WPA packet number reuse with replayed messages and key reinstallation
Yaniv Klinger
yklinger at gmail.com
Wed Oct 18 08:45:56 PDT 2017
Hi,
On the "Impact on AP/Hostapd" section on the site it is mentioned that:
"When AP/Authenticator implementation in hostapd is requested to rekey
the PTK without performing EAP reauthentication (either through local
periodic rekeying or due to a request from an association station),
the ANonce value does not get updated ... "
My question if this case is applicable only to Fast BSS Transition
(FT), because as I see it, it might happen also on WPA, when
supplicant has a MIC problem, regardless of FT, and AP is not running
local periodic rekeying. If so, is this patch needed ?
here is the diff :
- else if (sm->PTKRequest)
- SM_ENTER(WPA_PTK, PTKSTART);
- else switch (sm->wpa_ptk_state) {
+ else if (sm->PTKRequest) {
+ if (wpa_auth_sm_ptk_update(sm) < 0)
+ SM_ENTER(WPA_PTK, DISCONNECTED);
+ else
+ SM_ENTER(WPA_PTK, PTKSTART);
+ } else switch (sm->wpa_ptk_state) {
Thanks,
Klinger.
More information about the Hostap
mailing list