IBSS RSN: Add peer restart detection

To better support the IBSS/RSN mechanism, wpa_supplicant has to be able
to detect a possible peer reboot and in this case it should start a new
EAPOL handshake.

To perform such reboot detection wpa_supplicant has to perform an Open
Authentication by sending an Authentication frame and then replying to
it. IF an Authentication frame is received when the key have already
been exchanged, wpa_supplicant understands that the peer has rebooted
and can reset its state machine.

Whenever a new peer is added to the IBSS wpa_supplicant will start the
Open Authentication and only after having accomplished it will start the
key exchange. If the driver does not support Authentication frame
exchange initiated from user space, this step is skipped to maintain
previous behavior (just go through EAPOL-Key frame processing).

The Open Authentication was partly supported by the Linux kernel but now
wpa_supplicant can register for Authentication frames, handle it in
userspace and so avoid any possible race condition.

Signed-hostap: Nicolas Cavallari <cavallar@lri.fr>
Signed-hostap: Antonio Quartulli <antonio@open-mesh.com>
This commit is contained in:
Antonio Quartulli 2013-07-21 15:56:53 +03:00 committed by Jouni Malinen
parent b21990b4bb
commit 13adc57b39
3 changed files with 253 additions and 25 deletions

View file

@ -2330,6 +2330,23 @@ static void wpa_supplicant_event_ibss_rsn_start(struct wpa_supplicant *wpa_s,
ibss_rsn_start(wpa_s->ibss_rsn, data->ibss_rsn_start.peer); ibss_rsn_start(wpa_s->ibss_rsn, data->ibss_rsn_start.peer);
} }
static void wpa_supplicant_event_ibss_auth(struct wpa_supplicant *wpa_s,
union wpa_event_data *data)
{
struct wpa_ssid *ssid = wpa_s->current_ssid;
if (ssid == NULL)
return;
/* check if the ssid is correctly configured as IBSS/RSN */
if (ssid->mode != WPAS_MODE_IBSS || !wpa_key_mgmt_wpa(ssid->key_mgmt))
return;
ibss_rsn_handle_auth(wpa_s->ibss_rsn, data->rx_mgmt.frame,
data->rx_mgmt.frame_len);
}
#endif /* CONFIG_IBSS_RSN */ #endif /* CONFIG_IBSS_RSN */
@ -2724,6 +2741,8 @@ void wpa_supplicant_event(void *ctx, enum wpa_event_type event,
data->ch_switch.ch_offset); data->ch_switch.ch_offset);
#endif /* CONFIG_AP */ #endif /* CONFIG_AP */
break; break;
#endif /* CONFIG_AP */
#if defined(CONFIG_AP) || defined(CONFIG_IBSS_RSN)
case EVENT_RX_MGMT: { case EVENT_RX_MGMT: {
u16 fc, stype; u16 fc, stype;
const struct ieee80211_mgmt *mgmt; const struct ieee80211_mgmt *mgmt;
@ -2733,7 +2752,9 @@ void wpa_supplicant_event(void *ctx, enum wpa_event_type event,
fc = le_to_host16(mgmt->frame_control); fc = le_to_host16(mgmt->frame_control);
stype = WLAN_FC_GET_STYPE(fc); stype = WLAN_FC_GET_STYPE(fc);
#ifdef CONFIG_AP
if (wpa_s->ap_iface == NULL) { if (wpa_s->ap_iface == NULL) {
#endif /* CONFIG_AP */
#ifdef CONFIG_P2P #ifdef CONFIG_P2P
if (stype == WLAN_FC_STYPE_PROBE_REQ && if (stype == WLAN_FC_STYPE_PROBE_REQ &&
data->rx_mgmt.frame_len > 24) { data->rx_mgmt.frame_len > 24) {
@ -2749,9 +2770,17 @@ void wpa_supplicant_event(void *ctx, enum wpa_event_type event,
break; break;
} }
#endif /* CONFIG_P2P */ #endif /* CONFIG_P2P */
#ifdef CONFIG_IBSS_RSN
if (stype == WLAN_FC_STYPE_AUTH &&
data->rx_mgmt.frame_len >= 30) {
wpa_supplicant_event_ibss_auth(wpa_s, data);
break;
}
#endif /* CONFIG_IBSS_RSN */
wpa_dbg(wpa_s, MSG_DEBUG, "AP: ignore received " wpa_dbg(wpa_s, MSG_DEBUG, "AP: ignore received "
"management frame in non-AP mode"); "management frame in non-AP mode");
break; break;
#ifdef CONFIG_AP
} }
if (stype == WLAN_FC_STYPE_PROBE_REQ && if (stype == WLAN_FC_STYPE_PROBE_REQ &&
@ -2767,9 +2796,10 @@ void wpa_supplicant_event(void *ctx, enum wpa_event_type event,
} }
ap_mgmt_rx(wpa_s, &data->rx_mgmt); ap_mgmt_rx(wpa_s, &data->rx_mgmt);
#endif /* CONFIG_AP */
break; break;
} }
#endif /* CONFIG_AP */ #endif /* CONFIG_AP || CONFIG_IBSS_RSN */
case EVENT_RX_ACTION: case EVENT_RX_ACTION:
wpa_dbg(wpa_s, MSG_DEBUG, "Received Action frame: SA=" MACSTR wpa_dbg(wpa_s, MSG_DEBUG, "Received Action frame: SA=" MACSTR
" Category=%u DataLen=%d freq=%d MHz", " Category=%u DataLen=%d freq=%d MHz",

