diff mbox

[5/5] wpa_supplicant: allow configuring the MACsec port for MKA

Message ID ba2e70a023c03551b3735ca6fd510301e18250e2.1478090228.git.sd@queasysnail.net
State Accepted
Headers show

Commit Message

Sabrina Dubroca Nov. 2, 2016, 3:38 p.m. UTC
Currently, wpa_supplicant only supports port == 1 in the SCI, but
users may want to choose a different port.

Signed-off-by: Sabrina Dubroca <sd@queasysnail.net>
---
 src/pae/ieee802_1x_kay.c           | 4 ++--
 src/pae/ieee802_1x_kay.h           | 2 +-
 wpa_supplicant/config.c            | 1 +
 wpa_supplicant/config_file.c       | 1 +
 wpa_supplicant/config_ssid.h       | 9 +++++++++
 wpa_supplicant/wpa_cli.c           | 1 +
 wpa_supplicant/wpa_supplicant.conf | 4 ++++
 wpa_supplicant/wpas_kay.c          | 2 +-
 8 files changed, 20 insertions(+), 4 deletions(-)

Comments

Jouni Malinen Nov. 19, 2016, 9:40 p.m. UTC | #1
On Wed, Nov 02, 2016 at 04:38:39PM +0100, Sabrina Dubroca wrote:
> Currently, wpa_supplicant only supports port == 1 in the SCI, but
> users may want to choose a different port.

> +# macsec_port: IEEE 802.1X/MACsec port
> +# Port component of the SCI
> +# Range: 1-65534 (default: 1)

Where does this range 1-65534 come from? IEEE Std 802.1X-2010, 12.7
seems to imply that values 1-65535 should be allow and 65534 of those
values (i.e., 2-65535) are "virtual ports" while 1 identifies the
"common port".
Sabrina Dubroca Nov. 25, 2016, 2:18 p.m. UTC | #2
2016-11-19, 23:40:42 +0200, Jouni Malinen wrote:
> On Wed, Nov 02, 2016 at 04:38:39PM +0100, Sabrina Dubroca wrote:
> > Currently, wpa_supplicant only supports port == 1 in the SCI, but
> > users may want to choose a different port.
> 
> > +# macsec_port: IEEE 802.1X/MACsec port
> > +# Port component of the SCI
> > +# Range: 1-65534 (default: 1)
> 
> Where does this range 1-65534 come from? IEEE Std 802.1X-2010, 12.7
> seems to imply that values 1-65535 should be allow and 65534

Seems you're right. I think I was trying to make sure we don't
accidentally get the FF-FF-FF-FF-FF-FF-FF-FF SCI, or I mixed this up
with the end of range for port numbers.

Do you want me to send a patch, or do you prefer to fix it up directly
yourself?

> of those
> values (i.e., 2-65535) are "virtual ports" while 1 identifies the
> "common port".

Not exactly. These are all "controlled ports".
The "common port" is the lower insecure device for all the controlled
ports (with port numbers 1-65535), also shared with the "uncontrolled
port".
This is all a bit confusing.
Jouni Malinen Nov. 26, 2016, 9:16 a.m. UTC | #3
On Fri, Nov 25, 2016 at 03:18:17PM +0100, Sabrina Dubroca wrote:
> 2016-11-19, 23:40:42 +0200, Jouni Malinen wrote:
> > On Wed, Nov 02, 2016 at 04:38:39PM +0100, Sabrina Dubroca wrote:
> > > Currently, wpa_supplicant only supports port == 1 in the SCI, but
> > > users may want to choose a different port.
> > 
> > > +# macsec_port: IEEE 802.1X/MACsec port
> > > +# Port component of the SCI
> > > +# Range: 1-65534 (default: 1)
> > 
> > Where does this range 1-65534 come from? IEEE Std 802.1X-2010, 12.7
> > seems to imply that values 1-65535 should be allow and 65534
> 
> Seems you're right. I think I was trying to make sure we don't
> accidentally get the FF-FF-FF-FF-FF-FF-FF-FF SCI, or I mixed this up
> with the end of range for port numbers.
> 
> Do you want me to send a patch, or do you prefer to fix it up directly
> yourself?

Please send a patch to update this.
diff mbox

Patch

diff --git a/src/pae/ieee802_1x_kay.c b/src/pae/ieee802_1x_kay.c
index 9a8fd87ee9c7..e755e3df4674 100644
--- a/src/pae/ieee802_1x_kay.c
+++ b/src/pae/ieee802_1x_kay.c
@@ -3071,7 +3071,7 @@  static void kay_l2_receive(void *ctx, const u8 *src_addr, const u8 *buf,
  */
 struct ieee802_1x_kay *
 ieee802_1x_kay_init(struct ieee802_1x_kay_ctx *ctx, enum macsec_policy policy,
-		    const char *ifname, const u8 *addr)
+		    u16 port, const char *ifname, const u8 *addr)
 {
 	struct ieee802_1x_kay *kay;
 
@@ -3093,7 +3093,7 @@  ieee802_1x_kay_init(struct ieee802_1x_kay_ctx *ctx, enum macsec_policy policy,
 
 	os_strlcpy(kay->if_name, ifname, IFNAMSIZ);
 	os_memcpy(kay->actor_sci.addr, addr, ETH_ALEN);
-	kay->actor_sci.port = host_to_be16(0x0001);
+	kay->actor_sci.port = host_to_be16(port ? : 0x0001);
 	kay->actor_priority = DEFAULT_PRIO_NOT_KEY_SERVER;
 
