Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp2963852ybt; Mon, 29 Jun 2020 11:36:21 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwnF05PIqMEqaxE8DzJZmZJiN6bODIgDL4d8JhfcNUOGbU80rNLfZ6J5v57NpmdMSkbIxRe X-Received: by 2002:a50:d983:: with SMTP id w3mr18498024edj.110.1593455781654; Mon, 29 Jun 2020 11:36:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1593455781; cv=none; d=google.com; s=arc-20160816; b=GqmikMgaEf1Aiy6+Rh0or5darQo5WgMwD6fPzZsITB/6mwdgAZuINtsP09xX8QXR7l Zw4LSccHI9iWR01HWclihN7Mjol404u3ZQ6P8Wl3TcSQL4v+U+kk0ajKZsRJjlhxBFi6 C9W4lvH1CqJGaVHMJZjFSyQrDuXL9atDhOv8HNeang4yLcPUJYwo1wR742+HCoZJtOY5 rFi7AYRwfR0lfgCKV4QRM8wdL8TQMNicyAp984Qb7Sraeg/hLjkNomnHKbjQysNbNstB JIVma4LRMlpgB4HbGx5DsfBysjim0Q/BbXLPTPlL42TFF1pizyah0oIhfkiUI9DkXr7T nlPw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-language :content-transfer-encoding:mime-version:user-agent:date:message-id :subject:from:to; bh=fM9LFuGAFjmJWwByHQf5yOPRkmNSOuV53CLf4rdGiPs=; b=WlDB4/m1zNpNczh4kEz47Wdix8tpXc1XS9VtY+r1CCuJak987lXYjqjJy7LYPHV8Af RGc+hNDp12OptE1uNQGIrOPFb8GI6FRmRwOFYpJAj89/CG38MJDI2e5ig8lpkKHcqo/s hwRvQVp6HpQulr3BC7TgJUuTs7IthatKZBeALAHeZu9gVWkUohbQA5TfCxa4gmAT76fS KCP5l5Y6EF6J0+wMAwdUz7tsEflaKUDzllyYP/5Ci91vuvOiwVYa/O6mTj2yILAnqM23 4uCQpRR7VMsY1kFc4QCLNkcyvLKkQ3U7+VYKTdLKi4zJsBTwwtcHrMYIF3Vxj72vVQ6V E+RQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id h14si215752edv.119.2020.06.29.11.35.34; Mon, 29 Jun 2020 11:36:21 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726076AbgF2SfM (ORCPT + 99 others); Mon, 29 Jun 2020 14:35:12 -0400 Received: from smail.rz.tu-ilmenau.de ([141.24.186.67]:50561 "EHLO smail.rz.tu-ilmenau.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725994AbgF2SfM (ORCPT ); Mon, 29 Jun 2020 14:35:12 -0400 Received: from [192.168.178.24] (unknown [91.53.47.40]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smail.rz.tu-ilmenau.de (Postfix) with ESMTPSA id 3CF94580076 for ; Mon, 29 Jun 2020 19:40:03 +0200 (CEST) To: linux-wireless@vger.kernel.org From: Markus Theil Subject: RFC: Remote Off-Channel CAC for DFS Message-ID: Date: Mon, 29 Jun 2020 19:40:02 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.9.0 MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit Content-Language: en-US Sender: linux-wireless-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org When using DFS channels, it would be nice, if I could dedicate a small amount of interfaces only to CAC checking channels and set them available or unavailable on multiple other remote APs/Mesh Points in order to use them, when switching to lower utilized channels without going through a full CAC. Whats the opinion on the mailing list about adding a new command to nl80211 in order to set the DFS state of a currently not used channel after a Off-Channel CAC on another device nearby, but not on the same host? The parameters would roughly be the same as for a channel switch and an additional DFS channel state. Internally, I would trigger the DFS state sync code between multiple interfaces. Please note, that a malicious user, can misuse this and circumvent the initial CAC, but this possibility is always there by patching the kernel and all distribution kernels I'm aware off, are compiled without DFS support configured. Therefore a malicious user has already put in some energy and knows what he has to do. In my opinion this is therefore negligible. Regards, Markus