linux-wireless.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Johannes Berg <johannes@sipsolutions.net>
To: Javier Cardona <javier@cozybit.com>
Cc: Thomas Pedersen <thomas@cozybit.com>,
	linux-wireless@vger.kernel.org, devel@lists.open80211s.org
Subject: Re: [PATCH 6/7] mac80211: Parse RSN information element to determine if a peer needs authentication
Date: Fri, 04 Mar 2011 20:18:27 +0100	[thread overview]
Message-ID: <1299266307.3742.5.camel@jlt3.sipsolutions.net> (raw)
In-Reply-To: <AANLkTim-cdTV6dsZg9MmMFMejkN8SpNYr=RBY-s8kiF=@mail.gmail.com>

On Fri, 2011-03-04 at 11:06 -0800, Javier Cardona wrote:
> On Fri, Mar 4, 2011 at 3:37 AM, Johannes Berg <johannes@sipsolutions.net> wrote:
> > On Thu, 2011-03-03 at 19:11 -0800, Thomas Pedersen wrote:
> >> From: Javier Cardona <javier@cozybit.com>
> >
> > [...]
> >
> > If you manage stations in userspace, then this code is unnecessary.
> > That'd be a big win in my eyes. The only thing the kernel would need to
> > know is not to create station entries, right?
> 
> If userspace manages only rsn mesh stations then we do still need
> this.  That would be my preference:  only require an authentication
> daemon if you intend to join a secure mesh.  In the same way that you
> can connect to an open AP without a daemon.
> Would you object to this approach?

No, I wouldn't, but I don't see why you'd still need this? I'm not sure
exactly how all this works, but conceptually, is there anything wrong
with this:
 * when creating the mesh, you'd say "this is a secure mesh"
 * when an auth frame is received, you just pass it to userspace, as you
   already have
 * userspace is responsible for adding/removing stations
 * the kernel doesn't need to parse RSN since if it's a secure mesh it
   will know because userspace said it was


Actually, looking at your patch in more detail, it would seem like it
allows somebody to hijack the mesh by pretending it is an open network.
If the RSN IE isn't present, mesh_neighbour_update() gets passed false
for the rsn_enabled parameter -- even if the mesh should be secure --
and then the peer would be allowed to join just because it said it
didn't support RSN. Surely in that case it shouldn't be allowed to join?
Maybe I'm not reading this correctly.

johannes


  reply	other threads:[~2011-03-04 19:18 UTC|newest]

Thread overview: 21+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2011-03-04  3:11 Thomas Pedersen
2011-03-04  3:11 ` [PATCH 1/7] mac80211: Support RSN information element on mesh interfaces Thomas Pedersen
2011-03-04 11:30   ` Johannes Berg
2011-03-04 18:48     ` Javier Cardona
2011-03-04  3:11 ` [PATCH 2/7] mac80211: New constant definitions for SAE Thomas Pedersen
2011-03-04 11:32   ` Johannes Berg
2011-03-04 18:51     ` Javier Cardona
2011-03-04  3:11 ` [PATCH 3/7] mac80211: Let user space receive and send mesh auth/deauth frames Thomas Pedersen
2011-03-04  3:11 ` [PATCH 4/7] mac80211: Accept mesh auth frames before a peer link has been established Thomas Pedersen
2011-03-04  3:11 ` [PATCH 5/7] nl80211: Let userspace set the authenticated flag for a mesh peer Thomas Pedersen
2011-03-04 11:36   ` Johannes Berg
2011-03-04 19:01     ` Javier Cardona
2011-03-04 19:14       ` Johannes Berg
2011-03-04  3:11 ` [PATCH 6/7] mac80211: Parse RSN information element to determine if a peer needs authentication Thomas Pedersen
2011-03-04 11:37   ` Johannes Berg
2011-03-04 19:06     ` Javier Cardona
2011-03-04 19:18       ` Johannes Berg [this message]
2011-03-04 19:45         ` Javier Cardona
2011-03-04 19:52           ` Johannes Berg
2011-03-04  3:11 ` [PATCH 7/7] mac80211: Check auth status before attempting to establish a peer link Thomas Pedersen
2011-03-04 11:37   ` Johannes Berg

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=1299266307.3742.5.camel@jlt3.sipsolutions.net \
    --to=johannes@sipsolutions.net \
    --cc=devel@lists.open80211s.org \
    --cc=javier@cozybit.com \
    --cc=linux-wireless@vger.kernel.org \
    --cc=thomas@cozybit.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).