• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * hostapd / TKIP countermeasures
3  * Copyright (c) 2002-2011, Jouni Malinen <j@w1.fi>
4  *
5  * This software may be distributed under the terms of the BSD license.
6  * See README for more details.
7  */
8 
9 #include "utils/includes.h"
10 
11 #include "utils/common.h"
12 #include "utils/eloop.h"
13 #include "common/ieee802_11_defs.h"
14 #include "hostapd.h"
15 #include "sta_info.h"
16 #include "ap_mlme.h"
17 #include "wpa_auth.h"
18 #include "ap_drv_ops.h"
19 #include "tkip_countermeasures.h"
20 
21 
ieee80211_tkip_countermeasures_stop(void * eloop_ctx,void * timeout_ctx)22 static void ieee80211_tkip_countermeasures_stop(void *eloop_ctx,
23 						void *timeout_ctx)
24 {
25 	struct hostapd_data *hapd = eloop_ctx;
26 	hapd->tkip_countermeasures = 0;
27 	hostapd_drv_set_countermeasures(hapd, 0);
28 	hostapd_logger(hapd, NULL, HOSTAPD_MODULE_IEEE80211,
29 		       HOSTAPD_LEVEL_INFO, "TKIP countermeasures ended");
30 }
31 
32 
ieee80211_tkip_countermeasures_start(struct hostapd_data * hapd)33 static void ieee80211_tkip_countermeasures_start(struct hostapd_data *hapd)
34 {
35 	struct sta_info *sta;
36 
37 	hostapd_logger(hapd, NULL, HOSTAPD_MODULE_IEEE80211,
38 		       HOSTAPD_LEVEL_INFO, "TKIP countermeasures initiated");
39 
40 	wpa_auth_countermeasures_start(hapd->wpa_auth);
41 	hapd->tkip_countermeasures = 1;
42 	hostapd_drv_set_countermeasures(hapd, 1);
43 	wpa_gtk_rekey(hapd->wpa_auth);
44 	eloop_cancel_timeout(ieee80211_tkip_countermeasures_stop, hapd, NULL);
45 	eloop_register_timeout(60, 0, ieee80211_tkip_countermeasures_stop,
46 			       hapd, NULL);
47 	for (sta = hapd->sta_list; sta != NULL; sta = sta->next) {
48 		hostapd_drv_sta_deauth(hapd, sta->addr,
49 				       WLAN_REASON_MICHAEL_MIC_FAILURE);
50 		ap_sta_set_authorized(hapd, sta, 0);
51 		sta->flags &= ~(WLAN_STA_AUTH | WLAN_STA_ASSOC);
52 		hostapd_drv_sta_remove(hapd, sta->addr);
53 	}
54 }
55 
56 
ieee80211_tkip_countermeasures_deinit(struct hostapd_data * hapd)57 void ieee80211_tkip_countermeasures_deinit(struct hostapd_data *hapd)
58 {
59 	eloop_cancel_timeout(ieee80211_tkip_countermeasures_stop, hapd, NULL);
60 }
61 
62 
michael_mic_failure(struct hostapd_data * hapd,const u8 * addr,int local)63 void michael_mic_failure(struct hostapd_data *hapd, const u8 *addr, int local)
64 {
65 	struct os_time now;
66 
67 	if (addr && local) {
68 		struct sta_info *sta = ap_get_sta(hapd, addr);
69 		if (sta != NULL) {
70 			wpa_auth_sta_local_mic_failure_report(sta->wpa_sm);
71 			hostapd_logger(hapd, addr, HOSTAPD_MODULE_IEEE80211,
72 				       HOSTAPD_LEVEL_INFO,
73 				       "Michael MIC failure detected in "
74 				       "received frame");
75 			mlme_michaelmicfailure_indication(hapd, addr);
76 		} else {
77 			wpa_printf(MSG_DEBUG,
78 				   "MLME-MICHAELMICFAILURE.indication "
79 				   "for not associated STA (" MACSTR
80 				   ") ignored", MAC2STR(addr));
81 			return;
82 		}
83 	}
84 
85 	os_get_time(&now);
86 	if (now.sec > hapd->michael_mic_failure + 60) {
87 		hapd->michael_mic_failures = 1;
88 	} else {
89 		hapd->michael_mic_failures++;
90 		if (hapd->michael_mic_failures > 1)
91 			ieee80211_tkip_countermeasures_start(hapd);
92 	}
93 	hapd->michael_mic_failure = now.sec;
94 }
95