Public bug reported:

There is a setting available on selected Cisco hardware named "Wi-Fi
Direct Client Policy". One of the allowed option there is 'not-allow'.
It's intention is to block WiFi P2P capable devices from connecting to
it. If a device trying to associate with an AP with this setting enabled
is identified as "P2P capable" it gets blacklisted (I believe for a
preconfigured time). More info about the option available at [1] and
[2].

This leads to a situation that it is impossible to connect to certain
APs using certain WiFi chips using iwlwifi driver. I was able to
determine that this at least affects Intel 8260 chip.

What's going on on the WiFi level is:
The AP broadcasts beacon frames with P2P IE:
Tag: Vendor Specific: Wi-FiAll: P2P
    Tag Number: Vendor Specific (221)
    Tag length: 8
    OUI: 50-6f-9a (Wi-FiAll)
    Vendor Specific OUI Type: 9
    P2P Manageability: Bitmap field 0x5
        Attribute Type: P2P Manageability (10)
        Attribute Length: 1
        Manageability Bitmap field: 0x05
        .... ...1 = P2P Device Management: 0x1
        .... ..0. = Cross Connection Permitted: 0x0
        .... .1.. = Coexistence Optional: 0x1

The client then sends a Probe Request, also with a P2P IE in it:
Tag: Vendor Specific: Wi-FiAll: P2P
    Tag Number: Vendor Specific (221)
    Tag length: 17
    OUI: 50-6f-9a (Wi-FiAll)
    Vendor Specific OUI Type: 9
    P2P Capability: Device 0x25  Group 0x0
        Attribute Type: P2P Capability (2)
        Attribute Length: 2
        Device Capability Bitmap: 0x25
        .... ...1 = Service Discovery: 0x1
        .... ..0. = P2P Client Discoverability: 0x0
        .... .1.. = Concurrent Operation: 0x1
        .... 0... = P2P Infrastructure Managed: 0x0
        ...0 .... = P2P Device Limit: 0x0
        ..1. .... = P2P Invitation Procedure: 0x1
        Group Capability Bitmap: 0x00
        .... ...0 = P2P Group Owner: 0x0
        .... ..0. = Persistent P2P Group: 0x0
        .... .0.. = P2P Group Limit: 0x0
        .... 0... = Intra-BSS Distribution: 0x0
        ...0 .... = Cross Connection: 0x0
        ..0. .... = Persistent Reconnect: 0x0
        .0.. .... = Group Formation: 0x0
    Listen Channel: Operating Class 81  Channel Number 1
        Attribute Type: Listen Channel (6)
        Attribute Length: 5
        Country String: XX\004
        Operating Class: 81
        Channel Number: 1

The AP never replies to that Probe Request and blacklists the device for
a given period of time from all communication.

I was able to test a custom kernel with all P2P interfaces commented out
from iwlwifi/mvm/mac80211.c - it was able to connect to the AP without
any issues.

For instance this issue does not affect bcm43224 device running with
brcm80211 - in this case the client device sends a Probe Request without
the P2P IE. Despite it's is actually P2P-capable the AP does not
recognize it as such and allows it to connect.

I have also started a mailing list thread about it [3].

What I think could fix it is either:
* making it behave more like the broadcom driver so it allows users to connect
* provide an user-friendly option of disabling p2p capabilites (including 
transmitting probe reuqests without P2P IE)
* as suggested on the ML [4] implement sections 3.4.3/3.4.4 of the WiFi Direct 
spec in the driver

According to my knowledge it affects all currently supported releases:
Trusty, Xenial, Zesty plus Artful.

[1] 
https://supportforums.cisco.com/t5/security-and-network-management/wi-fi-direct-client-policy/td-p/2253033
[2] 
https://www.cisco.com/c/en/us/td/docs/wireless/controller/7-4/configuration/guides/consolidated/b_cg74_CONSOLIDATED/b_cg74_CONSOLIDATED_chapter_010111110.html
[3] https://marc.info/?l=linux-wireless&m=150306048824814&w=2
[4] https://marc.info/?l=linux-wireless&m=150461784431430&w=2

** Affects: linux (Ubuntu)
     Importance: Undecided
         Status: Incomplete

** Description changed:

  There is a setting available on selected Cisco hardware named "Wi-Fi
  Direct Client Policy". One of the allowed option there is 'not-allow'.
  It's intention is to block WiFi P2P capable devices from connecting to
  it. If a device trying to associate with an AP with this setting enabled
  is identified as "P2P capable" it gets blacklisted (I believe for a
  preconfigured time). More info about the option available at [1] and
  [2].
  
  This leads to a situation that it is impossible to connect to certain
  APs using certain WiFi chips using iwlwifi driver. I was able to
  determine that this at least affects Intel 8260 chip.
  
