Hello all-
Just found some stuff on EAPOL attacks... I don't use EAPOL on my wireless adapter, but the computer that is having problems is in the DMZ of my router (Running Sygate Personal Firewall). I do this to allow web hosting and some other remote access solutions from home. Even though I don't use EAPOL to authenticate, is it possible someone is trying to gain access by spoofing as "me" and trying to hijack my session on the router? Then in turn I am being kicked off until rebooting?
PLEASE anyone- if you can help that would be so great.
EAPOL Start Attack
WiFi Manager raises this alarm when it sees a wireless client sending too many EAPOL start packets.
What is EAP ?
EAP stands for Extensible Authentication Protocol. It is a general protocol for authentication more commonly used in wireless networks and Point-to-Point connections. It supports multiple authentication methods such as EAP-MD5, EAP-TLS, EAP-SIM, EAP-TTLS, LEAP, PEAP.
What is this EAPOL Attack ?
EAP authentication starts with a EAPOL-start frame, which is sent by the wireless client to the Access point. Upon reception of such a frame the Access point responds back to the wireless client with an EAP-Identify-Request and also does some internal resource allocation. Attackers use this vulnerability, they send a lot of EAPOL-start frame to the Access point either by spoofing the MAC address or by emulating wireless clients, forcing the Access point to allocate more and more resource and there by bringing it down
EAPOL-Logoff Attack
WiFi Manager raises this alarm when it sees a wireless client sending too many EAPOL Logoff packets.
What is EAP ?
EAP stands for Extensible Authentication Protocol. It is a general protocol for authentication more commonly used in wireless networks and Point-to-Point connections. It supports multiple authentication methods such as EAP-MD5, EAP-TLS, EAP-SIM, EAP-TTLS, LEAP, PEAP.
EAPOL LOGOFF attack
Attacker spoofs a 802.1x EAPOL-Logoff frame
from the legitimate client station to fool the AP in logging off the client
What is this EAPOL Logoff Attack ?
Wireless clients using EAP authentication to connect to the wireless LAN, terminates their authenticated session by sending an EAPOL Logoff frame. This frame sent by the wireless client is not authenticated. Attackers use this vulnerability. They spoof this frame and send it to the Access point by having the source MAC to that of the wireless client, thus knocking the wireless client off the WLAN. Typically the wireless clients will try to re-establish the association, but the session will be short lived as the attacker will be sending this EAPOL Logoff frame continuously.