View file

@ -15,6 +15,7 @@
#include "ap/wpa_auth.h" #include "ap/wpa_auth.h"
#include "wpa_supplicant_i.h" #include "wpa_supplicant_i.h"
#include "driver_i.h" #include "driver_i.h"
#include "common/ieee802_11_defs.h"
#include "ibss_rsn.h" #include "ibss_rsn.h"
@ -438,45 +439,132 @@ static int ibss_rsn_auth_init(struct ibss_rsn *ibss_rsn,
} }
int ibss_rsn_start(struct ibss_rsn *ibss_rsn, const u8 *addr) static int ibss_rsn_send_auth(struct ibss_rsn *ibss_rsn, const u8 *da, int seq)
{ {
struct ibss_rsn_peer *peer; struct ieee80211_mgmt auth;
const size_t auth_length = IEEE80211_HDRLEN + sizeof(auth.u.auth);
struct wpa_supplicant *wpa_s = ibss_rsn->wpa_s;
if (ibss_rsn == NULL) if (wpa_s->driver->send_frame == NULL)
return -1; return -1;
if (ibss_rsn_get_peer(ibss_rsn, addr)) { os_memset(&auth, 0, sizeof(auth));
wpa_printf(MSG_DEBUG, "RSN: IBSS Authenticator and Supplicant "
"for peer " MACSTR " already running", auth.frame_control = IEEE80211_FC(WLAN_FC_TYPE_MGMT,
MAC2STR(addr)); WLAN_FC_STYPE_AUTH);
return 0; os_memcpy(auth.da, da, ETH_ALEN);
os_memcpy(auth.sa, wpa_s->own_addr, ETH_ALEN);
os_memcpy(auth.bssid, wpa_s->bssid, ETH_ALEN);
auth.u.auth.auth_alg = host_to_le16(WLAN_AUTH_OPEN);
auth.u.auth.auth_transaction = host_to_le16(seq);
auth.u.auth.status_code = host_to_le16(WLAN_STATUS_SUCCESS);
wpa_printf(MSG_DEBUG, "RSN: IBSS TX Auth frame (SEQ %d) to " MACSTR,
seq, MAC2STR(da));
return wpa_s->driver->send_frame(wpa_s->drv_priv, (u8 *) &auth,
auth_length, 0);
} }
wpa_printf(MSG_DEBUG, "RSN: Starting IBSS Authenticator and "
"Supplicant for peer " MACSTR, MAC2STR(addr)); static int ibss_rsn_is_auth_started(struct ibss_rsn_peer * peer)
{
return peer->authentication_status &
(IBSS_RSN_AUTH_BY_US | IBSS_RSN_AUTH_EAPOL_BY_US);
}
static struct ibss_rsn_peer *
ibss_rsn_peer_init(struct ibss_rsn *ibss_rsn, const u8 *addr)
{
struct ibss_rsn_peer *peer;
if (ibss_rsn == NULL)
return NULL;
peer = ibss_rsn_get_peer(ibss_rsn, addr);
if (peer) {
wpa_printf(MSG_DEBUG, "RSN: IBSS Supplicant for peer "MACSTR
" already running", MAC2STR(addr));
return peer;
}
wpa_printf(MSG_DEBUG, "RSN: Starting IBSS Supplicant for peer "MACSTR,
MAC2STR(addr));
peer = os_zalloc(sizeof(*peer)); peer = os_zalloc(sizeof(*peer));
if (peer == NULL) if (peer == NULL) {
return -1; wpa_printf(MSG_DEBUG, "RSN: Could not allocate memory.");
return NULL;
}
peer->ibss_rsn = ibss_rsn; peer->ibss_rsn = ibss_rsn;
os_memcpy(peer->addr, addr, ETH_ALEN); os_memcpy(peer->addr, addr, ETH_ALEN);
peer->authentication_status = IBSS_RSN_AUTH_NOT_AUTHENTICATED;
if (ibss_rsn_supp_init(peer, ibss_rsn->wpa_s->own_addr, ibss_rsn->psk) if (ibss_rsn_supp_init(peer, ibss_rsn->wpa_s->own_addr,
< 0) { ibss_rsn->psk) < 0) {
ibss_rsn_free(peer); ibss_rsn_free(peer);
return -1; return NULL;
}
if (ibss_rsn_auth_init(ibss_rsn, peer) < 0) {
