Search Linux Wireless

Re: [PATCH v2 0/4] Extended Key ID support

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Am 08.04.19 um 21:57 schrieb Johannes Berg:
On Tue, 2019-03-19 at 21:34 +0100, Alexander Wetzel wrote:
This patch series adds support for IEEE 802.11-2016 Extended Key ID
support. Compared to the last RFC there are again quite some API
changes, but also some bug fixes. (The bug fixes I remember are outlined
in the different patches.)

FWIW, I've applied the first two patches here.

I'd really like you to continue with only that for now, and (try to) get
hostapd/wpa_supplicant changes upstream, perhaps with corresponding
hwsim tests. That way, we can see this working live.

That's splendid:-)
I'll try to get the hostapd/wpa_supplicant patches finalized in the next weeks. Hopefully I have something to submit here once the Extended Key ID API is in mainline immediately.

But if you or someone else want to run some tests prior to that.
I've updated the patches available here with the ones I'm currently using: https://www.awhome.eu/index.php/s/AJJXBLsZmzHdxpX

They are fully functional and I'm using them on my main AP and workstation for months now. They are on top of the current hostapd HEAD and should not cause any regressions. They are also comparable simple to port between versions. The code we touch here has not been changed in any relevant way since I started working on the patches. Just really copy nl80211_copy.h from the kernel...

A sad side note:
I'm pretty sure I've already found one broken Wlan implementation: Samsung Galaxy Tap S3 This device seems to just copy the RSN Capability (bit) from the AP and then fails when the AP rekeys the connection and starts using keyid 1... But it's probably a Samsung specific bug, other Android devices - including a Google Pixel 3 - don't "lie" in the RSN and are using "legacy" key installs as they should.


We briefly discussed this at the wireless workshop, and the general
feeling seems to have been that the compat mode is probably not really
worthwhile, but I haven't quite made up my mind on that.

I would like to be able to support Extended Key ID for the the Atheros cards < ath10k... Maybe that gets the attention of someone who can fix the ath10k firmware to also support it, hopefully in NATIVE mode:-) But I see that the COMPAT mode may not be worth the added complexity in the long term.

Which reminds me:
One potential follow up on the COMPAT code would be seamless Rx during rekey even when not using Extended Key ID. It would need some slight of hand but I think it's possible. Basically we just would have to try the second key also if the first one did not decode the MPTU. So far I've shelved any plans into that direction as too complex for too little gain. And after all people should just start using Extended Key ID instead. After all that's the point of having standards...

Still, having tests and being able to check it out would help a lot,
also as part of perhaps building a case for compat mode.

Besides some review of the patches with my improved 802.11/code understanding the only thing missing in the current wpa_supplicant/hostapd patches *are* the test cases.

The existing rekey tests are already working fine with Extended Key ID. Separating Extended Key ID rekey from "legacy" rekeys tests is probably half of the work here... With the patches you merged and the linked hostapd/wpa_supplicant patches any (WPA2) rekey test will use Extended Key ID. (They won't test any of the really interesting code pathes in the kernel, trough. No A-MPDU, no TX-Pull and of course no HW crypto or RX/TX fast path if I remember it right.)

Thanks,
Alexander



[Index of Archives]     [Linux Host AP]     [ATH6KL]     [Linux Wireless Personal Area Network]     [Linux Bluetooth]     [Wireless Regulations]     [Linux Netdev]     [Kernel Newbies]     [Linux Kernel]     [IDE]     [Git]     [Netfilter]     [Bugtraq]     [Yosemite Hiking]     [MIPS Linux]     [ARM Linux]     [Linux RAID]

  Powered by Linux