Re: [PATCH 09/12] common: Allow WPA_CIPHER_GTK_NOT_USED in RSNE parsing

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Sun, Mar 01, 2020 at 08:30:56AM +0000, Peer, Ilan wrote:
> > From: Jouni Malinen <j@xxxxx>
> > On Mon, Feb 24, 2020 at 11:14:34AM +0200, Ilan Peer wrote:
> > > PASN authentication requires that group management cipher suite would
> > > be set to 00-0F-AC:7 in the RSN IE, so allow this value when parsing
> > > and validating the RSN IE.
> > 
> > Can you please point me to the location in P802.11az/D2.0 that describes
> > this?
> 
> See section 12.13.2.2 (PASN Frame Construction and Processing).

Thanks. I'm not sure how I did not find that when searching through the
draft.. Anyway, that is quite clear on the design.

> > This looks problematic for PMF.. Are you sure this does not result in
> > unexpected behavior for BIP with Robust Management frames? This would
> > likely need some changes in other locations and clear understanding on what
> > to expect to happen with IGTK. The drivers would need to be able to drop
> > any unprotected group-addressed Robust Management frame in such
> > configuration. That would depend on there being an IGTK configured. That
> > would either need to be a random value from the AP or a random value
> > generated by wpa_supplicant internally if no IGTK is received from the AP.
> 
> I'm not sure about this. From what I understand, during PASN not multicast
> frames are allowed, so drivers are expected to drop any multicast frames.

I'm not that worried about the part of using this for PASN; I'm worried
about the implications of this particular change to non-PASN cases of
using PMF since 00-0F-AC:7 has not been used as a group management
cipher suite selector in the existing use cases. I'm not at all
convinced it would work securely and that's why it is important for the
parser to reject that group management cipher suite. If this patch alone
were applied that could result in the station accepting any unprotected
group-addressed Robust Management frame which is clearly not what should
happen.

For this change to be acceptable, the 00-0F-AC:7 case with group
management cipher suite needs to be first confirmed to work correctly in
today's (non-PASN) PMF cases without introducing security
vulnerabilities. That's what the steps noted in that paragraphs are
needed (make sure a random IGTK value gets configured into the driver
regardless of whether the AP sends an IGTK).

-- 
Jouni Malinen                                            PGP id EFC895FA

_______________________________________________
Hostap mailing list
Hostap@xxxxxxxxxxxxxxxxxxx
http://lists.infradead.org/mailman/listinfo/hostap



[Index of Archives]     [Linux Wireless]     [Linux Kernel]     [ATH6KL]     [Linux Bluetooth]     [Linux Netdev]     [Kernel Newbies]     [IDE]     [Security]     [Git]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Linux ATA RAID]     [Samba]     [Device Mapper]

  Powered by Linux