mirror of
https://github.com/vanhoefm/fragattacks.git
synced 2024-11-25 16:58:41 -05:00
6605562af6
Add a test that verifies that no Association Request frame is sent to APs that include the MBO IE with association disallowed attribute in Beacon and Probe Response frames. Signed-off-by: Avraham Stern <avraham.stern@intel.com>
60 lines
2.4 KiB
Python
60 lines
2.4 KiB
Python
# MBO tests
|
|
# Copyright (c) 2016, Intel Deutschland GmbH
|
|
#
|
|
# This software may be distributed under the terms of the BSD license.
|
|
# See README for more details.
|
|
|
|
import logging
|
|
logger = logging.getLogger()
|
|
|
|
import hostapd
|
|
import os
|
|
|
|
from tshark import run_tshark
|
|
|
|
def test_mbo_assoc_disallow(dev, apdev, params):
|
|
hapd1 = hostapd.add_ap(apdev[0]['ifname'], { "ssid": "MBO", "mbo": "1" })
|
|
hapd2 = hostapd.add_ap(apdev[1]['ifname'], { "ssid": "MBO", "mbo": "1" })
|
|
|
|
logger.debug("Set mbo_assoc_disallow with invalid value")
|
|
if "FAIL" not in hapd1.request("SET mbo_assoc_disallow 2"):
|
|
raise Exception("Set mbo_assoc_disallow for AP1 succeeded unexpectedly with value 2")
|
|
|
|
logger.debug("Disallow associations to AP1 and allow association to AP2")
|
|
if "OK" not in hapd1.request("SET mbo_assoc_disallow 1"):
|
|
raise Exception("Failed to set mbo_assoc_disallow for AP1")
|
|
if "OK" not in hapd2.request("SET mbo_assoc_disallow 0"):
|
|
raise Exception("Failed to set mbo_assoc_disallow for AP2")
|
|
|
|
dev[0].connect("MBO", key_mgmt="NONE", scan_freq="2412")
|
|
|
|
out = run_tshark(os.path.join(params['logdir'], "hwsim0.pcapng"),
|
|
"wlan.fc.type == 0 && wlan.fc.type_subtype == 0x00",
|
|
wait=False)
|
|
if "Destination address: " + hapd1.own_addr() in out:
|
|
raise Exception("Association request sent to disallowed AP")
|
|
|
|
timestamp = run_tshark(os.path.join(params['logdir'], "hwsim0.pcapng"),
|
|
"wlan.fc.type_subtype == 0x00",
|
|
display=['frame.time'], wait=False)
|
|
|
|
logger.debug("Allow associations to AP1 and disallow assications to AP2")
|
|
if "OK" not in hapd1.request("SET mbo_assoc_disallow 0"):
|
|
raise Exception("Failed to set mbo_assoc_disallow for AP1")
|
|
if "OK" not in hapd2.request("SET mbo_assoc_disallow 1"):
|
|
raise Exception("Failed to set mbo_assoc_disallow for AP2")
|
|
|
|
dev[0].request("DISCONNECT")
|
|
dev[0].wait_disconnected()
|
|
|
|
# Force new scan, so the assoc_disallowed indication is updated */
|
|
dev[0].request("FLUSH")
|
|
|
|
dev[0].connect("MBO", key_mgmt="NONE", scan_freq="2412")
|
|
|
|
filter = 'wlan.fc.type == 0 && wlan.fc.type_subtype == 0x00 && frame.time > "' + timestamp.rstrip() + '"'
|
|
out = run_tshark(os.path.join(params['logdir'], "hwsim0.pcapng"),
|
|
filter, wait=False)
|
|
if "Destination address: " + hapd2.own_addr() in out:
|
|
raise Exception("Association request sent to disallowed AP 2")
|