mbox series

[0/3] Allow to block PTK0 rekeys

Message ID 20200110221910.312529-1-alexander@wetzel-home.de
Headers show
Series Allow to block PTK0 rekeys | expand

Message

Alexander Wetzel Jan. 10, 2020, 10:19 p.m. UTC
This is basically V2 of the PTK0 rekey handling patch series from
"[Patch v9 00/16] Seamless PTK rekeys".

It's now by default allowing to rekey PTKs which is for sure the less
painful one to maintain and the users affected by the issue have to
manually enable the workaround.

It has no other relevant changes and is not breaking any tests for me.
I'll wait till this has been merged/handled till posting the Extended Key
ID patches again.

Alexander Wetzel (3):
  AP: Address PTK rekey issues
  wpa_supplicant: Address PTK rekey issues
  tests: Allow PTK0 rekey for tests

 hostapd/config_file.c              |  9 +++++++
 hostapd/hostapd.conf               | 34 +++++++++++++++++++++++++
 src/ap/ap_config.c                 |  1 +
 src/ap/ap_config.h                 |  1 +
 src/ap/wpa_auth.c                  | 23 +++++++++++++++--
 src/ap/wpa_auth.h                  |  1 +
 src/ap/wpa_auth_glue.c             | 14 ++++++++++
 src/common/defs.h                  |  6 +++++
 src/eapol_supp/eapol_supp_sm.c     | 15 +++++++++++
 src/eapol_supp/eapol_supp_sm.h     |  8 ++++++
 src/rsn_supp/wpa.c                 | 18 +++++++++++++
 src/rsn_supp/wpa.h                 |  3 +++
 src/rsn_supp/wpa_i.h               |  7 +++++
 tests/hwsim/hostapd.py             |  2 +-
 tests/hwsim/test_ap_eap.py         | 40 +++++++++++++++++++++++++++++
 tests/hwsim/test_ap_psk.py         | 41 +++++++++++++++++++++++++++++-
 tests/hwsim/wpasupplicant.py       |  2 +-
 wpa_supplicant/ap.c                |  1 +
 wpa_supplicant/config.c            |  2 ++
 wpa_supplicant/config_file.c       |  1 +
 wpa_supplicant/config_ssid.h       | 12 +++++++++
 wpa_supplicant/events.c            | 16 +++++++-----
 wpa_supplicant/ibss_rsn.c          |  9 ++++++-
 wpa_supplicant/notify.c            | 10 ++++++++
 wpa_supplicant/notify.h            |  1 +
 wpa_supplicant/wpa_cli.c           |  4 +--
 wpa_supplicant/wpa_supplicant.c    | 28 +++++++++++++++++++-
 wpa_supplicant/wpa_supplicant.conf | 25 ++++++++++++++++++
 wpa_supplicant/wpa_supplicant_i.h  |  3 +++
 wpa_supplicant/wpas_glue.c         | 17 +++++++++++++
 30 files changed, 339 insertions(+), 15 deletions(-)

Comments

Jouni Malinen Feb. 23, 2020, 1:08 p.m. UTC | #1
On Fri, Jan 10, 2020 at 11:19:07PM +0100, Alexander Wetzel wrote:
> This is basically V2 of the PTK0 rekey handling patch series from
> "[Patch v9 00/16] Seamless PTK rekeys".
> 
> It's now by default allowing to rekey PTKs which is for sure the less
> painful one to maintain and the users affected by the issue have to
> manually enable the workaround.
> 
> It has no other relevant changes and is not breaking any tests for me.
> I'll wait till this has been merged/handled till posting the Extended Key
> ID patches again.
> 
> Alexander Wetzel (3):
>   AP: Address PTK rekey issues
>   wpa_supplicant: Address PTK rekey issues
>   tests: Allow PTK0 rekey for tests

Thanks, applied with some cleanup and fixes. I had to also pull in
"nl80211: Add support for CAN_REPLACE_PTK0" from the previous series to
get this compiling.