On Tue, Dec 3, 2013 at 12:21 AM, Johannes Berg <johannes@xxxxxxxxxxxxxxxx> wrote: > From: Johannes Berg <johannes.berg@xxxxxxxxx> > > The GTK is shared by all stations in an 802.11 BSS and as such any > one of them can send forged group-addressed frames. To prevent this > kind of attack, drop unicast IP packets if they were protected with > the GTK, i.e. were multicast packets at the 802.11 layer. > > Based in part on a patch by Jouni that did the same but in the IP > stack, which was considered too intrusive. > As per RFC 1122 this is an invalid case: When a host sends a datagram to a link-layer broadcast address, the IP destination address MUST be a legal IP broadcast or IP multicast address. A host SHOULD silently discard a datagram that is received via a link-layer broadcast (see Section 2.4) but does not specify an IP multicast or broadcast destination address. We can simply drop this frame irrespective of GTK/PTK is used. -- To unsubscribe from this list: send the line "unsubscribe linux-wireless" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html