Received: by 2002:a05:6358:bb9e:b0:b9:5105:a5b4 with SMTP id df30csp4011157rwb; Tue, 6 Sep 2022 00:41:57 -0700 (PDT) X-Google-Smtp-Source: AA6agR7B+6654XCIZfzdErjTtSRdJcYkorrvyvr7YYmANgnzfBmG+ysoRU9fbMyrMtxNHaFGTS8V X-Received: by 2002:a05:6a00:2446:b0:52b:e9a8:cb14 with SMTP id d6-20020a056a00244600b0052be9a8cb14mr2451322pfj.32.1662450117084; Tue, 06 Sep 2022 00:41:57 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1662450117; cv=none; d=google.com; s=arc-20160816; b=Ml6ve9akTsIMoqRCiZdF4qBn4am9Jqy7lXGsyKa0yEp6lQxlNwtFqPslLfMdDuzrOZ eOlfpGIiBkQ6dnidrbGx/OxwN5bsrDOzqP26BCYn0hgKXZrlO0I7tUmfdfsfubF57oo0 79318Rz7AxXKcovnW1PLd8IMwnHJpnOp3Q4S/gpwOLXspgz0wqkOoBHJij0q2q4p3omu ejCZUeYXKpaBL8ceiSgoiX4BKeDHqFvbZzINcLuNHrFtTaoPMXjqpwXAEd29oRqPQcVI hI/zUDGq4VEhLjALXLvCEzBLlSkB32fGtuXBKUlgRxZDqV7Qmkhz2b7govhDtfoYOZAX Ksvw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:user-agent :content-transfer-encoding:references:in-reply-to:date:to:from :subject:message-id:dkim-signature; bh=2YPH9zMFuRrlBRlqLuQlNT3BPy/7LG5BRdb35alfqwo=; b=K7oPZrcVLZqNHQ9SO9YL2ygQRYqx2eHXR/5LWGvtYvQK4fga2bnKuNNB3Yc7GsciEr YEd3oWGBPQg+Ph6YgOxvVWBRo6l/nwss9AIjMScZ28Hibp8IRXWnzR8olO2YXLRvGbDe 0ywQh8OR5xyFfK+g+od8GdefQ5mc0zcPc3fTr2SRdHwPOERVaO/Ztigmer0Gl7xb9DM0 pcxNa9dji9banB3RsfZWWTh8m+UmMroWX4lv37P4lpydV8xyoBKI6CzGlaxwBIdHsfdA kFE5knxQ/FjK0LXNoHkAaRim4stmIJLcC8WtuHEMQmNlNkR8cJ0dN3opGvco+KOCPW/0 kWkg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@sipsolutions.net header.s=mail header.b=l7xpKR5j; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=NONE sp=REJECT dis=NONE) header.from=sipsolutions.net Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id w14-20020a63c10e000000b0042ab429c5e5si7803373pgf.447.2022.09.06.00.41.48; Tue, 06 Sep 2022 00:41:57 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@sipsolutions.net header.s=mail header.b=l7xpKR5j; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=NONE sp=REJECT dis=NONE) header.from=sipsolutions.net Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233529AbiIFH2Y (ORCPT + 64 others); Tue, 6 Sep 2022 03:28:24 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:47850 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232638AbiIFH2X (ORCPT ); Tue, 6 Sep 2022 03:28:23 -0400 Received: from sipsolutions.net (s3.sipsolutions.net [IPv6:2a01:4f8:191:4433::2]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 67A9A72B7F for ; Tue, 6 Sep 2022 00:28:20 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=sipsolutions.net; s=mail; h=MIME-Version:Content-Transfer-Encoding: Content-Type:References:In-Reply-To:Date:To:From:Subject:Message-ID:Sender: Reply-To:Cc:Content-ID:Content-Description:Resent-Date:Resent-From:Resent-To: Resent-Cc:Resent-Message-ID; bh=2YPH9zMFuRrlBRlqLuQlNT3BPy/7LG5BRdb35alfqwo=; t=1662449300; x=1663658900; b=l7xpKR5jZpkyBbSDdNW6jcS4m3Zr/RWo2fGZd0EQxfihDVI 4gnt809tIYkn6xOLMmb66Tiq+8YnlniajqYfQdXkaBQzkkcZNAkt5DU4D5n8Dmzyxwwe3QpG/yqPz gn1leBGM9dtRNft6Q42INWGuDvb4pwC8P7AByTven2csy7BMP3LE+CATdZq+1IMx1h7uXJ5+dSKaD 59Axikst/a/SUa1GvnpydwVotLJ7LgtZlFWVoaafa8G6Uxerk+nP6a5e4Oi9ssWonOlaPpZWw651+ ZQeFh5pTLBt2VB79bJBhkruX0MiwwJVVEMDQ5zhMKxNcxBB8uZO2x3JFmrNvyTRQ==; Received: by