summaryrefslogtreecommitdiffstats
path: root/src/include
diff options
context:
space:
mode:
authorMichael Brown2023-11-07 12:08:33 +0100
committerMichael Brown2023-11-07 14:31:20 +0100
commit1bd01b761f1f33723f0b07d277863b3284dfe232 (patch)
tree65e1a4a066e38d039a39a3853b5597a2b3e91949 /src/include
parent[pci] Require discovery of a PCI device when determining usable PCI APIs (diff)
downloadipxe-1bd01b761f1f33723f0b07d277863b3284dfe232.tar.gz
ipxe-1bd01b761f1f33723f0b07d277863b3284dfe232.tar.xz
ipxe-1bd01b761f1f33723f0b07d277863b3284dfe232.zip
[eapol] Delay EAPoL-Start while waiting for EAP to complete
EAP exchanges may take a long time to reach a final status, especially when relying upon MAC Authentication Bypass (MAB). Our current behaviour of sending EAPoL-Start every few seconds until a final status is obtained can prevent these exchanges from ever completing. Fix by redefining the EAP supplicant state to allow EAPoL-Start to be suppressed: either temporarily (while waiting for a full EAP exchange to complete, in which case we need to eventually resend EAPoL-Start if the final Success or Failure packet is lost), or permanently (while waiting for the potentially very long MAC Authentication Bypass timeout period). Signed-off-by: Michael Brown <mcb30@ipxe.org>
Diffstat (limited to 'src/include')
-rw-r--r--src/include/ipxe/eap.h41
1 files changed, 38 insertions, 3 deletions
diff --git a/src/include/ipxe/eap.h b/src/include/ipxe/eap.h
index e5f60655..818862a9 100644
--- a/src/include/ipxe/eap.h
+++ b/src/include/ipxe/eap.h
@@ -51,7 +51,7 @@ union eap_packet {
struct eap_request req;
};
-/** Link block timeout
+/** EAP link block timeout
*
* We mark the link as blocked upon receiving a Request-Identity, on
* the basis that this most likely indicates that the switch will not
@@ -64,12 +64,30 @@ union eap_packet {
*/
#define EAP_BLOCK_TIMEOUT ( 45 * TICKS_PER_SEC )
+/** EAP protocol wait timeout
+ *
+ * In the EAP model, the supplicant is a pure responder. The model
+ * also defines no acknowledgement response for the final Success or
+ * Failure "requests". This leaves open the possibility that the
+ * final Success or Failure packet is lost, with the supplicant having
+ * no way to determine the final authentication status.
+ *
+ * Sideband mechanisms such as EAPoL-Start may be used to restart the
+ * entire EAP process, as a (crude) workaround for this protocol flaw.
+ * When expecting to receive a further EAP request (e.g. an
+ * authentication challenge), we may wait for some length of time
+ * before triggering this restart. Choose a duration that is shorter
+ * than the link block timeout, so that there is no period during
+ * which we erroneously leave the link marked as not blocked.
+ */
+#define EAP_WAIT_TIMEOUT ( EAP_BLOCK_TIMEOUT * 7 / 8 )
+
/** An EAP supplicant */
struct eap_supplicant {
/** Network device */
struct net_device *netdev;
- /** Authentication outcome is final */
- int done;
+ /** Flags */
+ unsigned int flags;
/**
* Transmit EAP response
*
@@ -82,6 +100,23 @@ struct eap_supplicant {
const void *data, size_t len );
};
+/** EAP authentication is in progress
+ *
+ * This indicates that we have received an EAP Request-Identity, but
+ * have not yet received a final EAP Success or EAP Failure.
+ */
+#define EAP_FL_ONGOING 0x0001
+
+/** EAP supplicant is passive
+ *
+ * This indicates that the supplicant should not transmit any futher
+ * unsolicited packets (e.g. EAPoL-Start for a supplicant running over
+ * EAPoL). This could be because authentication has already
+ * completed, or because we are relying upon MAC Authentication Bypass
+ * (MAB) which may have a very long timeout.
+ */
+#define EAP_FL_PASSIVE 0x0002
+
extern int eap_rx ( struct eap_supplicant *supplicant,
const void *data, size_t len );