2014-11-16 14:42:29 +01:00
|
|
|
# Suite B tests
|
2015-01-24 21:24:10 +01:00
|
|
|
# Copyright (c) 2014-2015, Jouni Malinen <j@w1.fi>
|
2014-11-16 14:42:29 +01:00
|
|
|
#
|
|
|
|
# This software may be distributed under the terms of the BSD license.
|
|
|
|
# See README for more details.
|
|
|
|
|
|
|
|
import time
|
|
|
|
import logging
|
|
|
|
logger = logging.getLogger()
|
|
|
|
|
|
|
|
import hostapd
|
2016-03-27 20:08:56 +02:00
|
|
|
from utils import HwsimSkip, fail_test
|
2014-11-16 14:42:29 +01:00
|
|
|
|
2015-06-20 21:24:57 +02:00
|
|
|
def check_suite_b_capa(dev):
|
2014-11-16 14:42:29 +01:00
|
|
|
if "GCMP" not in dev[0].get_capability("pairwise"):
|
2015-01-07 13:19:30 +01:00
|
|
|
raise HwsimSkip("GCMP not supported")
|
2015-01-24 21:24:10 +01:00
|
|
|
if "BIP-GMAC-128" not in dev[0].get_capability("group_mgmt"):
|
|
|
|
raise HwsimSkip("BIP-GMAC-128 not supported")
|
|
|
|
if "WPA-EAP-SUITE-B" not in dev[0].get_capability("key_mgmt"):
|
|
|
|
raise HwsimSkip("WPA-EAP-SUITE-B not supported")
|
2018-02-16 16:15:57 +01:00
|
|
|
check_suite_b_tls_lib(dev, level128=True)
|
2015-08-02 16:11:47 +02:00
|
|
|
|
2018-02-16 16:15:57 +01:00
|
|
|
def check_suite_b_tls_lib(dev, dhe=False, level128=False):
|
2015-01-24 21:24:10 +01:00
|
|
|
tls = dev[0].request("GET tls_library")
|
2017-12-28 17:48:23 +01:00
|
|
|
if tls.startswith("GnuTLS"):
|
|
|
|
return
|
2015-01-24 21:24:10 +01:00
|
|
|
if not tls.startswith("OpenSSL"):
|
2016-07-03 18:37:50 +02:00
|
|
|
raise HwsimSkip("TLS library not supported for Suite B: " + tls)
|
2015-08-02 16:11:47 +02:00
|
|
|
supported = False
|
2018-09-17 16:52:38 +02:00
|
|
|
for ver in [ '1.0.2', '1.1.0', '1.1.1' ]:
|
2015-08-02 16:11:47 +02:00
|
|
|
if "build=OpenSSL " + ver in tls and "run=OpenSSL " + ver in tls:
|
|
|
|
supported = True
|
|
|
|
break
|
2018-02-16 16:15:57 +01:00
|
|
|
if not dhe and not level128 and "build=OpenSSL " + ver in tls and "run=BoringSSL" in tls:
|
|
|
|
supported = True
|
|
|
|
break
|
2015-08-02 16:11:47 +02:00
|
|
|
if not supported:
|
2015-01-24 21:24:10 +01:00
|
|
|
raise HwsimSkip("OpenSSL version not supported for Suite B: " + tls)
|
|
|
|
|
2016-03-27 20:08:56 +02:00
|
|
|
def suite_b_ap_params():
|
2015-01-24 21:24:10 +01:00
|
|
|
params = { "ssid": "test-suite-b",
|
|
|
|
"wpa": "2",
|
|
|
|
"wpa_key_mgmt": "WPA-EAP-SUITE-B",
|
|
|
|
"rsn_pairwise": "GCMP",
|
|
|
|
"group_mgmt_cipher": "BIP-GMAC-128",
|
|
|
|
"ieee80211w": "2",
|
|
|
|
"ieee8021x": "1",
|
|
|
|
"openssl_ciphers": "SUITEB128",
|
|
|
|
#"dh_file": "auth_serv/dh.conf",
|
|
|
|
"eap_server": "1",
|
|
|
|
"eap_user_file": "auth_serv/eap_user.conf",
|
|
|
|
"ca_cert": "auth_serv/ec-ca.pem",
|
|
|
|
"server_cert": "auth_serv/ec-server.pem",
|
|
|
|
"private_key": "auth_serv/ec-server.key" }
|
2016-03-27 20:08:56 +02:00
|
|
|
return params
|
|
|
|
|
|
|
|
def test_suite_b(dev, apdev):
|
|
|
|
"""WPA2/GCMP connection at Suite B 128-bit level"""
|
|
|
|
check_suite_b_capa(dev)
|
|
|
|
dev[0].flush_scan_cache()
|
|
|
|
params = suite_b_ap_params()
|
2016-03-30 10:55:56 +02:00
|
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
2015-01-24 21:24:10 +01:00
|
|
|
|
|
|
|
dev[0].connect("test-suite-b", key_mgmt="WPA-EAP-SUITE-B", ieee80211w="2",
|
|
|
|
openssl_ciphers="SUITEB128",
|
|
|
|
eap="TLS", identity="tls user",
|
|
|
|
ca_cert="auth_serv/ec-ca.pem",
|
|
|
|
client_cert="auth_serv/ec-user.pem",
|
|
|
|
private_key="auth_serv/ec-user.key",
|
2014-11-16 14:42:29 +01:00