sipsolutions.net with esmtpsa (TLS1.3:ECDHE_X25519__RSA_PSS_RSAE_SHA256__AES_256_GCM:256) (Exim 4.96) (envelope-from ) id 1oVT0L-009JTJ-1X; Tue, 06 Sep 2022 09:28:17 +0200 Message-ID: <09556b33ad998ad243cf75dbc230f3b07349a87e.camel@sipsolutions.net> Subject: Re: [PATCH 00/27] another set of MLO patches From: Johannes Berg To: Wen Gong , linux-wireless@vger.kernel.org Date: Tue, 06 Sep 2022 09:28:16 +0200 In-Reply-To: <6175bc95-201c-cfab-2ae6-9ba77e830394@quicinc.com> References: <20220902141259.377789-1-johannes@sipsolutions.net> <6175bc95-201c-cfab-2ae6-9ba77e830394@quicinc.com> Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable User-Agent: Evolution 3.44.4 (3.44.4-1.fc36) MIME-Version: 1.0 X-malware-bazaar: not-scanned X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,SPF_HELO_PASS,SPF_PASS, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org Hi, > The 3 commit below=C2=A0 > wifi: mac80211: mlme: transmit assoc frame with address translation > https://git.kernel.org/pub/scm/linux/kernel/git/wireless/wireless-next.gi= t/commit/?h=3Dmld&id=3D4ca04ed36478e21b037fc379a7e6f52d0e6d8d52 >=20 > wifi: mac80211: support MLO authentication/association with one link > https://git.kernel.org/pub/scm/linux/kernel/git/wireless/wireless-next.gi= t/commit/?h=3Dmld&id=3D81151ce462e533551f3284bfdb8e0f461c9220e6 >=20 > wifi: mac80211: do link->MLD address translation on RX > https://git.kernel.org/pub/scm/linux/kernel/git/wireless/wireless-next.gi= t/commit/?h=3Dmld&id=3D42fb9148c078004d07b4c39bd7b1086b6165780c (Just noting that they're not part of this patchset, they were there before) > changed to use MLD address for send=20 > authentication/assoc request for station and > changed to use MLD address of rx management packet include=20 > authentication/assoc response received by station from AP. Yes. > Does it has any description about the MLD adress in authentication/assoc= =20 > request/assoc response in IEEE P802.11be=E2=84=A2/D2.0 or other sepcifica= tion? Not _really_. I don't think the spec ever really talks about this since it simply doesn't (need to) care what you do inside your software stack. However, I believe there are (or will be) cases where even for management frames we will not want to make a determination which link to use to transmit - since they're "addressed to the MLD" (see D2.0 35.3.14 Multi-link device individually addressed Management frame delivery). Note also that for protected management frames, the MLD addresses become part of the AAD. Today, auth/assoc frames cannot be encrypted (though that may quite possibly change for assoc frames in the future), and for them also only a single link can be selected. However, I thought that from a software POV it would still be better if as many MLD-addressed frames actually carried MLD addresses in the software stack as possible, to unify things with the encryption requirements etc. The only exception to this is the first received authentication frame on the AP which cannot be translated in the stack/driver/firmware since we don't have a station entry for the new station yet, so hostapd has to be prepared to handle that very first frame with link addresses. johannes