Skip to content
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.

Commit 9307416

Browse files
author
Mika Leppänen
committedNov 21, 2019
Added check to prevent installing new GTK to used index using GKH
Border router now records what GTKs it has installed to supplicant using group key handshake. If a GTK for an index (0, 1, 2 or 3), would be updated to new value second time with GKH, border router initiates 4WH instead of GKH, to update also PTK. This makes re-playing GKH messages harder, since both replay counters and keys for old messages, are invalid. On normal border router PMK/PTK/GTK update cycle, this is already forced also without changes in this commit, since default GTK lifetime is one month and PTK is two monts. For a specific GTK index, the PTK will be updated several times, before the GTK index is re-used.
1 parent 385ae14 commit 9307416

File tree

5 files changed

+146
-11
lines changed

5 files changed

+146
-11
lines changed
 

‎source/6LoWPAN/ws/ws_pae_auth.c

+25-7
Original file line numberDiff line numberDiff line change
@@ -70,6 +70,9 @@
7070
nanostack monitor */
7171
#define SUPPLICANT_NUMBER_TO_PURGE 5
7272

73+
// Short GTK lifetime value, for GTK install check
74+
#define SHORT_GTK_LIFETIME 10 * 3600 // 10 hours
75+
7376
typedef struct {
7477
ns_list_link_t link; /**< Link */
7578
kmp_service_t *kmp_service; /**< KMP service */
@@ -113,7 +116,7 @@ static void ws_pae_auth_kmp_api_create_confirm(kmp_api_t *kmp, kmp_result_e resu
113116
static void ws_pae_auth_kmp_api_create_indication(kmp_api_t *kmp, kmp_type_e type, kmp_addr_t *addr);
114117
static void ws_pae_auth_kmp_api_finished_indication(kmp_api_t *kmp, kmp_result_e result, kmp_sec_keys_t *sec_keys);
115118
static void ws_pae_auth_next_kmp_trigger(pae_auth_t *pae_auth, supp_entry_t *supp_entry);
116-
static kmp_type_e ws_pae_auth_next_protocol_get(supp_entry_t *supp_entry);
119+
static kmp_type_e ws_pae_auth_next_protocol_get(pae_auth_t *pae_auth, supp_entry_t *supp_entry);
117120
static kmp_api_t *ws_pae_auth_kmp_create_and_start(kmp_service_t *service, kmp_type_e type, supp_entry_t *supp_entry);
118121
static void ws_pae_auth_kmp_api_finished(kmp_api_t *kmp);
119122

@@ -666,7 +669,9 @@ static void ws_pae_auth_gtk_key_insert(pae_auth_t *pae_auth)
666669
sec_prot_keys_gtk_clear(pae_auth->next_gtks, next_gtk_index);
667670
sec_prot_keys_gtk_set(pae_auth->next_gtks, next_gtk_index, gtk_value, 0);
668671
} else {
669-
randLIB_get_n_bytes_random(gtk_value, GTK_LEN);
672+
do {
673+
randLIB_get_n_bytes_random(gtk_value, GTK_LEN);
674+
} while (sec_prot_keys_gtk_valid_check(gtk_value) < 0);
670675
}
671676

672677
// Gets latest installed key lifetime and adds GTK expire offset to it
@@ -910,7 +915,7 @@ static void ws_pae_auth_next_kmp_trigger(pae_auth_t *pae_auth, supp_entry_t *sup
910915
supp_entry->retry_ticks = 0;
911916

912917
// Get next protocol based on what keys supplicant has
913-
kmp_type_e next_type = ws_pae_auth_next_protocol_get(supp_entry);
918+
kmp_type_e next_type = ws_pae_auth_next_protocol_get(pae_auth, supp_entry);
914919

915920
if (next_type == KMP_TYPE_NONE) {
916921
// All done
@@ -969,7 +974,7 @@ static void ws_pae_auth_next_kmp_trigger(pae_auth_t *pae_auth, supp_entry_t *sup
969974
kmp_api_create_request(new_kmp, next_type, &supp_entry->addr, &supp_entry->sec_keys);
970975
}
971976

972-
static kmp_type_e ws_pae_auth_next_protocol_get(supp_entry_t *supp_entry)
977+
static kmp_type_e ws_pae_auth_next_protocol_get(pae_auth_t *pae_auth, supp_entry_t *supp_entry)
973978
{
974979
kmp_type_e next_type = KMP_TYPE_NONE;
975980
sec_prot_keys_t *sec_keys = &supp_entry->sec_keys;
@@ -999,9 +1004,22 @@ static kmp_type_e ws_pae_auth_next_protocol_get(supp_entry_t *supp_entry)
9991004