|
|
|
pairwise="GCMP", group="GCMP", scan_freq="2412")
|
2015-01-24 21:24:10 +01:00
|
|
|
tls_cipher = dev[0].get_status_field("EAP TLS cipher")
|
2017-12-28 17:48:23 +01:00
|
|
|
if tls_cipher != "ECDHE-ECDSA-AES128-GCM-SHA256" and \
|
|
|
|
tls_cipher != "ECDHE-ECDSA-AES-128-GCM-AEAD":
|
2015-01-24 21:24:10 +01:00
|
|
|
raise Exception("Unexpected TLS cipher: " + tls_cipher)
|
2014-12-07 22:27:45 +01:00
|
|
|
|
|
|
|
bss = dev[0].get_bss(apdev[0]['bssid'])
|
|
|
|
if 'flags' not in bss:
|
|
|
|
raise Exception("Could not get BSS flags from BSS table")
|
|
|
|
if "[WPA2-EAP-SUITE-B-GCMP]" not in bss['flags']:
|
|
|
|
raise Exception("Unexpected BSS flags: " + bss['flags'])
|
|
|
|
|
2014-11-16 14:42:29 +01:00
|
|
|
dev[0].request("DISCONNECT")
|
2014-12-20 10:51:30 +01:00
|
|
|
dev[0].wait_disconnected(timeout=20)
|
2014-11-16 14:42:29 +01:00
|
|
|
dev[0].dump_monitor()
|
|
|
|
dev[0].request("RECONNECT")
|
|
|
|
ev = dev[0].wait_event(["CTRL-EVENT-EAP-STARTED",
|
|
|
|
"CTRL-EVENT-CONNECTED"], timeout=20)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Roaming with the AP timed out")
|
|
|
|
if "CTRL-EVENT-EAP-STARTED" in ev:
|
|
|
|
raise Exception("Unexpected EAP exchange")
|
2015-01-25 12:16:06 +01:00
|
|
|
|
2016-12-27 18:24:34 +01:00
|
|
|
conf = hapd.get_config()
|
|
|
|
if conf['key_mgmt'] != 'WPA-EAP-SUITE-B':
|
|
|
|
raise Exception("Unexpected config key_mgmt: " + conf['key_mgmt'])
|
|
|
|
|
2015-06-20 21:24:57 +02:00
|
|
|
def suite_b_as_params():
|
|
|
|
params = {}
|
|
|
|
params['ssid'] = 'as'
|
|
|
|
params['beacon_int'] = '2000'
|
|
|
|
params['radius_server_clients'] = 'auth_serv/radius_clients.conf'
|
|
|
|
params['radius_server_auth_port'] = '18129'
|
|
|
|
params['eap_server'] = '1'
|
|
|
|
params['eap_user_file'] = 'auth_serv/eap_user.conf'
|
|
|
|
params['ca_cert'] = 'auth_serv/ec-ca.pem'
|
|
|
|
params['server_cert'] = 'auth_serv/ec-server.pem'
|
|
|
|
params['private_key'] = 'auth_serv/ec-server.key'
|
|
|
|
params['openssl_ciphers'] = 'SUITEB128'
|
|
|
|
return params
|
|
|
|
|
|
|
|
def test_suite_b_radius(dev, apdev):
|
|
|
|
"""WPA2/GCMP (RADIUS) connection at Suite B 128-bit level"""
|
|
|
|
check_suite_b_capa(dev)
|
|
|
|
dev[0].flush_scan_cache()
|
|
|
|
params = suite_b_as_params()
|
2016-03-30 10:55:56 +02:00
|
|
|
hostapd.add_ap(apdev[1], params)
|
2015-06-20 21:24:57 +02:00
|
|
|
|
|
|
|
params = { "ssid": "test-suite-b",
|
|
|
|
"wpa": "2",
|
|
|
|
"wpa_key_mgmt": "WPA-EAP-SUITE-B",
|
|
|
|
"rsn_pairwise": "GCMP",
|
|
|
|
"group_mgmt_cipher": "BIP-GMAC-128",
|
|
|
|
"ieee80211w": "2",
|
|
|
|
"ieee8021x": "1",
|
|
|
|
'auth_server_addr': "127.0.0.1",
|
|
|
|
'auth_server_port': "18129",
|
|
|
|
'auth_server_shared_secret': "radius",
|
|
|
|
'nas_identifier': "nas.w1.fi" }
|
2016-03-30 10:55:56 +02:00
|
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
2015-06-20 21:24:57 +02:00
|
|
|
|
|
|
|
dev[0].connect("test-suite-b", key_mgmt="WPA-EAP-SUITE-B", ieee80211w="2",
|
|
|
|
openssl_ciphers="SUITEB128",
|
|
|
|
eap="TLS", identity="tls user",
|
|
|
|
ca_cert="auth_serv/ec-ca.pem",
|
|
|
|
client_cert="auth_serv/ec-user.pem",
|
|
|
|
private_key="auth_serv/ec-user.key",
|
|
|
|
pairwise="GCMP", group="GCMP", scan_freq="2412")
|
|
|
|
|
2018-02-16 16:15:57 +01:00
|
|
|
def check_suite_b_192_capa(dev, dhe=False):
|
2015-01-25 12:16:06 +01:00
|
|
|
if "GCMP-256" not in dev[0].get_capability("pairwise"):
|
|
|
|
raise HwsimSkip("GCMP-256 not supported")
