Re: [PATCH 5/8] STA: Support Extended Key ID

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, Mar 16, 2020 at 11:54:41PM +0100, Alexander Wetzel wrote:
> First: FT0 and FILS0 seem to to exactly what you want. I'm just not sure if
> you are ok with how these modes "pin" Extended Key Id support with the
> initial handshakes (FT or FILS) and make sure the rekeys are then using
> something different later.

I'm not I completely understood that pinning the support part, but I'll
take a closer look at the details in the updated patch.

> I would also have simple told the STA to signal support for Extended Key ID
> and only check the KeyID in EAPOL#3: If there is a keyID use that. If not
> use zero. But the standard forces us to check the RSN (chapter 12.7.6.4):
> If the Extended Key ID for Individually Addressed Frames subfield of the RSN
> Capabilities field is 1 for both the Authenticator and Supplicant then prior
> to sending message 4, STA_P uses the MLME-SETKEYS.request primitive to
> configure the IEEE 802.11 MAC to receive individually
> addressed MPDUs protected by the STK with the assigned Key ID.
> Simply acting on the KeyID would therefore violate the standard.

That design is broken and should be ignored. Extended Capabilities
element is not protected and the bits in in should certainly not
override the protected exchange of Key ID KDE in EAPOL-Key msg 3/4.
IMHO, it is perfectly fine and correct to not comply with that
statement. This full text is pretty descriptive instead of using clearly
normative language.. Anyway, I'll try to get this fixed in REVmd to use
the presence of Key ID KDE as the rule for the station side and also add
an explicit requirement for the AP to include Key ID KDE in msg 3/4
whenever using Extended Key ID (i.e., also require it to be there for Key
ID 0 case). I did not see such an explicit requirement in the standard.

> Yes, that would also be a problem... wpa_deny_ptk0_rekey != 0 is resetting
> the connection normally way prior to getting the new keyID.
> 
> when we not decide at the initial connection if we are using Extended Key ID
> or not we would have to reset the connection much later and not at the first
> indication one end plans to rekey.

I'm still not completely sure I understand why there would be such a
difference.. Station should assume the AP will be using Extended Key ID
based on the Extended Capabilities indication from scan results (i.e.,
known at the time of the initial association). I'll see if I can
understand this better when going through the updated patch.

-- 
Jouni Malinen                                            PGP id EFC895FA

_______________________________________________
Hostap mailing list
Hostap@xxxxxxxxxxxxxxxxxxx
http://lists.infradead.org/mailman/listinfo/hostap



[Index of Archives]     [Linux Wireless]     [Linux Kernel]     [ATH6KL]     [Linux Bluetooth]     [Linux Netdev]     [Kernel Newbies]     [IDE]     [Security]     [Git]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Linux ATA RAID]     [Samba]     [Device Mapper]

  Powered by Linux