preauth.c 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541
  1. /*
  2. * RSN pre-authentication (supplicant)
  3. * Copyright (c) 2003-2015, Jouni Malinen <j@w1.fi>
  4. *
  5. * This software may be distributed under the terms of the BSD license.
  6. * See README for more details.
  7. */
  8. #include "includes.h"
  9. #include "common.h"
  10. #include "wpa.h"
  11. #include "eloop.h"
  12. #include "l2_packet/l2_packet.h"
  13. #include "eapol_supp/eapol_supp_sm.h"
  14. #include "preauth.h"
  15. #include "pmksa_cache.h"
  16. #include "wpa_i.h"
  17. #if defined(IEEE8021X_EAPOL) && !defined(CONFIG_NO_WPA)
  18. #define PMKID_CANDIDATE_PRIO_SCAN 1000
  19. struct rsn_pmksa_candidate {
  20. struct dl_list list;
  21. u8 bssid[ETH_ALEN];
  22. int priority;
  23. };
  24. /**
  25. * pmksa_candidate_free - Free all entries in PMKSA candidate list
  26. * @sm: Pointer to WPA state machine data from wpa_sm_init()
  27. */
  28. void pmksa_candidate_free(struct wpa_sm *sm)
  29. {
  30. struct rsn_pmksa_candidate *entry, *n;
  31. if (sm == NULL)
  32. return;
  33. dl_list_for_each_safe(entry, n, &sm->pmksa_candidates,
  34. struct rsn_pmksa_candidate, list) {
  35. dl_list_del(&entry->list);
  36. os_free(entry);
  37. }
  38. }
  39. static void rsn_preauth_receive(void *ctx, const u8 *src_addr,
  40. const u8 *buf, size_t len)
  41. {
  42. struct wpa_sm *sm = ctx;
  43. wpa_printf(MSG_DEBUG, "RX pre-auth from " MACSTR, MAC2STR(src_addr));
  44. wpa_hexdump(MSG_MSGDUMP, "RX pre-auth", buf, len);
  45. if (sm->preauth_eapol == NULL ||
  46. is_zero_ether_addr(sm->preauth_bssid) ||
  47. os_memcmp(sm->preauth_bssid, src_addr, ETH_ALEN) != 0) {
  48. wpa_printf(MSG_WARNING, "RSN pre-auth frame received from "
  49. "unexpected source " MACSTR " - dropped",
  50. MAC2STR(src_addr));
  51. return;
  52. }
  53. eapol_sm_rx_eapol(sm->preauth_eapol, src_addr, buf, len);
  54. }
  55. static void rsn_preauth_eapol_cb(struct eapol_sm *eapol,
  56. enum eapol_supp_result result,
  57. void *ctx)
  58. {
  59. struct wpa_sm *sm = ctx;
  60. u8 pmk[PMK_LEN];
  61. if (result == EAPOL_SUPP_RESULT_SUCCESS) {
  62. int res, pmk_len;
  63. pmk_len = PMK_LEN;
  64. res = eapol_sm_get_key(eapol, pmk, PMK_LEN);
  65. if (res) {
  66. /*
  67. * EAP-LEAP is an exception from other EAP methods: it
  68. * uses only 16-byte PMK.