|
|
|
|
if "BIP-GMAC-256" not in dev[0].get_capability("group_mgmt"):
|
|
|
|
raise HwsimSkip("BIP-GMAC-256 not supported")
|
|
|
|
if "WPA-EAP-SUITE-B-192" not in dev[0].get_capability("key_mgmt"):
|
|
|
|
raise HwsimSkip("WPA-EAP-SUITE-B-192 not supported")
|
2018-02-16 16:15:57 +01:00
|
|
|
check_suite_b_tls_lib(dev, dhe=dhe)
|
2015-01-25 12:16:06 +01:00
|
|
|
|
2016-03-27 20:08:56 +02:00
|
|
|
def suite_b_192_ap_params():
|
2015-01-25 12:16:06 +01:00
|
|
|
params = { "ssid": "test-suite-b",
|
|
|
|
"wpa": "2",
|
|
|
|
"wpa_key_mgmt": "WPA-EAP-SUITE-B-192",
|
|
|
|
"rsn_pairwise": "GCMP-256",
|
|
|
|
"group_mgmt_cipher": "BIP-GMAC-256",
|
|
|
|
"ieee80211w": "2",
|
|
|
|
"ieee8021x": "1",
|
|
|
|
"openssl_ciphers": "SUITEB192",
|
|
|
|
"eap_server": "1",
|
|
|
|
"eap_user_file": "auth_serv/eap_user.conf",
|
|
|
|
"ca_cert": "auth_serv/ec2-ca.pem",
|
|
|
|
"server_cert": "auth_serv/ec2-server.pem",
|
|
|
|
"private_key": "auth_serv/ec2-server.key" }
|
2016-03-27 20:08:56 +02:00
|
|
|
return params
|
|
|
|
|
|
|
|
def test_suite_b_192(dev, apdev):
|
|
|
|
"""WPA2/GCMP-256 connection at Suite B 192-bit level"""
|
|
|
|
check_suite_b_192_capa(dev)
|
|
|
|
dev[0].flush_scan_cache()
|
|
|
|
params = suite_b_192_ap_params()
|
2016-03-30 10:55:56 +02:00
|
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
2015-01-25 12:16:06 +01:00
|
|
|
|
|
|
|
dev[0].connect("test-suite-b", key_mgmt="WPA-EAP-SUITE-B-192",
|
|
|
|
ieee80211w="2",
|
|
|
|
openssl_ciphers="SUITEB192",
|
|
|
|
eap="TLS", identity="tls user",
|
|
|
|
ca_cert="auth_serv/ec2-ca.pem",
|
|
|
|
client_cert="auth_serv/ec2-user.pem",
|
|
|
|
private_key="auth_serv/ec2-user.key",
|
|
|
|
pairwise="GCMP-256", group="GCMP-256", scan_freq="2412")
|
|
|
|
tls_cipher = dev[0].get_status_field("EAP TLS cipher")
|
2017-12-28 17:48:23 +01:00
|
|
|
if tls_cipher != "ECDHE-ECDSA-AES256-GCM-SHA384" and \
|
|
|
|
tls_cipher != "ECDHE-ECDSA-AES-256-GCM-AEAD":
|
2015-01-25 12:16:06 +01:00
|
|
|
raise Exception("Unexpected TLS cipher: " + tls_cipher)
|
2017-07-03 13:29:10 +02:00
|
|
|
cipher = dev[0].get_status_field("mgmt_group_cipher")
|
|
|
|
if cipher != "BIP-GMAC-256":
|
|
|
|
raise Exception("Unexpected mgmt_group_cipher: " + cipher)
|
2015-01-25 12:16:06 +01:00
|
|
|
|
|
|
|
bss = dev[0].get_bss(apdev[0]['bssid'])
|
|
|
|
if 'flags' not in bss:
|
|
|
|
raise Exception("Could not get BSS flags from BSS table")
|
|
|
|
if "[WPA2-EAP-SUITE-B-192-GCMP-256]" not in bss['flags']:
|
|
|
|
raise Exception("Unexpected BSS flags: " + bss['flags'])
|
|
|
|
|
|
|
|
dev[0].request("DISCONNECT")
|
|
|
|
dev[0].wait_disconnected(timeout=20)
|
|
|
|
dev[0].dump_monitor()
|
|
|
|
dev[0].request("RECONNECT")
|
|
|
|
ev = dev[0].wait_event(["CTRL-EVENT-EAP-STARTED",
|
|
|
|
"CTRL-EVENT-CONNECTED"], timeout=20)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Roaming with the AP timed out")
|
|
|
|
if "CTRL-EVENT-EAP-STARTED" in ev:
|
|
|
|
raise Exception("Unexpected EAP exchange")
|
2015-06-20 21:24:57 +02:00
|
|
|
|
2016-12-27 18:24:34 +01:00
|
|
|
conf = hapd.get_config()
|
|
|
|
if conf['key_mgmt'] != 'WPA-EAP-SUITE-B-192':
|
|
|
|
raise Exception("Unexpected config key_mgmt: " + conf['key_mgmt'])
|
|
|
|
|
2015-06-20 21:24:57 +02:00
|
|
|
def test_suite_b_192_radius(dev, apdev):
|
|
|
|
"""WPA2/GCMP-256 (RADIUS) connection at Suite B 192-bit level"""
|
|
|
|
check_suite_b_192_capa(dev)
|
|
|
|
dev[0].flush_scan_cache()
|
|
|
|
params = suite_b_as_params()
