Re: Modularized encryption and individual station keys


From: Jouni Malinen (jkmaline_at_cc.hut.fi)
Date: 2002-07-19 08:57:39 UTC



On Thu, Jul 18, 2002 at 05:41:42PM -0500, J Yunke wrote:

> /sbin/hostap_crypt_conf wlan0 \
> 00:06:25:01:01:01 \
> WEP \
> 12345678901234567890123456
>
> ...causes:
>
> ioctl: Invalid argument
>
> ...what does this mean? Is there a /proc/* file that shows a summary of
> hostap_crypt_conf settings?

Error reporting (and documentation) could use some more work.. There are two possibilities for that. Either you did not have hostap_crypt_wep.o loaded or the given STA addr did not have an entry (i.e., the station had not yet authenticated) in the AP data.

The default command changes only currently available data and there is an option, -p, for setting permanent station data (i.e., automatically create new STA entry and do not allow expiration mechanism to remove it). I would guess that adding -p to your command line would fix this problem (and hopefully, the future version of the tool will be able to tell this automatically).

I did not yet add any summary proc file, but that could be quite useful. I was a bit concerned about showing the key data in it, but it might be useful even without the key data (or alternatively it will be only readable for root). Currently, 'debug' and STA addr files in proc have only "crypt=<algname>" lines showing which algorithm is configured (or if the line is not present, showing that encryption is not used). I could add a file that would list all configured keys (default and individual keys). I will also check if 'iwlist wlan0 key' could be used for this since it already exists in wireless tools.

-- 
Jouni Malinen                                            PGP id EFC895FA


This archive was generated by hypermail 2.1.4.