802.11 Management Frames Darrell Curry Travis Howard Wireless Networks 4/30/07 Table of Contents 1. Types ............................................................................................................................... 3 1.1. Authentication frame ............................................................................................... 3 1.2. Deauthentication frame ............................................................................................ 3 1.3. Association request frame ........................................................................................ 3 1.4. Association response frame ..................................................................................... 3 1.5. Disassociation frame ................................................................................................ 3 1.6. Reassociation request frame .................................................................................... 3 1.7. Reassociation response frame .................................................................................. 3 2. Traces .............................................................................................................................. 4 2.1. MAC Addresses ....................................................................................................... 4 2.2. Trace 1 – Powering off the router ............................................................................ 4 2.3. Trace 2 – Connecting and Disconnecting from router ............................................. 6 2.4. Trace 3 - Connecting and Disconnecting (Different laptop) .................................. 7 2.5. Trace 4 - Reassociation ............................................................................................ 7 2.6. Trace 5 - Deauthentication Attack ........................................................................... 8 2.7. Trace 6 – MAC Filtering.......................................................................................... 9 2.8. Trace 7 – WEP ......................................................................................................... 9 1. Types of frames 1.1. Authentication frame In 802.11, authentication is the process of an access point accepting the identity of a radio interface card. The process begins by the radio sending an authentication frame to the access point and then the access point sending an authentication frame indicating an acceptance or rejection. 1.2. Deauthentication frame A deauthentication frame is sent by a station to another station when it wishes to terminate communications. 1.3. Association request frame Association allows the AP to reserve resources for a particular wireless interface. A wireless station begins by sending an association request from to an AP. This frame contains the SSID that the station wants to associate with and information about the wireless interface card. 1.4. Association response frame An access point sends an association response frame when it receives an association request frame from another station. This response frame contains if it accepts or rejects the association. The frame also contains information regarding the association. Such as the association ID and supported data rates. 1.5. Disassociation frame A station sends a disassociation frame when it wishes to end the association. This allows the AP to free resources that it allocated to the station. 1.6. Reassociation request frame A station sends a reassociation frame when the signal strength of the currently associated AP is low and there is a higher strength signal from another AP. The station will send a reassociation request to the new AP. 1.7. Reassociation response frame An AP sends an acceptance or rejection to the station sending the reassociation request. This frame also contains information about the AP. 2. Traces 2.1. MAC Addresses Cisco-Li_c5:5d:3e - Access Point 1 Buffalo_4a:0e:89 - Access Point 2 Cisco-Li_a9:8e:b8 - Station 1 IntelCor_bd:2b:a0 - Station 2 00:1a:70:35:9d:0b - Station 3 IntelC0r_56:92:64 - Station 4 2.2. Trace 1 – Powering off the router Figure 1 - Trace 1 In this first trace, we try to connect to the router through the AP. This produces authentication frames show in packet 1 and 2. Once the data is authenticated, an association request is sent to the router. Once the router accepts the request, a response packet is sent as shown in packet 4. At this time there is a full connection and data can be sent wirelessly. During the authentication frame, we can tell whether the system is using an open algorithm, requiring WEP authorization, etc. as shown in the figure below. Figure 2 - Authentication Frame Figure 3 - Association Response Frame As shown in the figure above, once the association response has been sent and there is a wireless connection established, we can see various information from the association response such as ESS capabilities, whether the AP or station can support WEP etc. Also, we can see the supported transfer rates of the network by looking at the association request or response. At this time, we disconnected the router’s power adapter to see what management frames we would see as a result. Deauthentication occurred as shown in packet 5 and 6 of our experiment. We reconnected the power adapter and tried to connect all over again. We did the experiment completely again, as shown in packets 7-14 with the same results. 2.3. Trace 2 – Connecting and Disconnecting from router Figure 4 - Trace 2 In this trace, we try to connect to the router through the AP just as we did with the first trace. This produces authentication frames show in packet 1 and 2. After the data is authenticated, an association request is sent to the router just as with our first trace. Once we saw our association response in Wireshark, we started our next experiment. This time, instead of powering down the router by pulling out the power cable, we just decided to disconnect from the network through Windows Wireless Network Connection. This was accessed by double-clicking on the network connection icon in the system tray and clicking on the button “View Wireless Connections”. The result of our experiment was the same as the first trace. We got a deauthentication frame at packet 5, as shown above. This was surprising to us, as we were expecting at least some difference. By manually disconnecting the connection, we thought we could have gotten a disassociation frame, because a station sends this when it wants to disconnect from an access point. We did the experiment a second time with the same results. 2.4. Trace 3 - Connecting and Disconnecting (Different laptop) Figure 5 - Trace 3 For our third experiment, we retried our second experiment from another laptop. We went through the entire process of authentication and association. This time, when we manually disconnected from the AP, we got a disassociation frame on packet 7 as opposed to a deauthentication frame. We believe that the difference here might just be the fact that some equipment does not support certain management frames. 2.5. Trace 4 - Reassociation To attempt to obtain reassociation packets, access points 1 and 2 and station 3 was used. Station 3 was initially associated to AP 2 and AP 1 was next in the list of preferred networks. AP 2 was set to the lowest output power and its antenna was removed. Then it was placed in a metal filing cabinet, this caused the signal strength to become low and station 3 associated with AP 1. In packets 1-4 station 3 is establishing its initial connection to AP 2. After packet 4 AP 2 is placed in the filing cabinet. In Packet 5-8 it tries to associate to AP 2 even though the signal strength is low. In packets 9-13 it associates to AP 1 and then in packet 14 station 3 dissassociates from AP 2. Station 3 never sent an actual reassociation request to AP 1, this test was performed multiple times and each time station 3 just sent regular association requests to AP 1 and not reassociation requests. 2.6. Trace 5 - Deauthentication Attack In this trace Aireplay was used to conduct a deauthentication attack by injecting deauthentication packets into the air. The packets look like they are coming from the AP that the station is associated with and thinks it has to reassociate. Figure 6 - Trace 5 In Figure 6, you can see that packets 1-4 establish the initial association to the AP. Packets 5-28 are the forged deauthentication packets produced by Aireplay. After the deauthentication packets the station tries to reestablish a connection to the AP. Once it associates to the AP again more deauthentication packets are sent and it will have to associate again. As shown in the above trace, the station does not send a reassociation request instead it just sends an association request. This shows that not all hardware follows the specifications. 2.7. Trace 6 – MAC Filtering Figure 7 - Trace 6 MAC filtering allows an AP to only allow connection from certain MAC addresses. In this experiment Station 1’s Mac address was put in the allow list. In packet 1-4 Station 1 associates to the AP. Then in packet 5, station 2 sends an authentication request. In packet 6 the AP responds back to the station 2 denying authentication with an unspecified failure. 2.8. Trace 7 – WEP Figure 8 - Trace 7 In this experiment 64-bit WEP encryption was set up on the AP. Station 1 was set up to connect to the AP with an invalid key. From the packets in the above figure packet 2 shows that even with an invalid key it still successfully authenticates with the AP. It also successfully associates with the AP, but once it does it can’t do anything because it encrypts its data with the wrong key so it can’t get an IP address.