|
|
|
|
params['ca_cert'] = 'auth_serv/ec2-ca.pem'
|
|
|
|
params['server_cert'] = 'auth_serv/ec2-server.pem'
|
|
|
|
params['private_key'] = 'auth_serv/ec2-server.key'
|
|
|
|
params['openssl_ciphers'] = 'SUITEB192'
|
2016-03-30 10:55:56 +02:00
|
|
|
hostapd.add_ap(apdev[1], params)
|
2015-06-20 21:24:57 +02:00
|
|
|
|
|
|
|
params = { "ssid": "test-suite-b",
|
|
|
|
"wpa": "2",
|
|
|
|
"wpa_key_mgmt": "WPA-EAP-SUITE-B-192",
|
|
|
|
"rsn_pairwise": "GCMP-256",
|
|
|
|
"group_mgmt_cipher": "BIP-GMAC-256",
|
|
|
|
"ieee80211w": "2",
|
|
|
|
"ieee8021x": "1",
|
|
|
|
'auth_server_addr': "127.0.0.1",
|
|
|
|
'auth_server_port': "18129",
|
|
|
|
'auth_server_shared_secret': "radius",
|
|
|
|
'nas_identifier': "nas.w1.fi" }
|
2016-03-30 10:55:56 +02:00
|
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
2015-06-20 21:24:57 +02:00
|
|
|
|
|
|
|
dev[0].connect("test-suite-b", key_mgmt="WPA-EAP-SUITE-B-192",
|
|
|
|
ieee80211w="2",
|
|
|
|
openssl_ciphers="SUITEB192",
|
|
|
|
eap="TLS", identity="tls user",
|
|
|
|
ca_cert="auth_serv/ec2-ca.pem",
|
|
|
|
client_cert="auth_serv/ec2-user.pem",
|
|
|
|
private_key="auth_serv/ec2-user.key",
|
|
|
|
pairwise="GCMP-256", group="GCMP-256", scan_freq="2412")
|
2016-03-27 20:08:56 +02:00
|
|
|
|
2018-01-12 19:30:07 +01:00
|
|
|
def test_suite_b_192_radius_and_p256_cert(dev, apdev):
|
|
|
|
"""Suite B 192-bit level and p256 client cert"""
|
|
|
|
check_suite_b_192_capa(dev)
|
|
|
|
dev[0].flush_scan_cache()
|
|
|
|
params = suite_b_as_params()
|
|
|
|
params['ca_cert'] = 'auth_serv/ec2-ca.pem'
|
|
|
|
params['server_cert'] = 'auth_serv/ec2-server.pem'
|
|
|
|
params['private_key'] = 'auth_serv/ec2-server.key'
|
|
|
|
params['openssl_ciphers'] = 'SUITEB192'
|
|
|
|
hostapd.add_ap(apdev[1], params)
|
|
|
|
|
|
|
|
params = { "ssid": "test-suite-b",
|
|
|
|
"wpa": "2",
|
|
|
|
"wpa_key_mgmt": "WPA-EAP-SUITE-B-192",
|
|
|
|
"rsn_pairwise": "GCMP-256",
|
|
|
|
"group_mgmt_cipher": "BIP-GMAC-256",
|
|
|
|
"ieee80211w": "2",
|
|
|
|
"ieee8021x": "1",
|
|
|
|
'auth_server_addr': "127.0.0.1",
|
|
|
|
'auth_server_port': "18129",
|
|
|
|
'auth_server_shared_secret': "radius",
|
|
|
|
'nas_identifier': "nas.w1.fi" }
|
|
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
|
|
|
|
|
|
|
dev[0].connect("test-suite-b", key_mgmt="WPA-EAP-SUITE-B-192",
|
|
|
|
ieee80211w="2",
|
|
|
|
#openssl_ciphers="SUITEB192",
|
|
|
|
eap="TLS", identity="tls user",
|
|
|
|
ca_cert="auth_serv/ec2-ca.pem",
|
|
|
|
client_cert="auth_serv/ec2-user-p256.pem",
|
|
|
|
private_key="auth_serv/ec2-user-p256.key",
|
|
|
|
pairwise="GCMP-256", group="GCMP-256", scan_freq="2412",
|
|
|
|
wait_connect=False)
|
|
|
|
ev = dev[0].wait_event(["CTRL-EVENT-EAP-FAILURE"], timeout=10)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("EAP-Failure not reported")
|
|
|
|
ev = dev[0].wait_event(["CTRL-EVENT-DISCONNECTED"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Disconnection not reported")
|
|
|
|
if "reason=23" not in ev:
|
|
|
|
raise Exception("Unexpected disconnection reason: " + ev);
|
|
|
|
|
2016-03-27 20:08:56 +02:00
|
|
|
def test_suite_b_pmkid_failure(dev, apdev):
|
|
|
|
"""WPA2/GCMP connection at Suite B 128-bit level and PMKID derivation failure"""
|
|
|
|
check_suite_b_capa(dev)
|
|
|
|
dev[0].flush_scan_cache()
|
|
|
|
params = suite_b_ap_params()
|
2016-03-30 10:55:56 +02:00
|
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
2016-03-27 20:08:56 +02:00
|
|
|
|
|
