blob: dd5aa68790d69e8d3dfb1b409ca849545066e141 [file] [log] [blame]
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001/*
2 * hostapd / TKIP countermeasures
Dmitry Shmidt04949592012-07-19 12:16:46 -07003 * Copyright (c) 2002-2012, Jouni Malinen <j@w1.fi>
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004 *
Dmitry Shmidtc5ec7f52012-03-06 16:33:24 -08005 * This software may be distributed under the terms of the BSD license.
6 * See README for more details.
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07007 */
8
9#include "utils/includes.h"
10
11#include "utils/common.h"
12#include "utils/eloop.h"
13#include "common/ieee802_11_defs.h"
Dmitry Shmidt04949592012-07-19 12:16:46 -070014#include "radius/radius.h"
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -070015#include "hostapd.h"
16#include "sta_info.h"
17#include "ap_mlme.h"
18#include "wpa_auth.h"
19#include "ap_drv_ops.h"
20#include "tkip_countermeasures.h"
21
22
23static void ieee80211_tkip_countermeasures_stop(void *eloop_ctx,
24 void *timeout_ctx)
25{
26 struct hostapd_data *hapd = eloop_ctx;
27 hapd->tkip_countermeasures = 0;
28 hostapd_drv_set_countermeasures(hapd, 0);
29 hostapd_logger(hapd, NULL, HOSTAPD_MODULE_IEEE80211,
30 HOSTAPD_LEVEL_INFO, "TKIP countermeasures ended");
31}
32
33
34static void ieee80211_tkip_countermeasures_start(struct hostapd_data *hapd)
35{
36 struct sta_info *sta;
37
38 hostapd_logger(hapd, NULL, HOSTAPD_MODULE_IEEE80211,
39 HOSTAPD_LEVEL_INFO, "TKIP countermeasures initiated");
40
41 wpa_auth_countermeasures_start(hapd->wpa_auth);
42 hapd->tkip_countermeasures = 1;
43 hostapd_drv_set_countermeasures(hapd, 1);
44 wpa_gtk_rekey(hapd->wpa_auth);
45 eloop_cancel_timeout(ieee80211_tkip_countermeasures_stop, hapd, NULL);
46 eloop_register_timeout(60, 0, ieee80211_tkip_countermeasures_stop,
47 hapd, NULL);
Dmitry Shmidt04949592012-07-19 12:16:46 -070048 while ((sta = hapd->sta_list)) {
49 sta->acct_terminate_cause =
50 RADIUS_ACCT_TERMINATE_CAUSE_ADMIN_RESET;
51 if (sta->flags & WLAN_STA_AUTH) {
52 mlme_deauthenticate_indication(
53 hapd, sta,
54 WLAN_REASON_MICHAEL_MIC_FAILURE);
55 }
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -070056 hostapd_drv_sta_deauth(hapd, sta->addr,
57 WLAN_REASON_MICHAEL_MIC_FAILURE);
Dmitry Shmidt04949592012-07-19 12:16:46 -070058 ap_free_sta(hapd, sta);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -070059 }
60}
61
62
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -080063void ieee80211_tkip_countermeasures_deinit(struct hostapd_data *hapd)
64{
65 eloop_cancel_timeout(ieee80211_tkip_countermeasures_stop, hapd, NULL);
66}
67
68
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -070069void michael_mic_failure(struct hostapd_data *hapd, const u8 *addr, int local)
70{
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -080071 struct os_time now;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -070072
73 if (addr && local) {
74 struct sta_info *sta = ap_get_sta(hapd, addr);
75 if (sta != NULL) {
76 wpa_auth_sta_local_mic_failure_report(sta->wpa_sm);
77 hostapd_logger(hapd, addr, HOSTAPD_MODULE_IEEE80211,
78 HOSTAPD_LEVEL_INFO,
79 "Michael MIC failure detected in "
80 "received frame");
81 mlme_michaelmicfailure_indication(hapd, addr);
82 } else {
83 wpa_printf(MSG_DEBUG,
84 "MLME-MICHAELMICFAILURE.indication "
85 "for not associated STA (" MACSTR
86 ") ignored", MAC2STR(addr));
87 return;
88 }
89 }
90
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -080091 os_get_time(&now);
92 if (now.sec > hapd->michael_mic_failure + 60) {
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -070093 hapd->michael_mic_failures = 1;
94 } else {
95 hapd->michael_mic_failures++;
96 if (hapd->michael_mic_failures > 1)
97 ieee80211_tkip_countermeasures_start(hapd);
98 }
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -080099 hapd->michael_mic_failure = now.sec;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700100}