ibss_rsn_free(peer);
return -1;
} }
peer->next = ibss_rsn->peers; peer->next = ibss_rsn->peers;
ibss_rsn->peers = peer; ibss_rsn->peers = peer;
return peer;
}
int ibss_rsn_start(struct ibss_rsn *ibss_rsn, const u8 *addr)
{
struct ibss_rsn_peer *peer;
int res;
/* if the peer already exists, exit immediately */
peer = ibss_rsn_get_peer(ibss_rsn, addr);
if (peer)
return 0; return 0;
peer = ibss_rsn_peer_init(ibss_rsn, addr);
if (peer == NULL)
return -1;
/* Open Authentication: send first Authentication frame */
res = ibss_rsn_send_auth(ibss_rsn, addr, 1);
if (res) {
/*
* The driver may not support Authentication frame exchange in
* IBSS. Ignore authentication and go through EAPOL exchange.
*/
peer->authentication_status |= IBSS_RSN_AUTH_BY_US;
return ibss_rsn_auth_init(ibss_rsn, peer);
}
return 0;
}
static int ibss_rsn_peer_authenticated(struct ibss_rsn *ibss_rsn,
struct ibss_rsn_peer *peer, int reason)
{
int already_started;
if (ibss_rsn == NULL || peer == NULL)
return -1;
already_started = ibss_rsn_is_auth_started(peer);
peer->authentication_status |= reason;
if (already_started) {
wpa_printf(MSG_DEBUG, "RSN: IBSS Authenticator already "
"started for peer " MACSTR, MAC2STR(peer->addr));
return 0;
}
wpa_printf(MSG_DEBUG, "RSN: Starting IBSS Authenticator "
"for now-authenticated peer " MACSTR, MAC2STR(peer->addr));
return ibss_rsn_auth_init(ibss_rsn, peer);
} }
@ -617,10 +705,21 @@ static int ibss_rsn_process_rx_eapol(struct ibss_rsn *ibss_rsn,
return -1; return -1;
os_memcpy(tmp, buf, len); os_memcpy(tmp, buf, len);
if (supp) { if (supp) {
wpa_printf(MSG_DEBUG, "RSN: IBSS RX EAPOL for Supplicant"); peer->authentication_status |= IBSS_RSN_AUTH_EAPOL_BY_PEER;
wpa_printf(MSG_DEBUG, "RSN: IBSS RX EAPOL for Supplicant from "
MACSTR, MAC2STR(peer->addr));
wpa_sm_rx_eapol(peer->supp, peer->addr, tmp, len); wpa_sm_rx_eapol(peer->supp, peer->addr, tmp, len);
} else { } else {
wpa_printf(MSG_DEBUG, "RSN: IBSS RX EAPOL for Authenticator"); if (ibss_rsn_is_auth_started(peer) == 0) {
wpa_printf(MSG_DEBUG, "RSN: IBSS EAPOL for "
"Authenticator dropped as " MACSTR " is not "
"authenticated", MAC2STR(peer->addr));
os_free(tmp);
return -1;
}
wpa_printf(MSG_DEBUG, "RSN: IBSS RX EAPOL for Authenticator "
"from "MACSTR, MAC2STR(peer->addr));
wpa_receive(ibss_rsn->auth_group, peer->auth, tmp, len); wpa_receive(ibss_rsn->auth_group, peer->auth, tmp, len);
} }
os_free(tmp); os_free(tmp);
@ -646,8 +745,16 @@ int ibss_rsn_rx_eapol(struct ibss_rsn *ibss_rsn, const u8 *src_addr,
* Create new IBSS peer based on an EAPOL message from the peer * Create new IBSS peer based on an EAPOL message from the peer
* Authenticator. * Authenticator.
*/ */
if (ibss_rsn_start(ibss_rsn, src_addr) < 0) peer = ibss_rsn_peer_init(ibss_rsn, src_addr);
if (peer == NULL)
return -1; return -1;
/* assume the peer is authenticated already */
