xref: /freebsd/contrib/wpa/src/ap/tkip_countermeasures.c (revision 9a14aa017b21c292740c00ee098195cd46642730)
1 /*
2  * hostapd / TKIP countermeasures
3  * Copyright (c) 2002-2009, Jouni Malinen <j@w1.fi>
4  *
5  * This program is free software; you can redistribute it and/or modify
6  * it under the terms of the GNU General Public License version 2 as
7  * published by the Free Software Foundation.
8  *
9  * Alternatively, this software may be distributed under the terms of BSD
10  * license.
11  *
12  * See README and COPYING for more details.
13  */
14 
15 #include "utils/includes.h"
16 
17 #include "utils/common.h"
18 #include "utils/eloop.h"
19 #include "common/ieee802_11_defs.h"
20 #include "hostapd.h"
21 #include "sta_info.h"
22 #include "ap_mlme.h"
23 #include "wpa_auth.h"
24 #include "tkip_countermeasures.h"
25 
26 
27 static void ieee80211_tkip_countermeasures_stop(void *eloop_ctx,
28 						void *timeout_ctx)
29 {
30 	struct hostapd_data *hapd = eloop_ctx;
31 	hapd->tkip_countermeasures = 0;
32 	hapd->drv.set_countermeasures(hapd, 0);
33 	hostapd_logger(hapd, NULL, HOSTAPD_MODULE_IEEE80211,
34 		       HOSTAPD_LEVEL_INFO, "TKIP countermeasures ended");
35 }
36 
37 
38 static void ieee80211_tkip_countermeasures_start(struct hostapd_data *hapd)
39 {
40 	struct sta_info *sta;
41 
42 	hostapd_logger(hapd, NULL, HOSTAPD_MODULE_IEEE80211,
43 		       HOSTAPD_LEVEL_INFO, "TKIP countermeasures initiated");
44 
45 	wpa_auth_countermeasures_start(hapd->wpa_auth);
46 	hapd->tkip_countermeasures = 1;
47 	hapd->drv.set_countermeasures(hapd, 1);
48 	wpa_gtk_rekey(hapd->wpa_auth);
49 	eloop_cancel_timeout(ieee80211_tkip_countermeasures_stop, hapd, NULL);
50 	eloop_register_timeout(60, 0, ieee80211_tkip_countermeasures_stop,
51 			       hapd, NULL);
52 	for (sta = hapd->sta_list; sta != NULL; sta = sta->next) {
53 		hapd->drv.sta_deauth(hapd, sta->addr,
54 				     WLAN_REASON_MICHAEL_MIC_FAILURE);
55 		sta->flags &= ~(WLAN_STA_AUTH | WLAN_STA_ASSOC |
56 				WLAN_STA_AUTHORIZED);
57 		hapd->drv.sta_remove(hapd, sta->addr);
58 	}
59 }
60 
61 
62 void michael_mic_failure(struct hostapd_data *hapd, const u8 *addr, int local)
63 {
64 	time_t now;
65 
66 	if (addr && local) {
67 		struct sta_info *sta = ap_get_sta(hapd, addr);
68 		if (sta != NULL) {
69 			wpa_auth_sta_local_mic_failure_report(sta->wpa_sm);
70 			hostapd_logger(hapd, addr, HOSTAPD_MODULE_IEEE80211,
71 				       HOSTAPD_LEVEL_INFO,
72 				       "Michael MIC failure detected in "
73 				       "received frame");
74 			mlme_michaelmicfailure_indication(hapd, addr);
75 		} else {
76 			wpa_printf(MSG_DEBUG,
77 				   "MLME-MICHAELMICFAILURE.indication "
78 				   "for not associated STA (" MACSTR
79 				   ") ignored", MAC2STR(addr));
80 			return;
81 		}
82 	}
83 
84 	time(&now);
85 	if (now > hapd->michael_mic_failure + 60) {
86 		hapd->michael_mic_failures = 1;
87 	} else {
88 		hapd->michael_mic_failures++;
89 		if (hapd->michael_mic_failures > 1)
90 			ieee80211_tkip_countermeasures_start(hapd);
91 	}
92 	hapd->michael_mic_failure = now;
93 }
94