  69. */
  70. res = eapol_sm_get_key(eapol, pmk, 16);
  71. pmk_len = 16;
  72. }
  73. if (res == 0) {
  74. wpa_hexdump_key(MSG_DEBUG, "RSN: PMK from pre-auth",
  75. pmk, pmk_len);
  76. sm->pmk_len = pmk_len;
  77. pmksa_cache_add(sm->pmksa, pmk, pmk_len,
  78. NULL, 0,
  79. sm->preauth_bssid, sm->own_addr,
  80. sm->network_ctx,
  81. WPA_KEY_MGMT_IEEE8021X);
  82. } else {
  83. wpa_msg(sm->ctx->msg_ctx, MSG_INFO,
  84. "RSN: failed to get master session key from "
  85. "pre-auth EAPOL state machines");
  86. result = EAPOL_SUPP_RESULT_FAILURE;
  87. }
  88. }
  89. wpa_msg(sm->ctx->msg_ctx, MSG_INFO, "RSN: pre-authentication with "
  90. MACSTR " %s", MAC2STR(sm->preauth_bssid),
  91. result == EAPOL_SUPP_RESULT_SUCCESS ? "completed successfully" :
  92. "failed");
  93. rsn_preauth_deinit(sm);
  94. rsn_preauth_candidate_process(sm);
  95. }
  96. static void rsn_preauth_timeout(void *eloop_ctx, void *timeout_ctx)
  97. {
  98. struct wpa_sm *sm = eloop_ctx;
  99. wpa_msg(sm->ctx->msg_ctx, MSG_INFO, "RSN: pre-authentication with "
  100. MACSTR " timed out", MAC2STR(sm->preauth_bssid));
  101. rsn_preauth_deinit(sm);
  102. rsn_preauth_candidate_process(sm);
  103. }
  104. static int rsn_preauth_eapol_send(void *ctx, int type, const u8 *buf,
  105. size_t len)
  106. {
  107. struct wpa_sm *sm = ctx;
  108. u8 *msg;
  109. size_t msglen;
  110. int res;
  111. /* TODO: could add l2_packet_sendmsg that allows fragments to avoid
  112. * extra copy here */
  113. if (sm->l2_preauth == NULL)
  114. return -1;
  115. msg = wpa_sm_alloc_eapol(sm, type, buf, len, &msglen, NULL);
  116. if (msg == NULL)
  117. return -1;
  118. wpa_hexdump(MSG_MSGDUMP, "TX EAPOL (preauth)", msg, msglen);
  119. res = l2_packet_send(sm->l2_preauth, sm->preauth_bssid,
  120. ETH_P_RSN_PREAUTH, msg, msglen);
  121. os_free(msg);
  122. return res;
  123. }
  124. /**
  125. * rsn_preauth_init - Start new RSN pre-authentication
  126. * @sm: Pointer to WPA state machine data from wpa_sm_init()
  127. * @dst: Authenticator address (BSSID) with which to preauthenticate
  128. * @eap_conf: Current EAP configuration
  129. * Returns: 0 on success, -1 on another pre-authentication is in progress,
  130. * -2 on layer 2 packet initialization failure, -3 on EAPOL state machine
  131. * initialization failure, -4 on memory allocation failure
  132. *
  133. * This function request an RSN pre-authentication with a given destination
  134. * address. This is usually called for PMKSA candidates found from scan results
  135. * or from driver reports. In addition, ctrl_iface PREAUTH command can trigger
  136. * pre-authentication.
  137. */
  138. int rsn_preauth_init(struct wpa_sm *sm, const u8 *dst,
  139. struct eap_peer_config *eap_conf)
  140. {
  141. struct eapol_config eapol_conf;
  142. struct eapol_ctx *ctx;
  143. int ret;
  144. if (sm->preauth_eapol)
  145. return -1;
  146. wpa_msg(sm->ctx->msg_ctx, MSG_DEBUG,
  147. "RSN: starting pre-authentication with " MACSTR, MAC2STR(dst));
  148. sm->l2_preauth = l2_packet_init(sm->ifname, sm->own_addr,
  149. ETH_P_RSN_PREAUTH,
  150. rsn_preauth_receive, sm, 0);
  151. if (sm->l2_preauth == NULL) {
  152. wpa_printf(MSG_WARNING, "RSN: Failed to initialize L2 packet "
  153. "processing for pre-authentication");
  154. return -2;
  155. }
  156. if (sm->bridge_ifname) {
  157. sm->l2_preauth_br = l2_packet_init(sm->bridge_ifname,
  158. sm->own_addr,
  159. ETH_P_RSN_PREAUTH,
  160. rsn_preauth_receive, sm, 0);
  161. if (sm->l2_preauth_br == NULL) {
  162. wpa_printf(MSG_WARNING, "RSN: Failed to initialize L2 "
  163. "packet processing (bridge) for "
  164. "pre-authentication");
  165. ret = -2;
  166. goto fail;
  167. }
  168. }
  169. ctx = os_zalloc(sizeof(*ctx));
  170. if (ctx == NULL) {
  171. wpa_printf(MSG_WARNING, "Failed to allocate EAPOL context.");
  172. ret = -4;
  173. goto fail;
  174. }
  175. ctx->ctx = sm->ctx->ctx;
  176. ctx->msg_ctx = sm->ctx->ctx;
  177. ctx->preauth = 1;
  178. ctx->cb = rsn_preauth_eapol_cb;
  179. ctx->cb_ctx = sm;
  180. ctx->scard_ctx = sm->scard_ctx;
  181. ctx->eapol_send = rsn_preauth_eapol_send;
  182. ctx->eapol_send_ctx = sm;
  183. ctx->set_config_blob = sm->ctx->set_config_blob;
  184. ctx->get_config_blob = sm->ctx->get_config_blob;
  185. sm->preauth_eapol = eapol_sm_init(ctx);
  186. if (sm->preauth_eapol == NULL) {
  187. os_free(ctx);
  188. wpa_printf(MSG_WARNING, "RSN: Failed to initialize EAPOL "
  189. "state machines for pre-authentication");
  190. ret = -3;
  191. goto fail;
  192. }
  193. os_memset(&eapol_conf, 0, sizeof(eapol_conf));
  194. eapol_conf.accept_802_1x_keys = 0;
  195. eapol_conf.required_keys = 0;
  196. eapol_conf.fast_reauth = sm->fast_reauth;
  197. eapol_conf.workaround = sm->eap_workaround;
  198. eapol_sm_notify_config(sm->preauth_eapol, eap_conf, &eapol_conf);
  199. /*
  200. * Use a shorter startPeriod with preauthentication since the first
  201. * preauth EAPOL-Start frame may end up being dropped due to race
  202. * condition in the AP between the data receive and key configuration
  203. * after the 4-Way Handshake.
