mirror of
https://github.com/vanhoefm/fragattacks.git
synced 2025-02-26 13:49:35 -05:00
Reduce undesired logging of ACL rejection events from AP mode
When Probe Request frame handling was extended to use MAC ACL through ieee802_11_allowed_address(), the MSG_INFO level log print ("Station <addr> not allowed to authenticate") from that function ended up getting printed even for Probe Request frames. That was not by design and it can result in excessive logging and MSG_INFO level if MAC ACL is used. Fix this by printing this log entry only for authentication and association frames. In addition, drop the priority of that log entry to MSG_DEBUG since this is not really an unexpected behavior in most MAC ACL use cases. Fixes: 92eb00aec2a0 ("Extend ACL check for Probe Request frames") Signed-off-by: Jouni Malinen <j@w1.fi>
This commit is contained in:
parent
4816bd3b22
commit
6588f71222
@ -1665,9 +1665,11 @@ ieee802_11_allowed_address(struct hostapd_data *hapd, const u8 *addr,
|
||||
is_probe_req);
|
||||
|
||||
if (res == HOSTAPD_ACL_REJECT) {
|
||||
wpa_printf(MSG_INFO,
|
||||
"Station " MACSTR " not allowed to authenticate",
|
||||
MAC2STR(addr));
|
||||
if (!is_probe_req)
|
||||
wpa_printf(MSG_DEBUG,
|
||||
"Station " MACSTR
|
||||
" not allowed to authenticate",
|
||||
MAC2STR(addr));
|
||||
return HOSTAPD_ACL_REJECT;
|
||||
}
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user