|
|
with fail_test(dev[0], 1, "rsn_pmkid_suite_b"):
|
|
|
|
dev[0].connect("test-suite-b", key_mgmt="WPA-EAP-SUITE-B",
|
|
|
|
ieee80211w="2",
|
|
|
|
openssl_ciphers="SUITEB128",
|
|
|
|
eap="TLS", identity="tls user",
|
|
|
|
ca_cert="auth_serv/ec-ca.pem",
|
|
|
|
client_cert="auth_serv/ec-user.pem",
|
|
|
|
private_key="auth_serv/ec-user.key",
|
|
|
|
pairwise="GCMP", group="GCMP", scan_freq="2412")
|
|
|
|
|
|
|
|
def test_suite_b_192_pmkid_failure(dev, apdev):
|
|
|
|
"""WPA2/GCMP-256 connection at Suite B 192-bit level and PMKID derivation failure"""
|
|
|
|
check_suite_b_192_capa(dev)
|
|
|
|
dev[0].flush_scan_cache()
|
|
|
|
params = suite_b_192_ap_params()
|
2016-03-30 10:55:56 +02:00
|
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
2016-03-27 20:08:56 +02:00
|
|
|
|
|
|
|
with fail_test(dev[0], 1, "rsn_pmkid_suite_b"):
|
|
|
|
dev[0].connect("test-suite-b", key_mgmt="WPA-EAP-SUITE-B-192",
|
|
|
|
ieee80211w="2",
|
|
|
|
openssl_ciphers="SUITEB192",
|
|
|
|
eap="TLS", identity="tls user",
|
|
|
|
ca_cert="auth_serv/ec2-ca.pem",
|
|
|
|
client_cert="auth_serv/ec2-user.pem",
|
|
|
|
private_key="auth_serv/ec2-user.key",
|
|
|
|
pairwise="GCMP-256", group="GCMP-256", scan_freq="2412")
|
|
|
|
|
|
|
|
def test_suite_b_mic_failure(dev, apdev):
|
|
|
|
"""WPA2/GCMP connection at Suite B 128-bit level and MIC derivation failure"""
|
|
|
|
check_suite_b_capa(dev)
|
|
|
|
dev[0].flush_scan_cache()
|
|
|
|
params = suite_b_ap_params()
|
2016-03-30 10:55:56 +02:00
|
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
2016-03-27 20:08:56 +02:00
|
|
|
|
|
|
|
with fail_test(dev[0], 1, "wpa_eapol_key_mic"):
|
|
|
|
dev[0].connect("test-suite-b", key_mgmt="WPA-EAP-SUITE-B",
|
|
|
|
ieee80211w="2",
|
|
|
|
openssl_ciphers="SUITEB128",
|
|
|
|
eap="TLS", identity="tls user",
|
|
|
|
ca_cert="auth_serv/ec-ca.pem",
|
|
|
|
client_cert="auth_serv/ec-user.pem",
|
|
|
|
private_key="auth_serv/ec-user.key",
|
|
|
|
pairwise="GCMP", group="GCMP", scan_freq="2412",
|
|
|
|
wait_connect=False)
|
|
|
|
dev[0].wait_disconnected()
|
|
|
|
|
|
|
|
def test_suite_b_192_mic_failure(dev, apdev):
|
|
|
|
"""WPA2/GCMP connection at Suite B 192-bit level and MIC derivation failure"""
|
2017-01-29 00:26:57 +01:00
|
|
|
check_suite_b_192_capa(dev)
|
2016-03-27 20:08:56 +02:00
|
|
|
dev[0].flush_scan_cache()
|
|
|
|
params = suite_b_192_ap_params()
|
2016-03-30 10:55:56 +02:00
|
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
2016-03-27 20:08:56 +02:00
|
|
|
|
|
|
|
with fail_test(dev[0], 1, "wpa_eapol_key_mic"):
|
|
|
|
dev[0].connect("test-suite-b", key_mgmt="WPA-EAP-SUITE-B-192",
|
|
|
|
ieee80211w="2",
|
|
|
|
openssl_ciphers="SUITEB192",
|
|
|
|
eap="TLS", identity="tls user",
|
|
|
|
ca_cert="auth_serv/ec2-ca.pem",
|
|
|
|
client_cert="auth_serv/ec2-user.pem",
|
|
|
|
private_key="auth_serv/ec2-user.key",
|
|
|
|
pairwise="GCMP-256", group="GCMP-256", scan_freq="2412",
|
|
|
|
wait_connect=False)
|
|
|
|
dev[0].wait_disconnected()
|
2017-09-16 23:12:18 +02:00
|
|
|
|
|
|
|
def suite_b_192_rsa_ap_params():
|
|
|
|
params = { "ssid": "test-suite-b",
|
|
|
|
"wpa": "2",
|
|
|
|
"wpa_key_mgmt": "WPA-EAP-SUITE-B-192",
|
|
|
|
"rsn_pairwise": "GCMP-256",
|
|
|
|
"group_mgmt_cipher": "BIP-GMAC-256",
|
|
|
|
"ieee80211w": "2",
|
|
|
|
"ieee8021x": "1",
|
|
|
|
"tls_flags": "[SUITEB]",
|
|
|
|
"dh_file": "auth_serv/dh_param_3072.pem",
|
|
|
|
"eap_server": "1",
|
|
|
|
"eap_user_file": "auth_serv/eap_user.conf",
