Return-path: Received: from mo4-p00-ob.smtp.rzone.de ([81.169.146.221]:26666 "EHLO mo4-p00-ob.smtp.rzone.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753243AbcJDV6F (ORCPT ); Tue, 4 Oct 2016 17:58:05 -0400 Subject: Re: [PATCHv3] wireless: check A-MSDU inner frame source address on AP interfaces To: Johannes Berg References: <1475075672-30549-1-git-send-email-michael-dev@fami-braun.de> <1475229714.17481.18.camel@sipsolutions.net> <1475569759.5324.22.camel@sipsolutions.net> <1475570219.5324.28.camel@sipsolutions.net> Cc: kvalo@codeaurora.org, akarwar@marvell.com, nishants@marvell.com, Larry.Finger@lwfinger.net, Jes.Sorensen@redhat.com, linux-wireless@vger.kernel.org, projekt-wlan@fem.tu-ilmenau.de From: "M. Braun" Message-ID: (sfid-20161004_235810_097074_1090FAEE) Date: Tue, 4 Oct 2016 23:57:23 +0200 MIME-Version: 1.0 In-Reply-To: <1475570219.5324.28.camel@sipsolutions.net> Content-Type: text/plain; charset=utf-8 Sender: linux-wireless-owner@vger.kernel.org List-ID: > * pass both for IBSS mode (I think) two more aspects for IBSS 1. the PSK is shared by all stations, so a passive attacker on any authenticated station in range will be able to derive it, right? 2. iff at all the source mac might be used for access control so a TA==SA A-AMSDU filter might still be reasonable. Michael