All of lore.kernel.org
 help / color / mirror / Atom feed
From: "Ganir, Chen" <chen.ganir@ti.com>
To: Brian Gix <bgix@codeaurora.org>
Cc: "linux-bluetooth@vger.kernel.org" <linux-bluetooth@vger.kernel.org>
Subject: RE: SMP Key distribution
Date: Tue, 6 Dec 2011 07:43:13 +0000	[thread overview]
Message-ID: <F0070FBC0FB3174D8D11444EB2D5B0264404E9@DNCE02.ent.ti.com> (raw)
In-Reply-To: <4EDD0312.1080309@codeaurora.org>

Brian, 

> -----Original Message-----
> From: Brian Gix [mailto:bgix@codeaurora.org]
> Sent: Monday, December 05, 2011 7:45 PM
> To: Ganir, Chen
> Cc: linux-bluetooth@vger.kernel.org
> Subject: Re: SMP Key distribution
> 
> Hi Chen,
> 
> On 12/5/2011 7:48 AM, Ganir, Chen wrote:
> > Brian,
> >
> > I understand that we support only those keys, but I don't think that
> we can break the convention just because of our lack of support. We can
> ignore any other keys, but still we need to start distributing our keys
> only after the slave has finished sending all of his keys, and not do
> it automatically after the Master identification sent from the slave.
> >
> 
> You are correct, and this is definitely one of the things I hope to
> address (if someone else doesn't beat me to it) once I get the MITM
> changes that I have submitted accepted into bluetooth-next.
> 
So basically what we need to do is listen for the SMP_CMD_MASTER_IDENT, SMP_CMD_IDENT_INFO, SMP_CMD_IDENT_ADDR_INFO and SMP_CMD_SIGN_INFO, and check the slave key distribution options to see how many keys he is sending. If we get one of these and it is actually the last key from the slave, and then distribute the master keys with the smp_distribute_keys (simply call a new function like smp_check_last_slave_key() which will do this work). Am I correct ?

> > In addition, I believe there is a problem in the SMP code. In
> smp_cmd_master_ident, we do hci_add_ltk() with the conn->src instead of
> conn->dst, as in other places we call the hci_add_ltk():
> >
> 
> This may or may not be a bug, depending on how you look at things.
> When
> "Privacy" is implemented, it will be possible for a remote device to
> "change addresses" on us (either via the "Address Resolution" key
> distribution, or via the GAP primary service) and it becomes "more
> interesting" to keep track of who is who.  Saving the LTK with the SRC
> (local) address might work, because LTK resolution is suppose to be
> done
> by matching on the EDIV and Randomizer, not by address.
> 
> Having said that, however, If we are the Master (which most Dual mode
> devices will generally be) we still need to know the remote devices
> BDADDR, so that we can establish the connection, and thereafter kick
> off
> link encryption.  So yes, I would still consider that the Bug:  The
> Master gets an LTK+MID from the Slave, which will be used to encrypt
> links as long as those roles do not change.  Therefore, the Master
> should be storing the LTK+MID pair under that Slaves Identity (BDADDR).
> 
> One of the catches being however, that if we get Address Resolution
> keys, or the slaves GAP Primary Service tells us to use a different
> Address, this storage "key" will need to be adjusted.
> 
Calling the hci_add_ltk with the conn->src actually causes the code to call mgmt_new_link_key with the local and remote addresses to be the same, which then causes the btd_event_link_key_notify(...) -> get_adapter_and_device(...) -> adapter_get_device(...) -> adapter_create_device(...) to create a new device, with the local address instead of the remote one. This is mostly due to the fact that get_adapter_and_device is called with the create flag hard coded as TRUE, even for this problematic key. What do you think about this ?

> > static int smp_cmd_master_ident(struct l2cap_conn *conn, struct
> sk_buff *skb)
> > {
> > 	struct smp_cmd_master_ident *rp = (void *) skb->data;
> > 	struct smp_chan *smp = conn->smp_chan;
> >
> > 	skb_pull(skb, sizeof(*rp));
> >
> > 	hci_add_ltk(conn->hcon->hdev, 1, conn->src, smp->smp_key_size,
> > 						rp->ediv, rp->rand, smp->tk);
> >
> > 	smp_distribute_keys(conn, 1);
> >
> > 	return 0;
> > }
> >
> > In addition, we call the hci_add_ltk twice in this case - once from
> this function, and once from the smp_distribute_keys. Is this
> intentional or is this a bug ?
> 
> This is not actually a bug.  Or at least not what I would consider a
> serious bug.  The LTK key that the Slave sends to the Master, is
> distinct from the key the Master sends to the Slave.
> 
> However, as I indicated above, an LTK+MID pair that is distributed
> "outbound" should not be associated with the remote devices BDADDR. It
> should be stored using a lookup key that is the EDIV, which is
> authenticated with the Randomizer.
> 
> >
> > Thanks,
> > Chen Ganir.
> 
> 
> --
> Brian Gix
> bgix@codeaurora.org
> Employee of Qualcomm Innovation Center, Inc.
> Qualcomm Innovation Center, Inc. is a member of Code Aurora Forum

Thanks,
Chen Ganir.

  reply	other threads:[~2011-12-06  7:43 UTC|newest]

Thread overview: 7+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2011-12-05  9:02 SMP Key distribution Ganir, Chen
2011-12-05 15:39 ` Brian Gix
2011-12-05 15:48   ` Ganir, Chen
2011-12-05 17:44     ` Brian Gix
2011-12-06  7:43       ` Ganir, Chen [this message]
2011-12-06 18:16         ` Brian Gix
2011-12-07  0:54           ` Vinicius Costa Gomes

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=F0070FBC0FB3174D8D11444EB2D5B0264404E9@DNCE02.ent.ti.com \
    --to=chen.ganir@ti.com \
    --cc=bgix@codeaurora.org \
    --cc=linux-bluetooth@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.