Received: by 2002:a25:c593:0:0:0:0:0 with SMTP id v141csp935334ybe; Wed, 11 Sep 2019 07:02:09 -0700 (PDT) X-Google-Smtp-Source: APXvYqzD0uXIourPSJwyHKgqfdfueEFH+HX++yjKCtpagmfDebdxRXvpzNS+1MmeByptGs314s5F X-Received: by 2002:a50:9e08:: with SMTP id z8mr37455495ede.305.1568210529638; Wed, 11 Sep 2019 07:02:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1568210529; cv=none; d=google.com; s=arc-20160816; b=xr7SXUdiHAQRSmTASOlGolVWeQC1sQjMzQXnzMwPadYdDXE7oiTo7VsPgc2JhvU9+z dKC56+qZ2kccj0acSV40zfP4eEqaTSev3CPgXsq1PzSIlz31cP5ppZd5hyfSYbGwB/i/ k5xhlWmQC8xB2iHLaamAF9sOp5ojcWEJ5vV+DtFdHDPqK/TA2kzF+lndC/f3Rc2P6pwq umF3hqp2euMGdDrfWpli3TbWL/0kmd9GkDyyc8WcFcloth0GWAGQom59XaCyvmpvTpqP CLxeOUvPRFbj8ooD76ZyAPGI7dclZObaTnVDFQi5UhPyLPKq/wAyh89STIX95L3nPZDK XOJA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:from:subject:cc:to:message-id:date; bh=+2j4qEj+10Wb4augBeB0C4GKpxuGez5+MOZ3tV2Bntw=; b=XI8d4JbbE0NyaUv3Rd//uKda39wf/63MjY1ESbtuRpo9ZUO/sbVm55S1Qb5zB7Na1d R78gfiCbSxl2TYDVu8HrTF55Wnwk0+9DKJ2plDnRdhxJHGQHQ87w0A4bn06JA+yLNGPO 6x5aX8z2v3C2l5xrA2ujhHacIiHZJzFoVtExYRE1VkyJnhA1BKZChOKAbgzUaWAJseDp mQUKL+sRwyO0kmk+LuixxwZJEwX/LUJnzuLL+u6i1GGu13Im6IfEImF52Mhf5F7xL8rm GV2i7tvFD46AvWY1v+Ed5XOVqj9Te6POCvVn+EnKHn1rgrq+zU4PEnLu0Pyscp7VOzdr 734g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-wireless-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g29si13109017edb.13.2019.09.11.07.01.44; Wed, 11 Sep 2019 07:02:09 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-wireless-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-wireless-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727656AbfIKN76 (ORCPT + 99 others); Wed, 11 Sep 2019 09:59:58 -0400 Received: from shards.monkeyblade.net ([23.128.96.9]:43630 "EHLO shards.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726149AbfIKN76 (ORCPT ); Wed, 11 Sep 2019 09:59:58 -0400 Received: from localhost (unknown [148.69.85.38]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (Client did not present a certificate) (Authenticated sender: davem-davemloft) by shards.monkeyblade.net (Postfix) with ESMTPSA id F279215002437; Wed, 11 Sep 2019 06:59:56 -0700 (PDT) Date: Wed, 11 Sep 2019 15:59:55 +0200 (CEST) Message-Id: <20190911.155955.1215273750491589577.davem@davemloft.net> To: johannes@sipsolutions.net Cc: jouni@codeaurora.org, linux-wireless@vger.kernel.org, netdev@vger.kernel.org Subject: Re: [PATCH] mac80211: Do not send Layer 2 Update frame before authorization From: David Miller In-Reply-To: References: <20190911130305.23704-1-jouni@codeaurora.org> X-Mailer: Mew version 6.8 on Emacs 26.2 Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.5.12 (shards.monkeyblade.net [149.20.54.216]); Wed, 11 Sep 2019 06:59:57 -0700 (PDT) Sender: linux-wireless-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org From: Johannes Berg Date: Wed, 11 Sep 2019 15:06:03 +0200 > On Wed, 2019-09-11 at 16:03 +0300, Jouni Malinen wrote: >> The Layer 2 Update frame is used to update bridges when a station roams >> to another AP even if that STA does not transmit any frames after the >> reassociation. This behavior was described in IEEE Std 802.11F-2003 as >> something that would happen based on MLME-ASSOCIATE.indication, i.e., >> before completing 4-way handshake. However, this IEEE trial-use >> recommended practice document was published before RSN (IEEE Std >> 802.11i-2004) and as such, did not consider RSN use cases. Furthermore, >> IEEE Std 802.11F-2003 was withdrawn in 2006 and as such, has not been >> maintained amd should not be used anymore. >> >> Sending out the Layer 2 Update frame immediately after association is >> fine for open networks (and also when using SAE, FT protocol, or FILS >> authentication when the station is actually authenticated by the time >> association completes). However, it is not appropriate for cases where >> RSN is used with PSK or EAP authentication since the station is actually >> fully authenticated only once the 4-way handshake completes after >> authentication and attackers might be able to use the unauthenticated >> triggering of Layer 2 Update frame transmission to disrupt bridge >> behavior. >> >> Fix this by postponing transmission of the Layer 2 Update frame from >> station entry addition to the point when the station entry is marked >> authorized. Similarly, send out the VLAN binding update only if the STA >> entry has already been authorized. > > Reviewed-by: Johannes Berg > > Dave, if you were still planning to send a pull request to Linus before > he closes the tree on Sunday this would be good to include (and we > should also backport it to stable later). > > If not, I can pick it up afterwards, let me know. Ok I applied this directly, thanks.