticated
wlpap: STA 0c:dd:24:41:19:9b IEEE 802.11: related (support 1)
wlpap: CTRL-EVENT-EAP-STARTED 0c:dd:24:41:19:9b
wlpap: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 methodology=1
wlpap: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 methodology=4
wlpap: CTRL-EVENT-EAP-SUCCESS 0c:dd:24:41:19:9b
wlpap: STA 0c:dd:24:41:19:9b IEEE 802.11: authenticated
wlpap: STA 0c:dd:24:41:19:9b IEEE 802.11: authenticated
wlpap: STA 0c:dd:24:41:19:9b IEEE 802.11: related (support 1)
wlpap: CTRL-EVENT-EAP-STARTED 0c:dd:24:41:19:9b
wlpap: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 methodology=1
wlpap: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 methodology=4
wlpap: CTRL-EVENT-EAP-SUCCESS 0c:dd:24:41:19:9b
wlpap: STA 0c:dd:24:41:19:9b IEEE 802.11: authenticated
wlpap: STA 0c:dd:24:41:19:9b IEEE 802.11: related (support 1)
wlpap: CTRL-EVENT-EAP-STARTED 0c:dd:24:41:19:9b
wlpap: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 methodology=1
wlpap: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 methodology=4
wlpap: CTRL-EVENT-EAP-SUCCESS 0c:dd:24:41:19:9b
wlpap: STA 0c:dd:24:41:19:9b IEEE 802.11: deauthenticated as a result of native deauth request
wlpap: STA 0c:dd:24:41:19:9b IEEE 802.11: authenticated
wlpap: STA 0c:dd:24:41:19:9b IEEE 802.11: related (support 1)
wlpap: CTRL-EVENT-EAP-STARTED 0c:dd:24:41:19:9b
wlpap: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 methodology=1
wlpap: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 methodology=4
wlpap: CTRL-EVENT-EAP-SUCCESS 0c:dd:24:41:19:9b
wlpap: STA 0c:dd:24:41:19:9b IEEE 802.11: deauthenticated as a result of native deauth request
Contents of hostapd.conf
##### Hostapd associated configuration ##############################################
interface=wlpap
driver=nl80211
logger_stdout=15
logger_stdout_level=2
##### IEEE 802.11 associated configuration #######################################
ssid=MyEAP
hw_mode=g
channel=6
beacon_int=50
##### IEEE 802.1X-2004 associated configuration ##################################
ieee8021x=1
eapol_version=2
##### Built-in EAP server ###################################################
eap_server=1
eap_user_file=/house/tbhaxor/eap/eap.person
eap_message=Welcome to MD5 Demo
##### WPA/IEEE 802.11i configuration ##########################################
wpa=2
wpa_key_mgmt=WPA-EAP
wpa_pairwise=CCMP TKIP
rsn_pairwise=CCMP TKIP
Contents of wpa_md5.conf
community={
ssid="MyEAP"
scan_ssid=1
key_mgmt=WPA-EAP
eap=MD5
identification="user1" # Match your EAP username
password="password123" # Match the corresponding password
}
Contents of eap.person
"user1" MD5 "password123"
"user2" MD5 "anotherpassword"