Date: Sat, 6 Feb 2010 23:39:41 +0100 From: Bernhard Schmidt <bschmidt@techwires.net> To: freebsd-net@freebsd.org Subject: Re: Software TKIP group rekeying and phase1 issue Message-ID: <201002062339.42721.bschmidt@techwires.net> In-Reply-To: <4B6DE57F.7060104@errno.com> References: <201002040915.04470.bschmidt@techwires.net> <4B6DE57F.7060104@errno.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Saturday 06 February 2010 22:56:15 Sam Leffler wrote: > Bernhard Schmidt wrote: > > Hi, > > > > When hostapd triggers rekeying of the group key, wpa_supplicant > > successfully sets the correct new key. On first use of the new key > > tkip_mixing_phase1() should be applied before decrypting any frames, > > tkip_decrypt() does this as > > > > if (iv32 != (u32)(key->wk_keyrsc[tid] >> 16) || !ctx->rx_phase1_done) { > > tkip_mixing_phase1(ctx->rx_ttak, key->wk_key, > > wh->i_addr2, iv32); > > ctx->rx_phase1_done = 1; > > } > > > > But, after a rekeying event, neither of this condition match, especially > > as rx_phase1_done is no longer zero, therefore tkip_mixing_phase1() isn't > > called which leads to dropped frames with "TKIP ICV mismatch on decrypt" > > messages. > > > > A working solution for that is to set rx_phase1_done to zero inside > > tkip_setkey(). I'm not sure whether that is the best solution or if it is > > better to set/reset the wk_keyrsc sequence, at least this diff works for > > me and few other over at the Forums. > > > > Index: sys/net80211/ieee80211_crypto_tkip.c > > =================================================================== > > --- sys/net80211/ieee80211_crypto_tkip.c (revision 203242) > > +++ sys/net80211/ieee80211_crypto_tkip.c (working copy) > > @@ -144,6 +144,8 @@ tkip_setkey(struct ieee80211_key *k) > > return 0; > > } > > k->wk_keytsc = 1; /* TSC starts at 1 */ > > + if (k->wk_flags & IEEE80211_KEY_GROUP) > > + ctx->rx_phase1_done = 0; > > return 1; > > } > > Reseting this flag in setkey looks right but why only for group keys? I > don't think you want to reset the keyrsc unless instructed; if I recall > a new RSC may be sent down by the authenticator when plumbing a key--but > it's been a while since I looked at this. > > Have you looked at other implementations? Doing that for all keys is probably right, have to test that. I did look at other implementation, they do zero out (tkip_ctx *)ctx inside tkip_setkey() and restore part of its content from the key, which has the side effect that rx_phase1_done also zero. No one handles that case intentionally. -- Bernhard
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201002062339.42721.bschmidt>