lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <20220413001158.1202194-1-lech.perczak@gmail.com> Date: Wed, 13 Apr 2022 02:11:55 +0200 From: Lech Perczak <lech.perczak@...il.com> To: netdev@...r.kernel.org, linux-usb@...r.kernel.org Cc: Lech Perczak <lech.perczak@...il.com>, Kristian Evensen <kristian.evensen@...il.com>, Bjørn Mork <bjorn@...k.no>, Oliver Neukum <oliver@...kum.org> Subject: [PATCH v2 0/3] rndis_host: handle bogus MAC addresses in ZTE RNDIS devices MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit When porting support of ZTE MF286R to OpenWrt [1], it was discovered, that its built-in LTE modem fails to adjust its target MAC address, when a random MAC address is assigned to the interface, due to detection of "locally-administered address" bit. This leads to dropping of ingress trafficat the host. The modem uses RNDIS as its primary interface, with some variants exposing both of them simultaneously. Then it was discovered, that cdc_ether driver contains a fixup for that exact issue, also appearing on CDC ECM interfaces. I discussed how to proceed with that with Bjørn Mork at OpenWrt forum [3], with the first approach would be to trust the locally-administered MAC again, and add a quirk for the problematic ZTE devices, as suggested by Kristian Evensen. before [4], but reusing the fixup from cdc_ether looks like a safer and more generic solution. Finally, according to Bjørn's suggestion. limit the scope of bogus MAC addressdetection to ZTE devices, the same way as it is done in cdc_ether, as this trait wasn't really observed outside of ZTE devices. Do that for both flavours of RNDIS devices, with interface classes 02/02/ff and e0/01/03, as both types are reported by different modems. [1] https://git.openwrt.org/?p=openwrt/openwrt.git;a=commit;h=7ac8da00609f42b8aba74b7efc6b0d055b7cef3e [2] https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bfe9b9d2df669a57a95d641ed46eb018e204c6ce [3] https://forum.openwrt.org/t/problem-with-modem-in-zte-mf286r/120988 [4] https://lore.kernel.org/all/CAKfDRXhDp3heiD75Lat7cr1JmY-kaJ-MS0tt7QXX=s8RFjbpUQ@mail.gmail.com/T/ Cc: Kristian Evensen <kristian.evensen@...il.com> Cc: Bjørn Mork <bjorn@...k.no> Cc: Oliver Neukum <oliver@...kum.org> v2: ensure that MAC fixup is applied to all Ethernet frames in RNDIS batch, by introducing a driver flag, and integrating the fixup inside rndis_rx_fixup(). Lech Perczak (3): cdc_ether: export usbnet_cdc_zte_rx_fixup rndis_host: enable the bogus MAC fixup for ZTE devices from cdc_ether rndis_host: limit scope of bogus MAC address detection to ZTE devices drivers/net/usb/cdc_ether.c | 3 ++- drivers/net/usb/rndis_host.c | 48 ++++++++++++++++++++++++++++++---- include/linux/usb/rndis_host.h | 1 + include/linux/usb/usbnet.h | 1 + 4 files changed, 47 insertions(+), 6 deletions(-) -- 2.30.2
Powered by blists - more mailing lists