10001005
if (gtk_index >= 0) {
10011006
if (next_type == KMP_TYPE_NONE && gtk_index >= 0) {
1002-
// Update just GTK
1003-
next_type = IEEE_802_11_GKH;
1004-
tr_info("PAE start GKH, eui-64: %s", trace_array(supp_entry->addr.eui_64, 8));
1007+
1008+
/* Check if the PTK has been already used to install GTK to specific index and if it
1009+
* has been, trigger 4WH to update also the PTK. This prevents writing multiple
1010+
* GTK keys to same index using same PTK.
1011+
*/
1012+
if (pae_auth->timer_settings->gtk_expire_offset > SHORT_GTK_LIFETIME &&
1013+
sec_prot_keys_ptk_installed_gtk_hash_mismatch_check(sec_keys, gtk_index)) {
1014+
// start 4WH towards supplicant
1015+
next_type = IEEE_802_11_4WH;
1016+
sec_keys->ptk_mismatch = true;
1017+
tr_info("PAE start 4WH due to GTK index re-use, eui-64: %s", trace_array(supp_entry->addr.eui_64, 8));
1018+
} else {
1019+
// Update just GTK
1020+
next_type = IEEE_802_11_GKH;
1021+
tr_info("PAE start GKH, eui-64: %s", trace_array(supp_entry->addr.eui_64, 8));
1022+
}
10051023
}
10061024

10071025
tr_info("PAE update GTK index: %i, eui-64: %s", gtk_index, trace_array(supp_entry->addr.eui_64, 8));

‎source/Security/protocols/fwh_sec_prot/auth_fwh_sec_prot.c

+2-1
Original file line numberDiff line numberDiff line change
@@ -414,7 +414,8 @@ static void auth_fwh_sec_prot_state_machine(sec_prot_t *prot)
414414
if (auth_fwh_sec_prot_mic_validate(prot) < 0) {
415415
return;
416416
}
417-
417+
// PTK is fresh for installing any GTKs
418+
sec_prot_keys_ptk_installed_gtk_hash_clear_all(prot->sec_keys);
418419
// If GTK was inserted set it valid
419420
sec_prot_keys_gtkl_from_gtk_insert_index_set(prot->sec_keys);
420421
// Reset PTK mismatch

‎source/Security/protocols/gkh_sec_prot/auth_gkh_sec_prot.c

+3
Original file line numberDiff line numberDiff line change
@@ -315,6 +315,9 @@ static void auth_gkh_sec_prot_state_machine(sec_prot_t *prot)
315315
sec_prot_timer_trickle_start(&data->common, &gkh_trickle_params);
316316

317317
sec_prot_state_set(prot, &data->common, GKH_STATE_MESSAGE_2);
318+
319+
// Store the hash for to-be installed GTK as used for the PTK
320+
sec_prot_keys_ptk_installed_gtk_hash_set(prot->sec_keys);
318321
break;
319322

320323
// Wait GKH message 2

‎source/Security/protocols/sec_prot_keys.c

+70-2
Original file line numberDiff line numberDiff line change
@@ -38,6 +38,8 @@
3838

3939
#define TRACE_GROUP "spke"
4040

41+
static const uint8_t empty_hash[GTK_HASH_LEN] = {0};
42+
4143
sec_prot_keys_t *sec_prot_keys_create(sec_prot_gtk_keys_t *gtks, const sec_prot_certs_t *certs)
4244
{
4345
sec_prot_keys_t *sec_keys = ns_dyn_mem_alloc(sizeof(sec_prot_keys_t));
@@ -67,6 +69,7 @@ void sec_prot_keys_init(sec_prot_keys_t *sec_keys, sec_prot_gtk_keys_t *gtks, co
6769
sec_keys->ptk_eui_64_set = false;
6870
sec_keys->pmk_mismatch = false;
6971
sec_keys->ptk_mismatch = false;
72+
sec_prot_keys_ptk_installed_gtk_hash_clear_all(sec_keys);
7073
}
7174

7275
void sec_prot_keys_delete(sec_prot_keys_t *sec_keys)
@@ -581,9 +584,22 @@ void sec_prot_keys_gtks_hash_generate(sec_prot_gtk_keys_t *gtks, uint8_t *gtkhas
581584
}
582585
}
583586

