Re: [RFC v2 2/2] Bluetooth: Use MITM protection when responding LM

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi Johan,

On Thu, Jun 13, 2013 at 10:32 AM, Johan Hedberg <johan.hedberg@xxxxxxxxx> wrote:
> Hi,
>
> On Thu, May 30, 2013, Mikel Astiz wrote:
>> A MITM protected SSP associaton model can be used for pairing if both
>> local and remote IO capabilities are set to something other than
>> NoInputNoOutput, regardless of the bonding type (dedicated or general).
>>
>> With these IO capabilities a MITM protected SSP association model has
>> been used by the Kernel if we are initiating the pairing process
>> (initiating LM).
>>
>> When responding to a pairing request (remote device is the initiating
>> LM) the pairing should also be proteced against MITM attacks, as
>> proposed in this patch.
>>
>> Signed-off-by: Timo Mueller <timo.mueller@xxxxxxxxxxxx>
>> Signed-off-by: Mikel Astiz <mikel.astiz@xxxxxxxxxxxx>
>> ---
>>  net/bluetooth/hci_event.c | 21 +++++++++------------
>>  1 file changed, 9 insertions(+), 12 deletions(-)
>>
>> diff --git a/net/bluetooth/hci_event.c b/net/bluetooth/hci_event.c
>> index 777a040..ca59623 100644
>> --- a/net/bluetooth/hci_event.c
>> +++ b/net/bluetooth/hci_event.c
>> @@ -3024,22 +3024,19 @@ unlock:
>>
>>  static u8 hci_get_auth_req(struct hci_conn *conn)
>>  {
>> -     /* If remote requests dedicated bonding follow that lead */
>> -     if ((conn->remote_auth & ~0x01) == HCI_AT_DEDICATED_BONDING) {
>> -             /* If both remote and local IO capabilities allow MITM
>> -              * protection then require it, otherwise don't */
>> -             if (conn->remote_cap == SMP_IO_NO_INPUT_OUTPUT ||
>> -                 conn->io_capability == SMP_IO_NO_INPUT_OUTPUT)
>> -                     return 0x02;
>> -             else
>> -                     return 0x03;
>> -     }
>> -
>>       /* If remote requests no-bonding follow that lead */
>>       if ((conn->remote_auth & ~0x01) == HCI_AT_NO_BONDING)
>>               return conn->remote_auth | (conn->auth_type & 0x01);
>>
>> -     return conn->auth_type;
>> +     /* If both remote and local IO capabilities allow MITM protection
>> +      * then require it
>> +      */
>> +     if (conn->remote_cap != SMP_IO_NO_INPUT_OUTPUT &&
>> +         conn->io_capability != SMP_IO_NO_INPUT_OUTPUT)
>> +             return conn->remote_auth | 0x01;
>> +
>> +     /* No MITM protection possible due to lacking capabilities */
>> +     return conn->remote_auth & ~0x01;
>>  }
>>
>>  static void hci_io_capa_request_evt(struct hci_dev *hdev, struct sk_buff *skb)
>
> Did you test this with acting as pairing initiator too? What worries me
> a bit is the partial removal of reliance on conn->auth_type. It'd also
> be important to verify that this doesn't cause issues with GAP test
> cases using the BITE.

We can double check all the tests we can think of, but unfortunately
we have no access to the BITE.

Regarding the reliance on conn->auth_type, I believe it boils down to
whether the same policy (i.e. use MITM protection when capabilities
allow it) should also be applied to outgoing general bondings. This
patch would affect both incoming and outgoing pairing procedures.

IMO it doesn't make much sense to introduce such a policy for incoming
ones only, based on the intuition that two BlueZ ends would always use
MITM protection as a consequence of the responding end enforcing it.

This seems to suggest a management socket command to enforce MITM
protection and otherwise leave the current behavior. Any thoughts on
this?

As a reminder, the motivation behind this change is that IVI use-cases
require disallowing just-works pairing. MITM protection should always
be used and the pairing will fail (rejected in userland) if the IO
capabilities don't allow it.

Cheers,
Mikel
--
To unsubscribe from this list: send the line "unsubscribe linux-bluetooth" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html




[Index of Archives]     [Bluez Devel]     [Linux Wireless Networking]     [Linux Wireless Personal Area Networking]     [Linux ATH6KL]     [Linux USB Devel]     [Linux Media Drivers]     [Linux Audio Users]     [Linux Kernel]     [Linux SCSI]     [Big List of Linux Books]

  Powered by Linux