This thread has been locked.

If you have a related question, please click the "Ask a related question" button in the top right corner. The newly created question will be automatically linked to this question.

Linux/WL1831MOD: WIFI certification WTS cases test SVD-5.2.3 and SVD-5.3.1 still fail after address the WPA2 vulnerability security issue(KRACK)

Part Number: WL1831MOD

Tool/software: Linux

HI

we update the wl18xx driver to version R8.7_SP3 which contains an update to address the WPA2 vulnerability security issue(KRACK), but the WTS SVD-5.2.3 and SVD-5.3.1 test case still fail, following is detail message:

wl18xx driver:

[17:17:22]wlcore: wl18xx HW: 183x or 180x, PG 2.2 (ROM 0x11)
[17:17:22]wlcore: loaded
[17:17:22]wlcore: driver version: R8.7_SP3-dirty

wpa_supplicant:

wpa_supplicant -v

wpa_supplicant v2.6-devel-R8.7_SP3

Copyright (c) 2003-2016, Jouni Malinen <j@w1.fi> and contributors

WTS SVD-5.2.3 and SVD 5.3.1 test scenario description:

5.2.3:the SVD shouldn’t detected the STAUT accepting replayed group addressed frames while AP transmited Broadcast ARP Request frames.

Test procedures:

5.3.1:

Test procedures:

Both of them fail at STAUT accepting replayed group addressed frames, the attached contains driver console and sniffer log i think they are useful for you and if you need more information please let me know.

driver.zip

console.zip

sniffer.zip

  • Hi Clark,
    Yes, R8.7_SP3 release consists of KRACK fix. Questions :
    - can you pls explain why driver version has "dirty" appended to it "wlcore: driver version: R8.7_SP3-dirty" . This would normally happen if you change driver source code
    - pls confirm WiLink8 firmware version running on your device. it should be in the order of 8.9.x.x.x

    Saurabh
  • Hi Saurabh,
    Thank you for reply!
    We resolved this issue, the test item PASS after check the R8.7_SP3 update once again.
    Thank you all the same!

    Clark