wpa_printf(MSG_DEBUG, "RSN: IBSS Not using IBSS Auth for peer "
MACSTR, MAC2STR(src_addr));
ibss_rsn_peer_authenticated(ibss_rsn, peer,
IBSS_RSN_AUTH_EAPOL_BY_US);
return ibss_rsn_process_rx_eapol(ibss_rsn, ibss_rsn->peers, return ibss_rsn_process_rx_eapol(ibss_rsn, ibss_rsn->peers,
buf, len); buf, len);
} }
@ -655,10 +762,89 @@ int ibss_rsn_rx_eapol(struct ibss_rsn *ibss_rsn, const u8 *src_addr,
return 0; return 0;
} }
void ibss_rsn_set_psk(struct ibss_rsn *ibss_rsn, const u8 *psk) void ibss_rsn_set_psk(struct ibss_rsn *ibss_rsn, const u8 *psk)
{ {
if (ibss_rsn == NULL) if (ibss_rsn == NULL)
return; return;
os_memcpy(ibss_rsn->psk, psk, PMK_LEN); os_memcpy(ibss_rsn->psk, psk, PMK_LEN);
} }
static void ibss_rsn_handle_auth_1_of_2(struct ibss_rsn *ibss_rsn,
struct ibss_rsn_peer *peer,
const u8* addr)
{
wpa_printf(MSG_DEBUG, "RSN: IBSS RX Auth frame (SEQ 1) from " MACSTR,
MAC2STR(addr));
if (peer &&
peer->authentication_status & IBSS_RSN_AUTH_EAPOL_BY_PEER) {
/*
* A peer sent us an Authentication frame even though it already
* started an EAPOL session. We should reinit state machines
* here, but it's much more complicated than just deleting and
* recreating the state machine
*/
wpa_printf(MSG_DEBUG, "RSN: IBSS Reinitializing station "
MACSTR, MAC2STR(addr));
ibss_rsn_stop(ibss_rsn, addr);
peer = NULL;
}
if (!peer) {
peer = ibss_rsn_peer_init(ibss_rsn, addr);
if (!peer)
return;
wpa_printf(MSG_DEBUG, "RSN: IBSS Auth started by peer " MACSTR,
MAC2STR(addr));
}
/* reply with an Authentication frame now, before sending an EAPOL */
ibss_rsn_send_auth(ibss_rsn, addr, 2);
/* no need to start another AUTH challenge in the other way.. */
ibss_rsn_peer_authenticated(ibss_rsn, peer, IBSS_RSN_AUTH_EAPOL_BY_US);
}
void ibss_rsn_handle_auth(struct ibss_rsn *ibss_rsn, const u8 *auth_frame,
size_t len)
{
const struct ieee80211_mgmt *header;
struct ibss_rsn_peer *peer;
size_t auth_length;
header = (const struct ieee80211_mgmt *) auth_frame;
auth_length = IEEE80211_HDRLEN + sizeof(header->u.auth);
if (ibss_rsn == NULL || len < auth_length)
return;
if (le_to_host16(header->u.auth.auth_alg) != WLAN_AUTH_OPEN ||
le_to_host16(header->u.auth.status_code) != WLAN_STATUS_SUCCESS)
return;
peer = ibss_rsn_get_peer(ibss_rsn, header->sa);
switch (le_to_host16(header->u.auth.auth_transaction)) {
case 1:
ibss_rsn_handle_auth_1_of_2(ibss_rsn, peer, header->sa);
break;
case 2:
wpa_printf(MSG_DEBUG, "RSN: IBSS RX Auth frame (SEQ 2) from "
MACSTR, MAC2STR(header->sa));
if (!peer) {
wpa_printf(MSG_DEBUG, "RSN: Received Auth seq 2 from "
"unknown STA " MACSTR, MAC2STR(header->sa));
break;
}
/* authentication has been completed */
wpa_printf(MSG_DEBUG, "RSN: IBSS Auth completed with "MACSTR,
MAC2STR(header->sa));
ibss_rsn_peer_authenticated(ibss_rsn, peer,
IBSS_RSN_AUTH_BY_US);
break;
}
}

View file

@ -11,6 +11,15 @@
struct ibss_rsn; struct ibss_rsn;
/* not authenticated */
#define IBSS_RSN_AUTH_NOT_AUTHENTICATED 0x00
/* remote peer sent an EAPOL message */
#define IBSS_RSN_AUTH_EAPOL_BY_PEER 0x01
/* we sent an AUTH message with seq 1 */
#define IBSS_RSN_AUTH_BY_US 0x02
/* we sent an EAPOL message */
#define IBSS_RSN_AUTH_EAPOL_BY_US 0x04
struct ibss_rsn_peer { struct ibss_rsn_peer {
struct ibss_rsn_peer *next; struct ibss_rsn_peer *next;
struct ibss_rsn *ibss_rsn; struct ibss_rsn *ibss_rsn;
@ -23,6 +32,7 @@ struct ibss_rsn_peer {
size_t supp_ie_len; size_t supp_ie_len;
struct wpa_state_machine *auth; struct wpa_state_machine *auth;
int authentication_status;
}; };
struct ibss_rsn { struct ibss_rsn {
@ -40,5 +50,7 @@ void ibss_rsn_stop(struct ibss_rsn *ibss_rsn, const u8 *peermac);
int ibss_rsn_rx_eapol(struct ibss_rsn *ibss_rsn, const u8 *src_addr, int ibss_rsn_rx_eapol(struct ibss_rsn *ibss_rsn, const u8 *src_addr,
const u8 *buf, size_t len); const u8 *buf, size_t len);
void ibss_rsn_set_psk(struct ibss_rsn *ibss_rsn, const u8 *psk); void ibss_rsn_set_psk(struct ibss_rsn *ibss_rsn, const u8 *psk);
void ibss_rsn_handle_auth(struct ibss_rsn *ibss_rsn, const u8 *auth_frame,
size_t len);
#endif /* IBSS_RSN_H */ #endif /* IBSS_RSN_H */