Conformance Test Results Report



Application Id 106 008
Time 1 634 885 695
Execution Batch Id 799 366 815 579 218
24GChannelPreferred 6
5GChannelPreferred 36
6GBandSupport False
6GChannelPreferred 37
DebugLogLevel DISABLE
bandSelection 2.4GHz
dataPacketType ICMP
indigoApiRetryCount 1
manualDutMode True
packetCount 10
packetPayloadSize 1000
packetTimeInterval 1
ssid Indigo_
ssidEpochTime 1633684464
toolMode Certification

softwareVersion 1.1.1.458
validatorBuildVersion 0.27.1-feature-157
validatorServiceVersion 23
24GChannelAlternate 1
phyCapabilities []
role Station
dfsChannels 52
triggerBroadcastProtectedDisconnectFromGui false
wifiEnhancedOpenSupportedDhGroups [19]
triggerUnicastProtectedDisconnectFromGui true
wpa3SupportedDhGroups [19]
countryCodeTool [US]
5GChannelAlternate 44
additionalCapabilities []
securityCapabilities []
productModel
wifiChipset
vendorId
wifiDriverVersion
wifiChipsetFirwareVersion
vendorName
productFirmwareVersion
productOs
productUnitId

Security and Hash validation Errors
Valid

Certification Result
Final Result: FAIL

Passed 0
Failed 1
Validator error 0
Not applicable 0
Incomplete 0

Certification Details
Certification Id
1,643
Version
2017-10: 2021-05-18
Description

Capabilities


Certification Details
Certification Id
1,533
Version
2021-05-18
Description
Test Details
Test Group Details
Test Group Name
Test Group: Default
Condition
Always
Test Details
CT_Security_WPA2Personal_STA_4wayHandshakeVulnerability-RandomANonce_10005_1
NOT_TESTED
Test Id
141
Description
This test verifies that the STAUT is not vulnerable to PTK key reinstallation during the 4-way handshake using a random ANonce when the AP uses Temporal PTK construction.
CT_Security_WPA2Personal_STA_4wayHandshakeVulnerability-SameANonce_10006_1
NOT_TESTED
Test Id
144
Description
This test determines if the STAUT is vulnerable to PTK key reinstallation during the 4-way handshake using the same ANonce when the STA uses Temporal PTK (TPTK) construction.
CT_Security_WPA2Personal_STA_ReplayProtection_10249_1
NOT_TESTED
Test Id
267
Description
This test verifies that the STAUT correctly performs replay protection on group addressed frames
CT_Security_WPA2Personal_STA_GroupKeyHandshakeVulnerability_10138_1
NOT_TESTED
Test Id
266
Description
This test verifies that the STAUT is not vulnerable to GTK key reinstallation.
CT_Security_WPA2Personal_STA_4wayHandshakeVulnerability-EncryptedM3Retransmission_10002_1
FAIL
Test Id
161
Description
This test verifies that the STAUT is not vulnerable to PTK and GTK key reinstallation using immediate retransmission of an encrypted EAPOL M3 message during the pairwise rekey handshake

Test Measurement:
Name
IS_CONNECTED_1
Value
true
Result
PASS
Description
STAUT connection status with the AP

Name
IS_CONNECTED_2
Value
true
Result
PASS
Description
STAUT connection status with the AP

Name
IS_CONNECTED_3
Value
true
Result
PASS
Description
STAUT connection status with the AP

Name
DATA_PACKET_RECEIVED_1
Value
0.99
Result
PASS
Description
The percentage of Data packets received from the STAUT for iteration 1

Name
DATA_PACKET_RECEIVED_2
Value
0.99
Result
PASS
Description
The percentage of Data packets received from the STAUT for iteration 2

Name
DATA_PACKET_RECEIVED_3
Value
0.98
Result
PASS
Description
The percentage of Data packets received from the STAUT for iteration 3

Name
ARP_RECEIVED_PreM3_1
Value
1.0
Result
PASS
Description
The percentage of ARP packets received by the AP for iteration 1 before sending M3 and reset PN

Name
ARP_RECEIVED_PreM3_2
Value
1.0
Result
PASS
Description
The percentage of ARP packets received by the AP for iteration 2 before sending M3 and reset PN

Name
ARP_RECEIVED_PreM3_3
Value
1.0
Result
PASS
Description
The percentage of ARP packets received by the AP for iteration 3 before sending M3 and reset PN

Name
ARP_RECEIVED_PostM3_1
Value
1.0
Result
FAIL
Description
The percentage of ARP packets received by the AP for iteration 1 after sending M3 and reset PN

Name
ARP_RECEIVED_PostM3_2
Value
1.0
Result
FAIL
Description
The percentage of ARP packets received by the AP for iteration 2 after sending M3 and reset PN

Name
ARP_RECEIVED_PostM3_3
Value
1.0
Result
FAIL
Description
The percentage of ARP packets received by the AP for iteration 3 after sending M3 and reset PN

CT_Security_WPA2Personal_STA_4wayHandshakeVulnerability-ImmediateM3Retransmission_10003_1
NOT_TESTED
Test Id
162
Description
This test verifies that the STAUT is not vulnerable to PTK key re-installation using immediate re-transmission of an EAPOL Message 3 in plain-text.