Added support for enforcing frequent PTK rekeying
authorJouni Malinen <jouni.malinen@atheros.com>
Thu, 6 Nov 2008 17:57:21 +0000 (19:57 +0200)
committerJouni Malinen <j@w1.fi>
Thu, 6 Nov 2008 17:57:21 +0000 (19:57 +0200)
commit581a8cde77670ba7de2cce57f4a723ba435df9b7
treed06cf58048193c7a10dc8e6de59fc414124fffcc
parent81eec387dd7c1f4521822e48023e950dfa7b5a52
Added support for enforcing frequent PTK rekeying

Added a new configuration option, wpa_ptk_rekey, that can be used to
enforce frequent PTK rekeying, e.g., to mitigate some attacks against TKIP
deficiencies. This can be set either by the Authenticator (to initiate
periodic 4-way handshake to rekey PTK) or by the Supplicant (to request
Authenticator to rekey PTK).

With both wpa_ptk_rekey and wpa_group_rekey (in hostapd) set to 600, TKIP
keys will not be used for more than 10 minutes which may make some attacks
against TKIP more difficult to implement.
15 files changed:
hostapd/ChangeLog
hostapd/config.c
hostapd/config.h
hostapd/hostapd.c
hostapd/hostapd.conf
hostapd/wpa.c
hostapd/wpa.h
src/rsn_supp/wpa.c
src/rsn_supp/wpa.h
src/rsn_supp/wpa_i.h
wpa_supplicant/ChangeLog
wpa_supplicant/config.c
wpa_supplicant/config_ssid.h
wpa_supplicant/wpa_supplicant.conf
wpa_supplicant/wpas_glue.c