15 C
New York
Thursday, October 17, 2024

wi-fi – Getting purpose=2 when connecting to hostapd AP utilizing wpa_supplicant by way of EAP-MD5


am studying EAP-MD5 and attempting to interrupt it manually (like rfc says). However unable to get to the EAP negotiation. The supplicant is getting efficiently related to the AP however then its getting deauth simply after open authentication with purpose code 2. Logs from wpa_supplicant (sudo wpa_supplicant -i wlo1 -P wpa_md5.pid -c wpa_md5.conf)

wlo1: CTRL-EVENT-EAP-STARTED EAP authentication began
wlo1: CTRL-EVENT-SUBNET-STATUS-UPDATE standing=0
wlo1: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 methodology=4
wlo1: CTRL-EVENT-EAP-METHOD EAP vendor 0 methodology 4 (MD5) chosen
wlo1: CTRL-EVENT-EAP-SUCCESS EAP authentication accomplished efficiently
wlo1: CTRL-EVENT-DISCONNECTED bssid=42:f2:d5:36:72:f0 purpose=2
wlo1: Added BSSID 42:f2:d5:36:72:f0 into ignore listing, ignoring for 10 seconds
wlo1: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="MyEAP" auth_failures=1 period=10 purpose=CONN_FAILED
wlo1: CTRL-EVENT-SSID-REENABLED id=0 ssid="MyEAP"
wlo1: BSSID 42:f2:d5:36:72:f0 ignore listing rely incremented to 2, ignoring for 10 seconds
wlo1: Eliminated BSSID 42:f2:d5:36:72:f0 from ignore listing (clear)
wlo1: SME: Making an attempt to authenticate with 42:f2:d5:36:72:f0 (SSID='MyEAP' freq=2437 MHz)
wlo1: No community configuration discovered for the present AP
wlo1: CTRL-EVENT-DISCONNECTED bssid=5c:f9:fd:8b:f5:8d purpose=3 locally_generated=1
wlo1: Added BSSID 5c:f9:fd:8b:f5:8d into ignore listing, ignoring for 10 seconds
wlo1: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="MyEAP" auth_failures=2 period=27 purpose=CONN_FAILED

Logs from hostapd (sudo hostapd hostapd.conf)

wlpap: STA 0c:dd:24:41:19:9b IEEE 802.11: authenticated
wlpap: STA 0c:dd:24:41:19:9b IEEE 802.11: authenticated
wlpap: STA 0c:dd:24:41:19:9b IEEE 802.11: related (support 1)
wlpap: CTRL-EVENT-EAP-STARTED 0c:dd:24:41:19:9b
wlpap: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 methodology=1
wlpap: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 methodology=4
wlpap: CTRL-EVENT-EAP-SUCCESS 0c:dd:24:41:19:9b
wlpap: STA 0c:dd:24:41:19:9b IEEE 802.11: authenticated
wlpap: STA 0c:dd:24:41:19:9b IEEE 802.11: authenticated
wlpap: STA 0c:dd:24:41:19:9b IEEE 802.11: related (support 1)
wlpap: CTRL-EVENT-EAP-STARTED 0c:dd:24:41:19:9b
wlpap: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 methodology=1
wlpap: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 methodology=4
wlpap: CTRL-EVENT-EAP-SUCCESS 0c:dd:24:41:19:9b
wlpap: STA 0c:dd:24:41:19:9b IEEE 802.11: authenticated
wlpap: STA 0c:dd:24:41:19:9b IEEE 802.11: related (support 1)
wlpap: CTRL-EVENT-EAP-STARTED 0c:dd:24:41:19:9b
wlpap: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 methodology=1
wlpap: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 methodology=4
wlpap: CTRL-EVENT-EAP-SUCCESS 0c:dd:24:41:19:9b
wlpap: STA 0c:dd:24:41:19:9b IEEE 802.11: deauthenticated as a result of native deauth request
wlpap: STA 0c:dd:24:41:19:9b IEEE 802.11: authenticated
wlpap: STA 0c:dd:24:41:19:9b IEEE 802.11: related (support 1)
wlpap: CTRL-EVENT-EAP-STARTED 0c:dd:24:41:19:9b
wlpap: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 methodology=1
wlpap: CTRL-EVENT-EAP-PROPOSED-METHOD vendor=0 methodology=4
wlpap: CTRL-EVENT-EAP-SUCCESS 0c:dd:24:41:19:9b
wlpap: STA 0c:dd:24:41:19:9b IEEE 802.11: deauthenticated as a result of native deauth request

Contents of hostapd.conf

##### Hostapd associated configuration  ##############################################
interface=wlpap
driver=nl80211
logger_stdout=15
logger_stdout_level=2

##### IEEE 802.11 associated configuration #######################################
ssid=MyEAP
hw_mode=g
channel=6
beacon_int=50

##### IEEE 802.1X-2004 associated configuration ##################################
ieee8021x=1
eapol_version=2

##### Built-in EAP server ###################################################
eap_server=1
eap_user_file=/house/tbhaxor/eap/eap.person
eap_message=Welcome to MD5 Demo

##### WPA/IEEE 802.11i configuration ##########################################
wpa=2
wpa_key_mgmt=WPA-EAP
wpa_pairwise=CCMP TKIP
rsn_pairwise=CCMP TKIP

Contents of wpa_md5.conf

community={
        ssid="MyEAP"
        scan_ssid=1
        key_mgmt=WPA-EAP
        eap=MD5
        identification="user1"        # Match your EAP username
        password="password123"   # Match the corresponding password
}

Contents of eap.person

"user1" MD5 "password123"
"user2" MD5 "anotherpassword"

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles