Add krackattacks mitigation

Bug #1730399 reported by Patel
8
This bug affects 1 person
Affects Status Importance Assigned to Milestone
wpa (Ubuntu)
Fix Released
Undecided
Unassigned

Bug Description

See for reference:
https://www.krackattacks.com/#ap-mitigations

Yes this is not a bug. However, it has been noted on ubuntu-devel that adding some features even to stable releases could be justified in *some* cases.
First of paramount importance is that the fix introduces no regression.
In this case this code is *only* used if a new parameter is set:

wpa_disable_eapol_key_retries=1

if this parameter is missing, behaviour will not change.
So any regression introduced will be caused by a deliberate admin decision, from where all responsability could be denied (use at your own risk, yadda, yadda...)

Then is this parameter useful: it could be for the hundred of millions of Android Phone that are not yet patched (6.0 et upper) and will never be patched (about 50% of existing Android Phones).

Please note that at least one wifi provider has already decided to provide this feature to help its users:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171016-wpa

so this is something that leaders do :-)

I have already patched my AP that runs Ubuntu 16 LTS (see attached patch against 2.4-0ubuntu6.2, I have used my AP for 3 days now with a Ubuntu and an Android client without problem) and I could try to provide a patch for Ubuntu 17. This kind of patch is really trivial anyway, since it's just a port of the upstream patch in hostapd:

https://w1.fi/cgit/hostap/commit/?id=6f234c1e2ee1ede29f2412b7012b3345ed8e52d3

However I have a big problem. Any security patch (and this is a security enhancing patch at least) is only worth as much as it is *tested*. And I don't have the means to verify that mitigation is effective, as the vulnerability discoverer has not provided (for obvious reasons) public testing code for clients.
I think that Ubuntu should have this code (or did you just distribute security patches without testing that they are effective ? that would not be very serious IMO).
There is no chance that M. Vanhoef sends his code to any old dog on the internet, so Canonical is my only chance for a real test of this feature on an Ubuntu AP (short of rewriting the attack code myself, not an attractive proposition).
If in fact you don't have the testing (well, attack) code feel free to dismiss my bug report as irrelevant. But if you have please consider the opportunity to add some goodwill to Ubuntu. Thanks.

Tags: patch
Revision history for this message
Patel (gp451ly) wrote :
Revision history for this message
Ubuntu Foundations Team Bug Bot (crichton) wrote :

The attachment "Krackattacks mitigation for Ubuntu 16LTS test patch" seems to be a patch. If it isn't, please remove the "patch" flag from the attachment, remove the "patch" tag, and if you are a member of the ~ubuntu-reviewers, unsubscribe the team.

[This is an automated message performed by a Launchpad user owned by ~brian-murray, for any issues please contact him.]

tags: added: patch
Changed in wpa (Ubuntu):
status: New → Confirmed
Revision history for this message
Launchpad Janitor (janitor) wrote :
Download full text (4.6 KiB)

This bug was fixed in the package wpa - 2:2.6-15ubuntu1

---------------
wpa (2:2.6-15ubuntu1) bionic; urgency=low

  * Merge from Debian unstable. Remaining changes:
    - debian/patches/wpa_service_ignore-on-isolate.patch: add
      IgnoreOnIsolate=yes so that when switching "runlevels" in oem-config
      will not kill off wpa and cause wireless to be unavailable on first
      boot.
    - debian/patches/session-ticket.patch: disable the TLS Session Ticket
      extension to fix auth with 802.1x PEAP on some hardware.
    - debian/patches/android_hal_fw_path_change.patch: add a DBus method
      for requesting a firmware change when working with the Android HAL;
      this is used to set a device in P2P or AP mode; conditional to
      CONFIG_ANDROID_HAL being enabled.
    - debian/config/wpasupplicant/linux: enable CONFIG_ANDROID_HAL.
    - debian/control: Build-Depends on android-headers to get the required
      wifi headers for the HAL support.
    - debian/patches/dbus-available-sta.patch: Make the list of connected
      stations available on DBus for hotspot mode; along with some of the
      station properties, such as rx/tx packets, bytes, capabilities, etc.
  * Updated debian/patches/dbus-available-sta.patch for new getter API
    and refreshed other patches.

wpa (2:2.6-15) unstable; urgency=medium

  * Update debian/control:
    - Update Maintainer field to point to $<email address hidden>
    - Update Vcs-* fields to point to salsa.d.o
    - Drop no longer active uploaders.

wpa (2:2.6-14) unstable; urgency=medium

  * Replace the PEM fix patch by Lukasz Siudut with an upstream patch.
    Thanks to David Benjamin <email address hidden>.
  * Apply patches from Beniamino Galvani:
    - Fix race condition in detecting MAC address change
    - Update MAC address when driver detects a change
  * Disable WNM to resolve a compatibility issue with wl.
    Thanks to YOSHINO Yoshihito <email address hidden>.
    Hopefully really closes: #833507.

wpa (2:2.6-13) unstable; urgency=medium

  * Fix a typo in functions.sh (Closes: #883659).

wpa (2:2.6-12) unstable; urgency=medium

  * Add wl to the blacklist for MAC randomisation. (Closes: #833507)
  * Blacklist an out-of-tree driver for Realtek RTL8188EU too.

wpa (2:2.6-11) unstable; urgency=medium

  * Unbreak EAP-TLS.
    Thanks to Dmitry Borodaenko <email address hidden>

wpa (2:2.6-10) unstable; urgency=medium

  * Mask hostapd every time it has no valid configuration.

wpa (2:2.6-9) unstable; urgency=medium

  * Tell NetworkManager to not touch MAC addresses on unsupported drivers.
    Hopefully, this will fix #849077.

wpa (2:2.6-8) unstable; urgency=medium

  * Revert "Build wpa_supplicant with interface matching support."
    (Closes: #882716).
  * Drop override_dh_builddeb.
  * Use dh 10.
  * Prevent hostapd from failing on the package install when there
    isn't a valid configuration file yet (Closes: #882740):
    - Don't enable hostapd.service by default.
    - Mask hostapd.service on the first install.

wpa (2:2.6-7) unstable; urgency=medium

  * Upload to unstable.
  * Optional AP side workaround for key reinstallation attacks (LP: #1730399).

wpa (2:2.6-6) experimental...

Read more...

Changed in wpa (Ubuntu):
status: Confirmed → Fix Released
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.