3
0
mirror of https://git.kernel.org/pub/scm/network/wireless/iwd.git synced 2025-02-16 15:20:42 +01:00
Mathy Vanhoef f22ba5aebb eapol: prevent key reinstallation on retransmitted Msg4/4
Currently an adversary can retransmit EAPOL Msg4/4 to make the AP
reinstall the PTK. Against older Linux kernels this can subsequently
be used to decrypt, replay, and possibly decrypt frames. See the
KRACK attacks research at krackattacks.com for attack scenarios.
In this case no machine-in-the-middle position is needed to trigger
the key reinstallation.

Fix this by using the ptk_complete boolean to track when the 4-way
handshake has completed (similar to its usage for clients). When
receiving a retransmitted Msg4/4 accept this frame but do not reinstall
the PTK.

Credits to Chris M. Stone, Sam Thomas, and Tom Chothia of Birmingham
University to help discover this issue.
2020-08-12 09:51:20 -05:00
..
2020-07-09 09:58:21 -05:00
2020-07-09 09:58:21 -05:00
2020-01-21 16:03:28 -06:00
2020-08-04 10:41:45 -05:00
2020-08-04 10:41:45 -05:00
2019-12-09 01:47:11 -06:00
2020-04-17 12:22:47 -05:00
2020-01-21 16:03:28 -06:00
2020-03-17 15:35:22 -05:00
2020-01-21 16:03:28 -06:00
2020-03-06 12:17:09 -06:00
2020-04-08 21:02:15 -05:00
2019-05-19 13:07:13 -05:00
2020-05-02 20:56:13 -05:00
2017-11-28 13:20:33 -06:00
2020-04-08 21:02:15 -05:00
2020-03-20 10:21:04 -05:00
2020-04-08 12:27:57 -05:00
2020-02-03 11:54:28 -06:00
2020-01-21 16:03:28 -06:00
2019-07-15 14:06:26 -05:00
2020-07-31 10:38:59 -05:00
2020-04-10 06:31:19 -05:00
2020-01-16 11:37:57 -06:00
2020-03-17 15:35:22 -05:00
2020-08-04 10:30:07 -05:00
2020-07-31 10:38:59 -05:00
2020-06-12 14:58:56 -05:00
2020-03-18 18:15:16 -05:00
2020-04-08 21:02:15 -05:00
2020-01-17 12:50:23 -06:00