Re: [PATCH] EAPOL_SUPP: ignore Response at CONNECTING state

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thu, Jan 06, 2022 at 09:47:27AM +0800, xinpeng wang wrote:
> When using PEAP certification, the server may use Identity's Request message
> as a heartbeat; there will be many clients on the Internet to send address
> 01: 80: C2: 00: 03 Identity's Response message as a heartbeat; at this time
> When a client is broken and reconnect, it is easy to receive this message,
> resulting in triggering restart of EAPOL authentication, resulting in a slow
> authentication. So Ignore the response message in the Connecting state.

This sounds really confusing.. Why would a Supplicant process an EAP
response message in any state (well, with the exception of the quite
unfortunate LEAP design)? What is special about the CONNECTING state in
this context? That said, it is quite inconvenient if the EAPOL state
machine needs to peek into the EAP header for something like this..

How commonly does this happen? Based on the that address, I'd assuming
this is about use of EAPOL/IEEE 802.1X on a wired Ethernet interface
rather than anything with Wi-Fi. Though, that should have been with one
more zero octet: 01:80:C2:00:00:03, i.e., the PAE group address. Would
you be able to share some debug logs showing the undesired behavior?

-- 
Jouni Malinen                                            PGP id EFC895FA

_______________________________________________
Hostap mailing list
Hostap@xxxxxxxxxxxxxxxxxxx
http://lists.infradead.org/mailman/listinfo/hostap



[Index of Archives]     [Linux Wireless]     [Linux Kernel]     [ATH6KL]     [Linux Bluetooth]     [Linux Netdev]     [Kernel Newbies]     [IDE]     [Security]     [Git]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Linux ATA RAID]     [Samba]     [Device Mapper]

  Powered by Linux