Software TKIP group rekeying and phase1 issue

Sam Leffler sam at errno.com
Sat Feb 6 21:56:18 UTC 2010


Bernhard Schmidt wrote:
> Hi,
> 
> When hostapd triggers rekeying of the group key, wpa_supplicant successfully 
> sets the correct new key. On first use of the new key tkip_mixing_phase1() 
> should be applied before decrypting any frames, tkip_decrypt() does this as
> 
> if (iv32 != (u32)(key->wk_keyrsc[tid] >> 16) || !ctx->rx_phase1_done) {
> 	tkip_mixing_phase1(ctx->rx_ttak, key->wk_key,
> 		wh->i_addr2, iv32);
> 	ctx->rx_phase1_done = 1;
> }
> 
> But, after a rekeying event, neither of this condition match, especially as 
> rx_phase1_done is no longer zero, therefore tkip_mixing_phase1() isn't called 
> which leads to dropped frames with "TKIP ICV mismatch on decrypt" messages.
> 
> A working solution for that is to set rx_phase1_done to zero inside 
> tkip_setkey(). I'm not sure whether that is the best solution or if it is 
> better to set/reset the wk_keyrsc sequence, at least this diff works for me 
> and few other over at the Forums.
> 
> Index: sys/net80211/ieee80211_crypto_tkip.c
> ===================================================================
> --- sys/net80211/ieee80211_crypto_tkip.c	(revision 203242)
> +++ sys/net80211/ieee80211_crypto_tkip.c	(working copy)
> @@ -144,6 +144,8 @@ tkip_setkey(struct ieee80211_key *k)
>  		return 0;
>  	}
>  	k->wk_keytsc = 1;		/* TSC starts at 1 */
> +	if (k->wk_flags & IEEE80211_KEY_GROUP)
> +		ctx->rx_phase1_done = 0;
>  	return 1;
>  }
> 

Reseting this flag in setkey looks right but why only for group keys?  I 
don't think you want to reset the keyrsc unless instructed; if I recall 
a new RSC may be sent down by the authenticator when plumbing a key--but 
it's been a while since I looked at this.

Have you looked at other implementations?

	Sam


More information about the freebsd-net mailing list