Re: [PATCH] easymesh: add backhaul BSS support for WPS M8

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, Nov 21, 2018 at 02:39:11PM +0100, Arnout Vandecappelle wrote:
> On 21/11/2018 12:16, Jouni Malinen wrote:
> >>> - cannot use hardcoded external file to build the Credential for
> >>>   backhaul STA since MAC Address attribute depends on the Enrollee's
> >>>   MAC address and changes for each device
> 
>  Hm, I realize now: what was proposed here is the same situation as
> skip_cred_build=1 and extra_cred=some-file. That couldn't possibly work either
> then, right?

extra_cred does indeed have the same issue and it would be compliant
with the WSC v2 technical specification. There is quite a bit more
history on this detail, though.. The original WPS release in 2006 did
not have the "Validation of Configuration Data" section and no shall
statements regarding Enrollee verifying the MAC Address attribute value
within Credential. This text was added as part of the version 2 work.
extra_cred implementation predates that version 2 work..

wpa_supplicant/hostapd as Enrollee is actually ignoring the MAC address
value in Credential by default (just noting incorrect value in debug
log) and the strict validation and rejection is enabled only if the
build is configured with CONFIG_WPS_STRICT. That said, I do not really
want to introduce any new functionality that is clearly non-compliant
with the current WSC tech spec.

>  Table 36 of the WSC specification already enumerates 5 additional optional
> attributes: EAP Type, EAP Identity, Key Provided Automatically, 802.1X Enabled,
> Network Key Shareable. In addition, Multi-AP R2 might require an additional
> credential attribute (as a vendor extension, most likely). Marianna, do you
> expect that to be the case?

Those additional items in Table 36 are not really applicable for the
Multi-AP backhaul connection since it does not use WPA2-Enterprise
(EAP). Or well, Network Key Shareable is actually applicable for the
Multi-AP use case, but that could as well get hardcoded to TRUE (i.e.,
no need to configure it separately) taken into account how the backhaul
connection is provisioned between the APs with WPS.

I don't think there is much of a point in trying to extend WSC tech spec
today taken where WPS went and how any new use case should really be
looking at using more secure provisioning mechanism. In other words, I
don't really see any issues in (or significant future work from)
limiting current Multi-AP implementation to use this minimal
configuration (SSID + psk/passphrase) for WPS Credential.

>  And regardless, you can always use extra_cred to pass additional attributes
> (they won't be part of the ATTR_CRED then, but they will be encrypted).

extra_cred should not really be used with any new design.

-- 
Jouni Malinen                                            PGP id EFC895FA

_______________________________________________
Hostap mailing list
Hostap@xxxxxxxxxxxxxxxxxxx
http://lists.infradead.org/mailman/listinfo/hostap



[Index of Archives]     [Linux Wireless]     [Linux Kernel]     [ATH6KL]     [Linux Bluetooth]     [Linux Netdev]     [Kernel Newbies]     [IDE]     [Security]     [Git]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Linux ATA RAID]     [Samba]     [Device Mapper]

  Powered by Linux