Wireshark-bugs: [Wireshark-bugs] [Bug 4183] New: Wireshark can't decrypt WPA(2)-PSK when passphr
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4183
Summary: Wireshark can't decrypt WPA(2)-PSK when passphrase is 63
bytes
Product: Wireshark
Version: 1.2.3
Platform: Other
OS/Version: Windows XP
Status: NEW
Severity: Normal
Priority: Low
Component: Wireshark
AssignedTo: wireshark-bugs@xxxxxxxxxxxxx
ReportedBy: hectoraka@xxxxxxxxx
Build Information:
Version 1.2.3 (SVN Rev 30730)
Compiled with GTK+ 2.16.2, with GLib 2.20.3, with WinPcap (version unknown),
with libz 1.2.3, without POSIX capabilities, with libpcre 7.0, with SMI 0.4.8,
with c-ares 1.6.0, with Lua 5.1, with GnuTLS 2.8.1, with Gcrypt 1.4.4, with MIT
Kerberos, with GeoIP, with PortAudio V19-devel (built Oct 27 2009), with
AirPcap.
Running on Windows XP Service Pack 3, build 2600, with WinPcap version 4.1.1
(packet.dll version 4.1.0.1753), based on libpcap version 1.0 branch 1_0_rel0b
(20091008), GnuTLS 2.8.1, Gcrypt 1.4.4, with AirPcap 4.1.0 build 1622.
Built using Microsoft Visual C++ 9.0 build 30729
--
Wireshark can't decrypt WPA(2)-PSK when passphrase is 63 bytes.
Enclosed file:
wpa2-aes pass_63 cant_decode fil.pcap
SSID is WPATEST
passphrase is 123456789012345678901234567890123456789012345678901234567890123
Decryption mode is set to: wireshark
Data captured using airpcap
Note: I noticed that wireshark could decrypt a 62-byte passphrase encrypted
capture data even when the passphrase value entered in wireshark's decryption
keys window was the 63-byte value above (the 62-byte passphrase I used for
encryption was the above passphrase minus the last character. Could the bug be
due to some kind of truncation error in the user interface ?)
--
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.