  204. */
  205. eapol_sm_configure(sm->preauth_eapol, -1, -1, 5, 6);
  206. os_memcpy(sm->preauth_bssid, dst, ETH_ALEN);
  207. eapol_sm_notify_portValid(sm->preauth_eapol, TRUE);
  208. /* 802.1X::portControl = Auto */
  209. eapol_sm_notify_portEnabled(sm->preauth_eapol, TRUE);
  210. eloop_register_timeout(sm->dot11RSNAConfigSATimeout, 0,
  211. rsn_preauth_timeout, sm, NULL);
  212. return 0;
  213. fail:
  214. if (sm->l2_preauth_br) {
  215. l2_packet_deinit(sm->l2_preauth_br);
  216. sm->l2_preauth_br = NULL;
  217. }
  218. l2_packet_deinit(sm->l2_preauth);
  219. sm->l2_preauth = NULL;
  220. return ret;
  221. }
  222. /**
  223. * rsn_preauth_deinit - Abort RSN pre-authentication
  224. * @sm: Pointer to WPA state machine data from wpa_sm_init()
  225. *
  226. * This function aborts the current RSN pre-authentication (if one is started)
  227. * and frees resources allocated for it.
  228. */
  229. void rsn_preauth_deinit(struct wpa_sm *sm)
  230. {
  231. if (sm == NULL || !sm->preauth_eapol)
  232. return;
  233. eloop_cancel_timeout(rsn_preauth_timeout, sm, NULL);
  234. eapol_sm_deinit(sm->preauth_eapol);
  235. sm->preauth_eapol = NULL;
  236. os_memset(sm->preauth_bssid, 0, ETH_ALEN);
  237. l2_packet_deinit(sm->l2_preauth);
  238. sm->l2_preauth = NULL;
  239. if (sm->l2_preauth_br) {
  240. l2_packet_deinit(sm->l2_preauth_br);
  241. sm->l2_preauth_br = NULL;
  242. }
  243. }
  244. /**
  245. * rsn_preauth_candidate_process - Process PMKSA candidates
  246. * @sm: Pointer to WPA state machine data from wpa_sm_init()
  247. *
  248. * Go through the PMKSA candidates and start pre-authentication if a candidate
  249. * without an existing PMKSA cache entry is found. Processed candidates will be
  250. * removed from the list.
  251. */
  252. void rsn_preauth_candidate_process(struct wpa_sm *sm)
  253. {
  254. struct rsn_pmksa_candidate *candidate, *n;
  255. if (dl_list_empty(&sm->pmksa_candidates))
  256. return;
  257. /* TODO: drop priority for old candidate entries */
  258. wpa_msg(sm->ctx->msg_ctx, MSG_DEBUG, "RSN: processing PMKSA candidate "
  259. "list");
  260. if (sm->preauth_eapol ||
  261. sm->proto != WPA_PROTO_RSN ||
  262. wpa_sm_get_state(sm) != WPA_COMPLETED ||
  263. (sm->key_mgmt != WPA_KEY_MGMT_IEEE8021X &&
  264. sm->key_mgmt != WPA_KEY_MGMT_IEEE8021X_SHA256 &&
  265. sm->key_mgmt != WPA_KEY_MGMT_IEEE8021X_SUITE_B &&
  266. sm->key_mgmt != WPA_KEY_MGMT_IEEE8021X_SUITE_B_192)) {
  267. wpa_msg(sm->ctx->msg_ctx, MSG_DEBUG, "RSN: not in suitable "
  268. "state for new pre-authentication");
  269. return; /* invalid state for new pre-auth */
  270. }
  271. dl_list_for_each_safe(candidate, n, &sm->pmksa_candidates,
  272. struct rsn_pmksa_candidate, list) {
  273. struct rsn_pmksa_cache_entry *p = NULL;
  274. p = pmksa_cache_get(sm->pmksa, candidate->bssid, NULL, NULL);
  275. if (os_memcmp(sm->bssid, candidate->bssid, ETH_ALEN) != 0 &&
  276. (p == NULL || p->opportunistic)) {
  277. wpa_msg(sm->ctx->msg_ctx, MSG_DEBUG, "RSN: PMKSA "
  278. "candidate " MACSTR
  279. " selected for pre-authentication",
  280. MAC2STR(candidate->bssid));
  281. dl_list_del(&candidate->list);
  282. rsn_preauth_init(sm, candidate->bssid,
  283. sm->eap_conf_ctx);
  284. os_free(candidate);
  285. return;
  286. }
  287. wpa_msg(sm->ctx->msg_ctx, MSG_DEBUG, "RSN: PMKSA candidate "
  288. MACSTR " does not need pre-authentication anymore",
  289. MAC2STR(candidate->bssid));
  290. /* Some drivers (e.g., NDIS) expect to get notified about the
  291. * PMKIDs again, so report the existing data now. */
  292. if (p) {
  293. wpa_sm_add_pmkid(sm, candidate->bssid, p->pmkid);
  294. }
  295. dl_list_del(&candidate->list);
  296. os_free(candidate);
  297. }
  298. wpa_msg(sm->ctx->msg_ctx, MSG_DEBUG, "RSN: no more pending PMKSA "
  299. "candidates");
  300. }
  301. /**
  302. * pmksa_candidate_add - Add a new PMKSA candidate
  303. * @sm: Pointer to WPA state machine data from wpa_sm_init()
  304. * @bssid: BSSID (authenticator address) of the candidate
  305. * @prio: Priority (the smaller number, the higher priority)
  306. * @preauth: Whether the candidate AP advertises support for pre-authentication
  307. *
  308. * This function is used to add PMKSA candidates for RSN pre-authentication. It
  309. * is called from scan result processing and from driver events for PMKSA
  310. * candidates, i.e., EVENT_PMKID_CANDIDATE events to wpa_supplicant_event().
  311. */
  312. void pmksa_candidate_add(struct wpa_sm *sm, const u8 *bssid,
  313. int prio, int preauth)
  314. {
  315. struct rsn_pmksa_candidate *cand, *pos;
  316. if (sm->network_ctx && sm->proactive_key_caching)
  317. pmksa_cache_get_opportunistic(sm->pmksa, sm->network_ctx,
  318. bssid);
  319. if (!preauth) {
  320. wpa_printf(MSG_DEBUG, "RSN: Ignored PMKID candidate without "
  321. "preauth flag");
  322. return;
  323. }
  324. /* If BSSID already on candidate list, update the priority of the old
  325. * entry. Do not override priority based on normal scan results. */
  326. cand = NULL;
  327. dl_list_for_each(pos, &sm->pmksa_candidates,
  328. struct rsn_pmksa_candidate, list) {
  329. if (os_memcmp(pos->bssid, bssid, ETH_ALEN) == 0) {
  330. cand = pos;
  331. break;
  332. }
  333. }
  334. if (cand) {
  335. dl_list_del(&cand->list);
  336. if (prio < PMKID_CANDIDATE_PRIO_SCAN)
  337. cand->priority = prio;
  338. } else {
  339. cand = os_zalloc(sizeof(*cand));
  340. if (cand == NULL)
  341. return;
  342. os_memcpy(cand->bssid, bssid, ETH_ALEN);
  343. cand->priority = prio;
  344. }
  345. /* Add candidate to the list; order by increasing priority value. i.e.,
  346. * highest priority (smallest value) first. */
  347. dl_list_for_each(pos, &sm->pmksa_candidates,
  348. struct rsn_pmksa_candidate, list) {
  349. if (cand->priority <= pos->priority) {
  350. if (!pos->list.prev) {
  351. /*
  352. * This cannot really happen in pracrice since
  353. * pos was fetched from the list and the prev
  354. * pointer must be set. It looks like clang
  355. * static analyzer gets confused with the
  356. * dl_list_del(&cand->list) call above and ends
  357. * up assuming pos->list.prev could be NULL.
