FILS: Flush PMKSA entries on FILS connection failure
wpa_supplicant generates both a PMKSA cache entry and ERP keys upon successful FILS connection and uses FILS authentication algorithm for subsequent connections when either ERP keys or a PMKSA cache entry is available. In some cases, like AP/RADIUS server restart, both ERP keys and PMKSA becomes invalid. But currently when an AP rejects an association, wpa_supplicant marks only ERP keys as failed but not clearing PMKSA. Since PMKSA is not cleared, consecutive connection attempts are still happening with FILS authentication algorithm and connection attempts are failing with the same association rejection again instead of trying to recover from the state mismatch by deriving a new ERP key hierarchy. Clear PMKSA entries as well on association rejection from an AP to allow the following connection attempt to go with open authentication to re-establish a valid ERP key hierarchy. Also, since clearing PMKSA entries on unprotected (Re)Association Response frames could allow DoS attack (reduce usability of PMKSA caching), clear PMKSA entries only when ERP keys exists. Signed-off-by: Veerendranath Jakkam <vjakkam@codeaurora.org>
This commit is contained in:
parent
d727b5e464
commit
80bcd7ecd1
3 changed files with 31 additions and 0 deletions
|
@ -4621,6 +4621,7 @@ static void wpas_event_assoc_reject(struct wpa_supplicant *wpa_s,
|
|||
#ifdef CONFIG_FILS
|
||||
/* Update ERP next sequence number */
|
||||
if (wpa_s->auth_alg == WPA_AUTH_ALG_FILS) {
|
||||
fils_pmksa_cache_flush(wpa_s);
|
||||
eapol_sm_update_erp_next_seq_num(
|
||||
wpa_s->eapol,
|
||||
data->assoc_reject.fils_erp_next_seq_num);
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue