tkip_countermeasures.c 2.6 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495
  1. /*
  2. * hostapd / TKIP countermeasures
  3. * Copyright (c) 2002-2009, Jouni Malinen <j@w1.fi>
  4. *
  5. * This program is free software; you can redistribute it and/or modify
  6. * it under the terms of the GNU General Public License version 2 as
  7. * published by the Free Software Foundation.
  8. *
  9. * Alternatively, this software may be distributed under the terms of BSD
  10. * license.
  11. *
  12. * See README and COPYING for more details.
  13. */
  14. #include "includes.h"
  15. #include "common.h"
  16. #include "hostapd.h"
  17. #include "eloop.h"
  18. #include "driver_i.h"
  19. #include "sta_flags.h"
  20. #include "sta_info.h"
  21. #include "mlme.h"
  22. #include "wpa.h"
  23. #include "common/ieee802_11_defs.h"
  24. #include "tkip_countermeasures.h"
  25. static void ieee80211_tkip_countermeasures_stop(void *eloop_ctx,
  26. void *timeout_ctx)
  27. {
  28. struct hostapd_data *hapd = eloop_ctx;
  29. hapd->tkip_countermeasures = 0;
  30. hostapd_set_countermeasures(hapd, 0);
  31. hostapd_logger(hapd, NULL, HOSTAPD_MODULE_IEEE80211,
  32. HOSTAPD_LEVEL_INFO, "TKIP countermeasures ended");
  33. }
  34. static void ieee80211_tkip_countermeasures_start(struct hostapd_data *hapd)
  35. {
  36. struct sta_info *sta;
  37. hostapd_logger(hapd, NULL, HOSTAPD_MODULE_IEEE80211,
  38. HOSTAPD_LEVEL_INFO, "TKIP countermeasures initiated");
  39. wpa_auth_countermeasures_start(hapd->wpa_auth);
  40. hapd->tkip_countermeasures = 1;
  41. hostapd_set_countermeasures(hapd, 1);
  42. wpa_gtk_rekey(hapd->wpa_auth);
  43. eloop_cancel_timeout(ieee80211_tkip_countermeasures_stop, hapd, NULL);
  44. eloop_register_timeout(60, 0, ieee80211_tkip_countermeasures_stop,
  45. hapd, NULL);
  46. for (sta = hapd->sta_list; sta != NULL; sta = sta->next) {
  47. hostapd_sta_deauth(hapd, sta->addr,
  48. WLAN_REASON_MICHAEL_MIC_FAILURE);
  49. sta->flags &= ~(WLAN_STA_AUTH | WLAN_STA_ASSOC |
  50. WLAN_STA_AUTHORIZED);
  51. hostapd_sta_remove(hapd, sta->addr);
  52. }
  53. }
  54. void michael_mic_failure(struct hostapd_data *hapd, const u8 *addr, int local)
  55. {
  56. time_t now;
  57. if (addr && local) {
  58. struct sta_info *sta = ap_get_sta(hapd, addr);
  59. if (sta != NULL) {
  60. wpa_auth_sta_local_mic_failure_report(sta->wpa_sm);
  61. hostapd_logger(hapd, addr, HOSTAPD_MODULE_IEEE80211,
  62. HOSTAPD_LEVEL_INFO,
  63. "Michael MIC failure detected in "
  64. "received frame");
  65. mlme_michaelmicfailure_indication(hapd, addr);
  66. } else {
  67. wpa_printf(MSG_DEBUG,
  68. "MLME-MICHAELMICFAILURE.indication "
  69. "for not associated STA (" MACSTR
  70. ") ignored", MAC2STR(addr));
  71. return;
  72. }
  73. }
  74. time(&now);
  75. if (now > hapd->michael_mic_failure + 60) {
  76. hapd->michael_mic_failures = 1;
  77. } else {
  78. hapd->michael_mic_failures++;
  79. if (hapd->michael_mic_failures > 1)
  80. ieee80211_tkip_countermeasures_start(hapd);
  81. }
  82. hapd->michael_mic_failure = now;
  83. }