From: Denis Kenzior <denkenz@gmail.com>
To: Johannes Berg <johannes@sipsolutions.net>,
Ben Greear <greearb@candelatech.com>,
"linux-wireless@vger.kernel.org" <linux-wireless@vger.kernel.org>,
"hostap@lists.infradead.org" <hostap@lists.infradead.org>
Subject: Re: Question on setting key right after the EAPOL 4/4 is sent.
Date: Fri, 9 Jun 2017 08:10:04 -0500 [thread overview]
Message-ID: <08fb9e64-a01e-54ea-7627-a0664d350710@gmail.com> (raw)
In-Reply-To: <1496993334.2424.1.camel@sipsolutions.net>
Hi Johannes,
>
> We've actually discussed doing precisely this, for - among other things
> - this reason. Just nobody stepped up yet to propose the necessary APIs
> and do the remaining work to use it etc.
>
Do you have any thoughts on what the operations should look like or do
you want me to take a stab in the dark at this?
>> Having userspace track individual packets in the kernel sounds wrong
>> to me. This also won't help with the packets being received out-of-
>> order. It would be nice if both the RX and TX ordering was
>> preserved. Hence my thinking about running PAE over NL80211. It
>> would then be up to the kernel / drivers to guarantee that the
>> various packets are ordered appropriately.
>
> That's actually not possible, since ordering set_key operations vs.
> transmitted packets isn't something that's easily done by drivers.
Fair enough, but at least the kernel can do its best to make sure that
such races do not manifest themselves out into userspace. E.g. making
sure that PAE events arrive after the connect events, etc.
>
> However, the solution is far simpler! Once you have nl80211 PAE
> transport, you can easily even set the key before transmitting the
> packet and simply indicate that this particular packet should _not_ be
> encrypted regardless of key presence.
>
Makes sense. Should PAE packets always be sent unencrypted? Or should
userspace be notified whether PAE was received unencrypted and send a
response with the same flag?
Also, while we're on this subject. Should the kernel auto-manage the
LINKMODE and OPERSTATE flags? It would seem that it already has the
information to do so, and having userspace manage this just introduces
another source of latency / possibility of race conditions, etc.
Regards,
-Denis
next prev parent reply other threads:[~2017-06-09 13:10 UTC|newest]
Thread overview: 16+ messages / expand[flat|nested] mbox.gz Atom feed top
2017-06-08 23:17 Question on setting key right after the EAPOL 4/4 is sent Ben Greear
2017-06-08 23:36 ` Denis Kenzior
2017-06-08 23:43 ` Ben Greear
2017-06-09 0:07 ` Denis Kenzior
2017-06-09 7:28 ` Johannes Berg
2017-06-09 13:10 ` Denis Kenzior [this message]
2017-06-09 19:56 ` Johannes Berg
2017-06-09 21:42 ` LINKMODE & OPERSTATE thoughts Denis Kenzior
2017-06-13 9:15 ` Johannes Berg
2017-06-09 13:46 ` Question on setting key right after the EAPOL 4/4 is sent Ben Greear
2017-06-09 20:01 ` Johannes Berg
2017-06-09 20:18 ` Ben Greear
2017-06-09 21:47 ` Janusz Dziedzic
2017-06-09 22:02 ` Ben Greear
[not found] ` <CADP2NhbXgHWo+BWhrKQndu5X7fzd2J9teqf-o6fSWwDMv8X5Hw@mail.gmail.com>
2017-06-10 16:01 ` Ben Greear
2017-06-10 19:13 ` Arend van Spriel
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=08fb9e64-a01e-54ea-7627-a0664d350710@gmail.com \
--to=denkenz@gmail.com \
--cc=greearb@candelatech.com \
--cc=hostap@lists.infradead.org \
--cc=johannes@sipsolutions.net \
--cc=linux-wireless@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).