  358. */
  359. os_free(cand);
  360. return;
  361. }
  362. dl_list_add(pos->list.prev, &cand->list);
  363. cand = NULL;
  364. break;
  365. }
  366. }
  367. if (cand)
  368. dl_list_add_tail(&sm->pmksa_candidates, &cand->list);
  369. wpa_msg(sm->ctx->msg_ctx, MSG_DEBUG, "RSN: added PMKSA cache "
  370. "candidate " MACSTR " prio %d", MAC2STR(bssid), prio);
  371. rsn_preauth_candidate_process(sm);
  372. }
  373. /* TODO: schedule periodic scans if current AP supports preauth */
  374. /**
  375. * rsn_preauth_scan_results - Start processing scan results for canditates
  376. * @sm: Pointer to WPA state machine data from wpa_sm_init()
  377. * Returns: 0 if ready to process results or -1 to skip processing
  378. *
  379. * This functions is used to notify RSN code about start of new scan results
  380. * processing. The actual scan results will be provided by calling
  381. * rsn_preauth_scan_result() for each BSS if this function returned 0.
  382. */
  383. int rsn_preauth_scan_results(struct wpa_sm *sm)
  384. {
  385. if (sm->ssid_len == 0)
  386. return -1;
  387. /*
  388. * TODO: is it ok to free all candidates? What about the entries
  389. * received from EVENT_PMKID_CANDIDATE?
  390. */
  391. pmksa_candidate_free(sm);
  392. return 0;
  393. }
  394. /**
  395. * rsn_preauth_scan_result - Processing scan result for PMKSA canditates
  396. * @sm: Pointer to WPA state machine data from wpa_sm_init()
  397. *
  398. * Add all suitable APs (Authenticators) from scan results into PMKSA
  399. * candidate list.
  400. */
  401. void rsn_preauth_scan_result(struct wpa_sm *sm, const u8 *bssid,
  402. const u8 *ssid, const u8 *rsn)
  403. {
  404. struct wpa_ie_data ie;
  405. struct rsn_pmksa_cache_entry *pmksa;
  406. if (ssid[1] != sm->ssid_len ||
  407. os_memcmp(ssid + 2, sm->ssid, sm->ssid_len) != 0)
  408. return; /* Not for the current SSID */
  409. if (os_memcmp(bssid, sm->bssid, ETH_ALEN) == 0)
  410. return; /* Ignore current AP */
  411. if (wpa_parse_wpa_ie(rsn, 2 + rsn[1], &ie))
  412. return;
  413. pmksa = pmksa_cache_get(sm->pmksa, bssid, NULL, NULL);
  414. if (pmksa && (!pmksa->opportunistic ||
  415. !(ie.capabilities & WPA_CAPABILITY_PREAUTH)))
  416. return;
  417. /* Give less priority to candidates found from normal scan results. */
  418. pmksa_candidate_add(sm, bssid, PMKID_CANDIDATE_PRIO_SCAN,
  419. ie.capabilities & WPA_CAPABILITY_PREAUTH);
  420. }
  421. #ifdef CONFIG_CTRL_IFACE
  422. /**
  423. * rsn_preauth_get_status - Get pre-authentication status
  424. * @sm: Pointer to WPA state machine data from wpa_sm_init()
  425. * @buf: Buffer for status information
  426. * @buflen: Maximum buffer length
  427. * @verbose: Whether to include verbose status information
  428. * Returns: Number of bytes written to buf.
  429. *
  430. * Query WPA2 pre-authentication for status information. This function fills in
  431. * a text area with current status information. If the buffer (buf) is not
  432. * large enough, status information will be truncated to fit the buffer.
  433. */
  434. int rsn_preauth_get_status(struct wpa_sm *sm, char *buf, size_t buflen,
  435. int verbose)
  436. {
  437. char *pos = buf, *end = buf + buflen;
  438. int res, ret;
  439. if (sm->preauth_eapol) {
  440. ret = os_snprintf(pos, end - pos, "Pre-authentication "
  441. "EAPOL state machines:\n");
  442. if (os_snprintf_error(end - pos, ret))
  443. return pos - buf;
  444. pos += ret;
  445. res = eapol_sm_get_status(sm->preauth_eapol,
  446. pos, end - pos, verbose);
  447. if (res >= 0)
  448. pos += res;
  449. }
  450. return pos - buf;
  451. }
  452. #endif /* CONFIG_CTRL_IFACE */
  453. /**
  454. * rsn_preauth_in_progress - Verify whether pre-authentication is in progress
  455. * @sm: Pointer to WPA state machine data from wpa_sm_init()
  456. */
  457. int rsn_preauth_in_progress(struct wpa_sm *sm)
  458. {
  459. return sm->preauth_eapol != NULL;
  460. }
  461. #endif /* IEEE8021X_EAPOL && !CONFIG_NO_WPA */