|
|
|
|
"ca_cert": "auth_serv/rsa3072-ca.pem",
|
|
|
|
"server_cert": "auth_serv/rsa3072-server.pem",
|
|
|
|
"private_key": "auth_serv/rsa3072-server.key" }
|
|
|
|
return params
|
|
|
|
|
|
|
|
def test_suite_b_192_rsa(dev, apdev):
|
|
|
|
"""WPA2/GCMP-256 connection at Suite B 192-bit level and RSA"""
|
|
|
|
run_suite_b_192_rsa(dev, apdev)
|
|
|
|
|
|
|
|
def test_suite_b_192_rsa_ecdhe(dev, apdev):
|
|
|
|
"""WPA2/GCMP-256 connection at Suite B 192-bit level and RSA (ECDHE)"""
|
|
|
|
run_suite_b_192_rsa(dev, apdev, no_dhe=True)
|
|
|
|
|
|
|
|
def test_suite_b_192_rsa_dhe(dev, apdev):
|
|
|
|
"""WPA2/GCMP-256 connection at Suite B 192-bit level and RSA (DHE)"""
|
|
|
|
run_suite_b_192_rsa(dev, apdev, no_ecdh=True)
|
|
|
|
|
|
|
|
def run_suite_b_192_rsa(dev, apdev, no_ecdh=False, no_dhe=False):
|
2018-02-16 16:15:57 +01:00
|
|
|
check_suite_b_192_capa(dev, dhe=no_ecdh)
|
2017-09-16 23:12:18 +02:00
|
|
|
dev[0].flush_scan_cache()
|
|
|
|
params = suite_b_192_rsa_ap_params()
|
|
|
|
if no_ecdh:
|
|
|
|
params["tls_flags"] = "[SUITEB-NO-ECDH]"
|
|
|
|
if no_dhe:
|
|
|
|
del params["dh_file"]
|
|
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
|
|
|
|
|
|
|
dev[0].connect("test-suite-b", key_mgmt="WPA-EAP-SUITE-B-192",
|
|
|
|
ieee80211w="2",
|
|
|
|
phase1="tls_suiteb=1",
|
|
|
|
eap="TLS", identity="tls user",
|
|
|
|
ca_cert="auth_serv/rsa3072-ca.pem",
|
|
|
|
client_cert="auth_serv/rsa3072-user.pem",
|
|
|
|
private_key="auth_serv/rsa3072-user.key",
|
|
|
|
pairwise="GCMP-256", group="GCMP-256", scan_freq="2412")
|
|
|
|
tls_cipher = dev[0].get_status_field("EAP TLS cipher")
|
2017-12-28 17:48:23 +01:00
|
|
|
if tls_cipher != "ECDHE-RSA-AES256-GCM-SHA384" and \
|
|
|
|
tls_cipher != "DHE-RSA-AES256-GCM-SHA384" and \
|
|
|
|
tls_cipher != "ECDHE-RSA-AES-256-GCM-AEAD" and \
|
|
|
|
tls_cipher != "DHE-RSA-AES-256-GCM-AEAD":
|
2017-09-16 23:12:18 +02:00
|
|
|
raise Exception("Unexpected TLS cipher: " + tls_cipher)
|
|
|
|
cipher = dev[0].get_status_field("mgmt_group_cipher")
|
|
|
|
if cipher != "BIP-GMAC-256":
|
|
|
|
raise Exception("Unexpected mgmt_group_cipher: " + cipher)
|
|
|
|
|
|
|
|
bss = dev[0].get_bss(apdev[0]['bssid'])
|
|
|
|
if 'flags' not in bss:
|
|
|
|
raise Exception("Could not get BSS flags from BSS table")
|
|
|
|
if "[WPA2-EAP-SUITE-B-192-GCMP-256]" not in bss['flags']:
|
|
|
|
raise Exception("Unexpected BSS flags: " + bss['flags'])
|
|
|
|
|
|
|
|
dev[0].request("DISCONNECT")
|
|
|
|
dev[0].wait_disconnected(timeout=20)
|
|
|
|
dev[0].dump_monitor()
|
|
|
|
dev[0].request("RECONNECT")
|
|
|
|
ev = dev[0].wait_event(["CTRL-EVENT-EAP-STARTED",
|
|
|
|
"CTRL-EVENT-CONNECTED"], timeout=20)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Roaming with the AP timed out")
|
|
|
|
if "CTRL-EVENT-EAP-STARTED" in ev:
|
|
|
|
raise Exception("Unexpected EAP exchange")
|
|
|
|
|
|
|
|
conf = hapd.get_config()
|
|
|
|
if conf['key_mgmt'] != 'WPA-EAP-SUITE-B-192':
|
|
|
|
raise Exception("Unexpected config key_mgmt: " + conf['key_mgmt'])
|
|
|
|
|
|
|
|
def test_suite_b_192_rsa_insufficient_key(dev, apdev):
|
|
|
|
"""WPA2/GCMP-256 connection at Suite B 192-bit level and RSA with insufficient key length"""
|
|
|
|
check_suite_b_192_capa(dev)
|
|
|
|
dev[0].flush_scan_cache()
|
|
|
|
params = suite_b_192_rsa_ap_params()
|
|
|
|
params["ca_cert"] = "auth_serv/ca.pem"
|
|
|
|
params["server_cert"] = "auth_serv/server.pem"
|
|
|
|
params["private_key"] = "auth_serv/server.key"