584-
void sec_prot_keys_gtk_hash_generate(uint8_t *gtk, uint8_t *gtk_hash)
587+
int8_t sec_prot_keys_gtk_hash_generate(uint8_t *gtk, uint8_t *gtk_hash)
585588
{
589+
return sec_prot_lib_gtkhash_generate(gtk, gtk_hash);
590+
}
591+
592+
int8_t sec_prot_keys_gtk_valid_check(uint8_t *gtk)
593+
{
594+
uint8_t gtk_hash[8];
586595
sec_prot_lib_gtkhash_generate(gtk, gtk_hash);
596+
597+
// Checks if GTK hash for the GTK would be all zero
598+
if (memcmp(gtk_hash, empty_hash, GTK_HASH_LEN) == 0) {
599+
return -1;
600+
}
601+
602+
return 0;
587603
}
588604

589605
gtk_mismatch_e sec_prot_keys_gtks_hash_update(sec_prot_gtk_keys_t *gtks, uint8_t *gtkhash)
@@ -639,7 +655,6 @@ gtk_mismatch_e sec_prot_keys_gtks_hash_update(sec_prot_gtk_keys_t *gtks, uint8_t
639655

640656
bool sec_prot_keys_gtk_hash_empty(uint8_t *gtkhash)
641657
{
642-
const uint8_t empty_hash[GTK_HASH_LEN] = {0};
643658
if (memcmp(gtkhash, empty_hash, GTK_HASH_LEN) == 0) {
644659
return true;
645660
} else {
@@ -783,4 +798,57 @@ uint8_t sec_prot_keys_gtk_count(sec_prot_gtk_keys_t *gtks)
783798
return count;
784799
}
785800

801+
void sec_prot_keys_ptk_installed_gtk_hash_clear_all(sec_prot_keys_t *sec_keys)
802+
{
803+
for (uint8_t index = 0; index < GTK_NUM; index++) {
804+
memset(sec_keys->ins_gtk_hash[sec_keys->gtk_set_index].hash, 0, INS_GTK_HASH_LEN);
805+
}
806+
sec_keys->ins_gtk_hash_set = 0;
807+
}
808+
809+
void sec_prot_keys_ptk_installed_gtk_hash_set(sec_prot_keys_t *sec_keys)
810+
{
811+
if (sec_keys->gtk_set_index >= 0) {
812+
uint8_t *gtk = sec_prot_keys_gtk_get(sec_keys->gtks, sec_keys->gtk_set_index);
813+
if (!gtk) {
814+
return;
815+
}
816+
uint8_t gtk_hash[GTK_HASH_LEN];
817+
if (sec_prot_keys_gtk_hash_generate(gtk, gtk_hash) < 0) {
818+
return;
819+
}
820+
/* Store two byte hash. This is long enough for the GTK installed check, since
821+
* possible conflict between hashes causes only that 4WH is initiated/is not
822+
* initiated instead of GKH.
823+
*/
824+
memcpy(sec_keys->ins_gtk_hash[sec_keys->gtk_set_index].hash, gtk_hash, INS_GTK_HASH_LEN);
825+
sec_keys->ins_gtk_hash_set |= (1 << sec_keys->gtk_set_index);
826+
}
827+
}
828+
829+
bool sec_prot_keys_ptk_installed_gtk_hash_mismatch_check(sec_prot_keys_t *sec_keys, uint8_t gtk_index)
830+
{
831+
if ((sec_keys->ins_gtk_hash_set & (1 << sec_keys->gtk_set_index)) == 0) {
832+
return false;
833+
}
834+
835+
uint8_t *gtk = sec_prot_keys_gtk_get(sec_keys->gtks, gtk_index);
836+
if (!gtk) {
837+
return false;
838+
}
839+
840+
// Calculated GTK hash for the current GTK on the defined index
841+
uint8_t gtk_hash[GTK_HASH_LEN];
842+
if (sec_prot_keys_gtk_hash_generate(gtk, gtk_hash) < 0) {
843+
return false;
844+
}
845+
846+
// If PTK has been used to install different GTK to index than the current one, trigger mismatch
847+
if (memcmp(sec_keys->ins_gtk_hash[sec_keys->gtk_set_index].hash, gtk_hash, INS_GTK_HASH_LEN) != 0) {
848+
return true;
849+
}
850+
851+
return false;
852+
}
853+
786854
#endif /* HAVE_WS */

‎source/Security/protocols/sec_prot_keys.h

+46-1
Original file line numberDiff line numberDiff line change
@@ -54,6 +54,7 @@
5454

5555
#define GTK_HASH_LEN 8
5656
#define GTK_ALL_HASHES_LEN GTK_HASH_LEN * GTK_NUM
57+
#define INS_GTK_HASH_LEN 2
5758

