hostap + mac filtering

Sam Leffler sam
Wed Sep 28 09:26:44 PDT 2005


Jouni Malinen wrote:
> On Tue, Sep 27, 2005 at 10:37:53PM -0400, Bryan Kadzban wrote:
> 
> 
>>With our old Orinoco APs, when we configured a MAC ACL, any MAC address
>>that wasn't allowed according to that list wasn't even allowed to
>>associate.  Sounds like those APs did that in the driver, too.  (They
>>used Atheros radios, but I don't know what OS.)
> 
> 
> This does not necessarily mean it was done in the driver. As an example,
> Host AP driver supports MAC ACL both with and without hostapd. With
> hostapd, it is up to hostapd to do filtering and without hostapd, driver
> will do this.
> 
> 
>>The aforementioned Orinoco APs also had a "MAC access control by RADIUS"
>>option (the Ciscos that we use now have the same thing), which works
>>similarly -- the AP allows anyone to associate, but if the RADIUS server
>>sends an Access-Reject, then that client can't pass traffic through the
>>AP.  Sounds vaguely similar to what you're considering here.
>>
>>I wonder if a "MAC access control by RADIUS" feature would be helpful in
>>hostapd.
> 
> 
> It is already supported in hostapd with Prism2. Though, hostapd is doing
> this at the same time as the static MAC ACLs, i.e., before association.
> In case of madwifi, this could be done by having a way for hostapd to
> register a callback for madwifi to ask whether a STA is allowed to
> authenticate.

Set the net80211 layer into "external authenticator mode" (as used for 
wpa, etc); then hostapd can decide whether or not to authorize traffic 
after querying the radius server.  Doesn't give control before associate 
but perhaps it's sufficient.

> 
> 
>>   The Orinoco APs were configurable; the username was the MAC
>>address in one of 4 formats (xx.xx.xx..., xx-xx-xx..., xxxxxx-xxxxxx, or
>>one other one that I can't remember anymore), and the password was the
>>RADIUS shared secret.  The Cisco APs send a username of xxxxxxxxxx, and
>>the password is the same as the username.
> 
> 
>>If someone plans on doing this, they might as well come up with as many
>>username/password format options as possible, and make it configurable.
> 
> 
> This is very much configurable.. In hostapd source code.. ;-) Anyway, I
> don't see much point in spending much more time with this kind of
> feature.

I agree this discussion has been exhausted but just to clarify things; 
hostapd is integrated with the net80211 layer in madwifi _purely_ to do 
authentication (in fact when I first did the integration I renamed it so 
folks wouldn't look for things like mac acls :)).  Unfortunately there's 
no way for a driver to identify that hostapd features are not supported 
so hostapd can notify users.

	Sam




More information about the Hostap mailing list