|
|
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
|
|
|
|
|
|
|
dev[0].connect("test-suite-b", key_mgmt="WPA-EAP-SUITE-B-192",
|
|
|
|
ieee80211w="2",
|
|
|
|
phase1="tls_suiteb=1",
|
|
|
|
eap="TLS", identity="tls user",
|
|
|
|
ca_cert="auth_serv/ca.pem",
|
|
|
|
client_cert="auth_serv/user.pem",
|
|
|
|
private_key="auth_serv/user.key",
|
|
|
|
pairwise="GCMP-256", group="GCMP-256", scan_freq="2412",
|
|
|
|
wait_connect=False)
|
|
|
|
ev = dev[0].wait_event(["CTRL-EVENT-EAP-TLS-CERT-ERROR"], timeout=10)
|
|
|
|
dev[0].request("DISCONNECT")
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Certificate error not reported")
|
2017-12-28 17:48:23 +01:00
|
|
|
if "reason=11" in ev and "err='Insufficient RSA modulus size'" in ev:
|
|
|
|
return
|
|
|
|
if "reason=7" in ev and "err='certificate uses insecure algorithm'" in ev:
|
|
|
|
return
|
|
|
|
raise Exception("Unexpected error reason: " + ev)
|
2017-09-16 23:12:18 +02:00
|
|
|
|
|
|
|
def test_suite_b_192_rsa_insufficient_dh(dev, apdev):
|
|
|
|
"""WPA2/GCMP-256 connection at Suite B 192-bit level and RSA with insufficient DH key length"""
|
2018-02-16 16:15:57 +01:00
|
|
|
check_suite_b_192_capa(dev, dhe=True)
|
2017-09-16 23:12:18 +02:00
|
|
|
dev[0].flush_scan_cache()
|
|
|
|
params = suite_b_192_rsa_ap_params()
|
|
|
|
params["tls_flags"] = "[SUITEB-NO-ECDH]"
|
|
|
|
params["dh_file"] = "auth_serv/dh.conf"
|
|
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
|
|
|
|
|
|
|
dev[0].connect("test-suite-b", key_mgmt="WPA-EAP-SUITE-B-192",
|
|
|
|
ieee80211w="2",
|
|
|
|
phase1="tls_suiteb=1",
|
|
|
|
eap="TLS", identity="tls user",
|
|
|
|
ca_cert="auth_serv/rsa3072-ca.pem",
|
|
|
|
client_cert="auth_serv/rsa3072-user.pem",
|
|
|
|
private_key="auth_serv/rsa3072-user.key",
|
|
|
|
pairwise="GCMP-256", group="GCMP-256", scan_freq="2412",
|
|
|
|
wait_connect=False)
|
2017-12-28 19:26:57 +01:00
|
|
|
ev = dev[0].wait_event(["CTRL-EVENT-EAP-STATUS status='local TLS alert'",
|
|
|
|
"CTRL-EVENT-CONNECTED"],
|
2017-09-16 23:12:18 +02:00
|
|
|
timeout=10)
|
|
|
|
dev[0].request("DISCONNECT")
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("DH error not reported")
|
2017-12-28 19:26:57 +01:00
|
|
|
if "CTRL-EVENT-CONNECTED" in ev:
|
|
|
|
raise Exception("Unexpected connection")
|
2017-09-16 23:12:18 +02:00
|
|
|
if "insufficient security" not in ev and "internal error" not in ev:
|
|
|
|
raise Exception("Unexpected error reason: " + ev)
|
2017-12-10 20:18:06 +01:00
|
|
|
|
|
|
|
def test_suite_b_192_rsa_radius(dev, apdev):
|
|
|
|
"""WPA2/GCMP-256 (RADIUS) connection at Suite B 192-bit level and RSA (ECDHE)"""
|
|
|
|
check_suite_b_192_capa(dev)
|
|
|
|
dev[0].flush_scan_cache()
|
|
|
|
params = suite_b_as_params()
|
|
|
|
params['ca_cert'] = 'auth_serv/rsa3072-ca.pem'
|
|
|
|
params['server_cert'] = 'auth_serv/rsa3072-server.pem'
|
|
|
|
params['private_key'] = 'auth_serv/rsa3072-server.key'
|
|
|
|
del params['openssl_ciphers']
|
|
|
|
params["tls_flags"] = "[SUITEB]"
|
|
|
|
|
|
|
|
hostapd.add_ap(apdev[1], params)
|
|
|
|
|
|
|
|
params = { "ssid": "test-suite-b",
|
|
|
|
"wpa": "2",
|
|
|
|
"wpa_key_mgmt": "WPA-EAP-SUITE-B-192",
|
|
|
|
"rsn_pairwise": "GCMP-256",
|
|
|
|
"group_mgmt_cipher": "BIP-GMAC-256",
|
|
|
|
"ieee80211w": "2",
|
|
|
|
"ieee8021x": "1",
|
|
|
|
'auth_server_addr': "127.0.0.1",
|
|
|
|
'auth_server_port': "18129",
|
|
|
|
'auth_server_shared_secret': "radius",
|
|
|
|
'nas_identifier': "nas.w1.fi" }