5859
#define PMK_LIFETIME_INSTALL 0xFFFFF
5960
#define PTK_LIFETIME_INSTALL 0xFFFFF
@@ -71,18 +72,24 @@ typedef struct {
7172
bool updated: 1; /**< Group Transient Keys has been updated */
7273
} sec_prot_gtk_keys_t;
7374

75+
typedef struct {
76+
uint8_t hash[INS_GTK_HASH_LEN]; /**< Inserted GTKs for a PTK hash */
77+
} sec_prot_gtk_hash_t;
78+
7479
// Security key data
7580
typedef struct {
7681
uint64_t pmk_key_replay_cnt; /**< Pairwise Master Key replay counter */
7782
uint8_t pmk[PMK_LEN]; /**< Pairwise Master Key (256 bits) */
7883
uint8_t ptk[PTK_LEN]; /**< Pairwise Transient Key (384 bits) */
7984
uint8_t ptk_eui_64[8]; /**< Remote EUI-64 used to derive PTK or NULL */
85+
sec_prot_gtk_hash_t ins_gtk_hash[GTK_NUM]; /**< Hashes for inserted GTKs for a PTK */
8086
sec_prot_gtk_keys_t *gtks; /**< Group Transient Keys */
8187
const sec_prot_certs_t *certs; /**< Certificates */
8288
uint32_t pmk_lifetime; /**< PMK lifetime in seconds */
8389
uint32_t ptk_lifetime; /**< PTK lifetime in seconds */
8490
uint8_t gtkl; /**< Remote GTKL information */
8591
int8_t gtk_set_index; /**< Index of GTK to set */
92+
uint8_t ins_gtk_hash_set: 4; /**< Hash for inserted GTKs for a PTK set */
8693
bool pmk_set: 1; /**< Pairwise Master Key set */
8794
bool ptk_set: 1; /**< Pairwise Transient Key set */
8895
bool pmk_key_replay_cnt_set: 1; /**< Pairwise Master Key replay counter set */
@@ -649,8 +656,20 @@ void sec_prot_keys_gtks_hash_generate(sec_prot_gtk_keys_t *gtks, uint8_t *gtk_ha
649656
* \param gtk GTK key
650657
* \param gtk_hash GTK hash for a GTK
651658
*
659+
* \return < 0 failure
660+
* \return >= 0 success
652661
*/
653-
void sec_prot_keys_gtk_hash_generate(uint8_t *gtk, uint8_t *gtk_hash);
662+
int8_t sec_prot_keys_gtk_hash_generate(uint8_t *gtk, uint8_t *gtk_hash);
663+
664+
/**
665+
* sec_prot_keys_gtk_valid_check check if GTK is valid
666+
*
667+
* \param gtk GTK key
668+
*
669+
* \return < 0 failure
670+
* \return >= 0 success
671+
*/
672+
int8_t sec_prot_keys_gtk_valid_check(uint8_t *gtk);
654673

655674
/**
656675
* sec_prot_keys_gtks_hash_update update GTKs based on GTK hash
@@ -751,4 +770,30 @@ int8_t sec_prot_keys_gtk_install_index_get(sec_prot_gtk_keys_t *gtks);
751770
*/
752771
uint8_t sec_prot_keys_gtk_count(sec_prot_gtk_keys_t *gtks);
753772

773+
/**
774+
* sec_prot_keys_ptk_installed_gtk_hash_clear_all clear GTK hashes of the GTKs that has been installed
775+
* to supplicant using the PTK
776+
* \param sec_keys security keys
777+
*
778+
*/
779+
void sec_prot_keys_ptk_installed_gtk_hash_clear_all(sec_prot_keys_t *sec_keys);
780+
781+
/**
782+
* sec_prot_keys_ptk_installed_gtk_hash_set set GTK hash of the GTK that has been installed
783+
* to supplicant using the current PTK
784+
*
785+
* \param sec_keys security keys
786+
*
787+
*/
788+
void sec_prot_keys_ptk_installed_gtk_hash_set(sec_prot_keys_t *sec_keys);
789+
790+
/**
791+
* sec_prot_keys_ptk_installed_gtk_hash_set check if PTK is being used to store new GTK for the index
792+
* for the supplicant i.e. GTK hash would change
793+
*
794+
* \param sec_keys security keys
795+
*
796+
*/
797+
bool sec_prot_keys_ptk_installed_gtk_hash_mismatch_check(sec_prot_keys_t *sec_keys, uint8_t gtk_index);
798+
754799
#endif /* SEC_PROT_KEYS_H_ */

0 commit comments

Comments
 (0)
Please sign in to comment.