 	/* While actor acts as a key server, shall distribute sakey */
diff --git a/src/pae/ieee802_1x_kay.h b/src/pae/ieee802_1x_kay.h
index fb49f6206f99..ea5a0ddcff5d 100644
--- a/src/pae/ieee802_1x_kay.h
+++ b/src/pae/ieee802_1x_kay.h
@@ -233,7 +233,7 @@  struct ieee802_1x_kay {
 
 struct ieee802_1x_kay *
 ieee802_1x_kay_init(struct ieee802_1x_kay_ctx *ctx, enum macsec_policy policy,
-		    const char *ifname, const u8 *addr);
+		    u16 port, const char *ifname, const u8 *addr);
 void ieee802_1x_kay_deinit(struct ieee802_1x_kay *kay);
 
 struct ieee802_1x_mka_participant *
diff --git a/wpa_supplicant/config.c b/wpa_supplicant/config.c
index a226b74612b2..c509af3404cd 100644
--- a/wpa_supplicant/config.c
+++ b/wpa_supplicant/config.c
@@ -2121,6 +2121,7 @@  static const struct parse_data ssid_fields[] = {
 #ifdef CONFIG_MACSEC
 	{ INT_RANGE(macsec_policy, 0, 1) },
 	{ INT_RANGE(macsec_integ_only, 0, 1) },
+	{ INT_RANGE(macsec_port, 1, 65534) },
 	{ FUNC_KEY(mka_cak) },
 	{ FUNC_KEY(mka_ckn) },
 #endif /* CONFIG_MACSEC */
diff --git a/wpa_supplicant/config_file.c b/wpa_supplicant/config_file.c
index 81457021a9d6..7afd41b6125b 100644
--- a/wpa_supplicant/config_file.c
+++ b/wpa_supplicant/config_file.c
@@ -773,6 +773,7 @@  static void wpa_config_write_network(FILE *f, struct wpa_ssid *ssid)
 #ifdef CONFIG_MACSEC
 	INT(macsec_policy);
 	INT(macsec_integ_only);
+	INT(macsec_port);
 #endif /* CONFIG_MACSEC */
 #ifdef CONFIG_HS20
 	INT(update_identifier);
diff --git a/wpa_supplicant/config_ssid.h b/wpa_supplicant/config_ssid.h
index 457b31340399..2cafad9e761a 100644
--- a/wpa_supplicant/config_ssid.h
+++ b/wpa_supplicant/config_ssid.h
@@ -742,6 +742,15 @@  struct wpa_ssid {
 	int macsec_integ_only;
 
 	/**
+	 * macsec_port - MACsec port (in SCI)
+	 *
+	 * Port component of the SCI.
+	 *
+	 * Range: 1-65534 (default: 1)
+	 */
+	int macsec_port;
+
+	/**
 	 * mka_ckn - MKA pre-shared CKN
 	 */
 #define MACSEC_CKN_LEN 32
diff --git a/wpa_supplicant/wpa_cli.c b/wpa_supplicant/wpa_cli.c
index aed95e66a7d4..f11028a9ea1b 100644
--- a/wpa_supplicant/wpa_cli.c
+++ b/wpa_supplicant/wpa_cli.c
@@ -1391,6 +1391,7 @@  static const char *network_fields[] = {
 #ifdef CONFIG_MACSEC
 	"macsec_policy",
 	"macsec_integ_only",
+	"macsec_port",
 #endif /* CONFIG_MACSEC */
 #ifdef CONFIG_HS20
 	"update_identifier",
diff --git a/wpa_supplicant/wpa_supplicant.conf b/wpa_supplicant/wpa_supplicant.conf
index 77972448134d..c7675775cfd2 100644
--- a/wpa_supplicant/wpa_supplicant.conf
+++ b/wpa_supplicant/wpa_supplicant.conf
@@ -899,6 +899,10 @@  fast_reauth=1
 # 0: Encrypt traffic (default)
 # 1: Integrity only
 #
+# macsec_port: IEEE 802.1X/MACsec port
+# Port component of the SCI
+# Range: 1-65534 (default: 1)
+#
 # mka_cak and mka_ckn: IEEE 802.1X/MACsec pre-shared authentication mode
 # This allows to configure MACsec with a pre-shared (CAK,CKN) pair.
 # In this mode, instances of wpa_supplicant can act as peers, one of
diff --git a/wpa_supplicant/wpas_kay.c b/wpa_supplicant/wpas_kay.c
index 17f485ab01e0..9b292a688cc8 100644
--- a/wpa_supplicant/wpas_kay.c
+++ b/wpa_supplicant/wpas_kay.c
@@ -232,7 +232,7 @@  int ieee802_1x_alloc_kay_sm(struct wpa_supplicant *wpa_s, struct wpa_ssid *ssid)
 	kay_ctx->enable_transmit_sa = wpas_enable_transmit_sa;
 	kay_ctx->disable_transmit_sa = wpas_disable_transmit_sa;
 
-	res = ieee802_1x_kay_init(kay_ctx, policy, wpa_s->ifname,
+	res = ieee802_1x_kay_init(kay_ctx, policy, ssid->macsec_port, wpa_s->ifname,
 				  wpa_s->own_addr);
 	if (res == NULL) {
 		os_free(kay_ctx);