|
|
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
|
|
|
|
|
|
|
dev[0].connect("test-suite-b", key_mgmt="WPA-EAP-SUITE-B-192",
|
|
|
|
ieee80211w="2",
|
|
|
|
openssl_ciphers="ECDHE-RSA-AES256-GCM-SHA384",
|
|
|
|
phase1="tls_suiteb=1",
|
|
|
|
eap="TLS", identity="tls user",
|
|
|
|
ca_cert="auth_serv/rsa3072-ca.pem",
|
|
|
|
client_cert="auth_serv/rsa3072-user.pem",
|
|
|
|
private_key="auth_serv/rsa3072-user.key",
|
|
|
|
pairwise="GCMP-256", group="GCMP-256",
|
|
|
|
group_mgmt="BIP-GMAC-256", scan_freq="2412")
|
|
|
|
tls_cipher = dev[0].get_status_field("EAP TLS cipher")
|
2017-12-28 17:48:23 +01:00
|
|
|
if tls_cipher != "ECDHE-RSA-AES256-GCM-SHA384" and \
|
|
|
|
tls_cipher != "ECDHE-RSA-AES-256-GCM-AEAD":
|
2017-12-10 20:18:06 +01:00
|
|
|
raise Exception("Unexpected TLS cipher: " + tls_cipher)
|
2018-01-12 21:40:55 +01:00
|
|
|
|
|
|
|
def test_suite_b_192_rsa_ecdhe_radius_rsa2048_client(dev, apdev):
|
|
|
|
"""Suite B 192-bit level and RSA (ECDHE) and RSA2048 client"""
|
|
|
|
run_suite_b_192_rsa_radius_rsa2048_client(dev, apdev, True)
|
|
|
|
|
|
|
|
def test_suite_b_192_rsa_dhe_radius_rsa2048_client(dev, apdev):
|
|
|
|
"""Suite B 192-bit level and RSA (DHE) and RSA2048 client"""
|
|
|
|
run_suite_b_192_rsa_radius_rsa2048_client(dev, apdev, False)
|
|
|
|
|
|
|
|
def run_suite_b_192_rsa_radius_rsa2048_client(dev, apdev, ecdhe):
|
2018-02-16 16:15:57 +01:00
|
|
|
check_suite_b_192_capa(dev, dhe=not ecdhe)
|
2018-01-12 21:40:55 +01:00
|
|
|
dev[0].flush_scan_cache()
|
|
|
|
params = suite_b_as_params()
|
|
|
|
params['ca_cert'] = 'auth_serv/rsa3072-ca.pem'
|
|
|
|
params['server_cert'] = 'auth_serv/rsa3072-server.pem'
|
|
|
|
params['private_key'] = 'auth_serv/rsa3072-server.key'
|
|
|
|
del params['openssl_ciphers']
|
|
|
|
if ecdhe:
|
|
|
|
params["tls_flags"] = "[SUITEB]"
|
|
|
|
ciphers = "ECDHE-RSA-AES256-GCM-SHA384"
|
|
|
|
else:
|
|
|
|
params["tls_flags"] = "[SUITEB-NO-ECDH]"
|
|
|
|
params["dh_file"] = "auth_serv/dh_param_3072.pem"
|
|
|
|
ciphers = "DHE-RSA-AES256-GCM-SHA384"
|
|
|
|
|
|
|
|
hostapd.add_ap(apdev[1], params)
|
|
|
|
|
|
|
|
params = { "ssid": "test-suite-b",
|
|
|
|
"wpa": "2",
|
|
|
|
"wpa_key_mgmt": "WPA-EAP-SUITE-B-192",
|
|
|
|
"rsn_pairwise": "GCMP-256",
|
|
|
|
"group_mgmt_cipher": "BIP-GMAC-256",
|
|
|
|
"ieee80211w": "2",
|
|
|
|
"ieee8021x": "1",
|
|
|
|
'auth_server_addr': "127.0.0.1",
|
|
|
|
'auth_server_port': "18129",
|
|
|
|
'auth_server_shared_secret': "radius",
|
|
|
|
'nas_identifier': "nas.w1.fi" }
|
|
|
|
hapd = hostapd.add_ap(apdev[0], params)
|
|
|
|
|
|
|
|
dev[0].connect("test-suite-b", key_mgmt="WPA-EAP-SUITE-B-192",
|
|
|
|
ieee80211w="2",
|
|
|
|
openssl_ciphers=ciphers,
|
|
|
|
phase1="tls_suiteb=1",
|
|
|
|
eap="TLS", identity="tls user",
|
|
|
|
ca_cert="auth_serv/rsa3072-ca.pem",
|
|
|
|
client_cert="auth_serv/rsa3072-user-rsa2048.pem",
|
|
|
|
private_key="auth_serv/rsa3072-user-rsa2048.key",
|
|
|
|
pairwise="GCMP-256", group="GCMP-256",
|
|
|
|
group_mgmt="BIP-GMAC-256", scan_freq="2412",
|
|
|
|
wait_connect=False)
|
|
|
|
ev = dev[0].wait_event(["CTRL-EVENT-EAP-FAILURE"], timeout=10)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("EAP-Failure not reported")
|
|
|
|
ev = dev[0].wait_event(["CTRL-EVENT-DISCONNECTED"], timeout=5)
|
|
|
|
if ev is None:
|
|
|
|
raise Exception("Disconnection not reported")
|
|
|
|
if "reason=23" not in ev:
|
|
|
|
raise Exception("Unexpected disconnection reason: " + ev);
|