  What's going on on the WiFi level is:
  The AP broadcasts beacon frames with P2P IE:
  Tag: Vendor Specific: Wi-FiAll: P2P
-     Tag Number: Vendor Specific (221)
-     Tag length: 8
-     OUI: 50-6f-9a (Wi-FiAll)
-     Vendor Specific OUI Type: 9
-     P2P Manageability: Bitmap field 0x5
-         Attribute Type: P2P Manageability (10)
-         Attribute Length: 1
-         Manageability Bitmap field: 0x05
-         .... ...1 = P2P Device Management: 0x1
-         .... ..0. = Cross Connection Permitted: 0x0
-         .... .1.. = Coexistence Optional: 0x1
+     Tag Number: Vendor Specific (221)
+     Tag length: 8
+     OUI: 50-6f-9a (Wi-FiAll)
+     Vendor Specific OUI Type: 9
+     P2P Manageability: Bitmap field 0x5
+         Attribute Type: P2P Manageability (10)
+         Attribute Length: 1
+         Manageability Bitmap field: 0x05
+         .... ...1 = P2P Device Management: 0x1
+         .... ..0. = Cross Connection Permitted: 0x0
+         .... .1.. = Coexistence Optional: 0x1
  
  The client then sends a Probe Request, also with a P2P IE in it:
  Tag: Vendor Specific: Wi-FiAll: P2P
-     Tag Number: Vendor Specific (221)
-     Tag length: 17
-     OUI: 50-6f-9a (Wi-FiAll)
-     Vendor Specific OUI Type: 9
-     P2P Capability: Device 0x25  Group 0x0
-         Attribute Type: P2P Capability (2)
-         Attribute Length: 2
-         Device Capability Bitmap: 0x25
-         .... ...1 = Service Discovery: 0x1
-         .... ..0. = P2P Client Discoverability: 0x0
-         .... .1.. = Concurrent Operation: 0x1
-         .... 0... = P2P Infrastructure Managed: 0x0
-         ...0 .... = P2P Device Limit: 0x0
-         ..1. .... = P2P Invitation Procedure: 0x1
-         Group Capability Bitmap: 0x00
-         .... ...0 = P2P Group Owner: 0x0
-         .... ..0. = Persistent P2P Group: 0x0
-         .... .0.. = P2P Group Limit: 0x0
-         .... 0... = Intra-BSS Distribution: 0x0
-         ...0 .... = Cross Connection: 0x0
-         ..0. .... = Persistent Reconnect: 0x0
-         .0.. .... = Group Formation: 0x0
-     Listen Channel: Operating Class 81  Channel Number 1
-         Attribute Type: Listen Channel (6)
-         Attribute Length: 5
-         Country String: XX\004
-         Operating Class: 81
-         Channel Number: 1
+     Tag Number: Vendor Specific (221)
+     Tag length: 17
+     OUI: 50-6f-9a (Wi-FiAll)
+     Vendor Specific OUI Type: 9
+     P2P Capability: Device 0x25  Group 0x0
+         Attribute Type: P2P Capability (2)
+         Attribute Length: 2
+         Device Capability Bitmap: 0x25
+         .... ...1 = Service Discovery: 0x1
+         .... ..0. = P2P Client Discoverability: 0x0
+         .... .1.. = Concurrent Operation: 0x1
+         .... 0... = P2P Infrastructure Managed: 0x0
+         ...0 .... = P2P Device Limit: 0x0
+         ..1. .... = P2P Invitation Procedure: 0x1
+         Group Capability Bitmap: 0x00
+         .... ...0 = P2P Group Owner: 0x0
+         .... ..0. = Persistent P2P Group: 0x0
+         .... .0.. = P2P Group Limit: 0x0
+         .... 0... = Intra-BSS Distribution: 0x0
+         ...0 .... = Cross Connection: 0x0
+         ..0. .... = Persistent Reconnect: 0x0
+         .0.. .... = Group Formation: 0x0
+     Listen Channel: Operating Class 81  Channel Number 1
+         Attribute Type: Listen Channel (6)
+         Attribute Length: 5
+         Country String: XX\004
+         Operating Class: 81
+         Channel Number: 1
  
  The AP never replies to that Probe Request and blacklists the device for
  a given period of time from all communication.
  
  I was able to test a custom kernel with all P2P interfaces commented out
  from iwlwifi/mvm/mac80211.c - it was able to connect to the AP without
  any issues.
  
  For instance this issue does not affect bcm43224 device running with
  brcm80211 - in this case the client device sends a Probe Request without
  the P2P IE. Despite it's is actually P2P-capable the AP does not
  recognize it as such and allows it to connect.
  
  I have also started a mailing list thread about it [3].
  
  What I think could fix it is either:
  * making it behave more like the broadcom driver so it allows users to connect
  * provide an user-friendly option of disabling p2p capabilites (including 
transmitting probe reuqests without P2P IE)
  * as suggested on the ML [4] implement sections 3.4.3/3.4.4 of the WiFi 
Direct spec in the driver
  
+ According to my knowledge it affects all currently supported releases:
+ Trusty, Xenial, Zesty plus Artful.
+ 
  [1] 
https://supportforums.cisco.com/t5/security-and-network-management/wi-fi-direct-client-policy/td-p/2253033
  [2] 
https://www.cisco.com/c/en/us/td/docs/wireless/controller/7-4/configuration/guides/consolidated/b_cg74_CONSOLIDATED/b_cg74_CONSOLIDATED_chapter_010111110.html
  [3] https://marc.info/?l=linux-wireless&m=150306048824814&w=2
  [4] https://marc.info/?l=linux-wireless&m=150461784431430&w=2

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1718688

Title:
  Can't connect to a Cisco AP with Wi-Fi Direct Client Policy enabled

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  There is a setting available on selected Cisco hardware named "Wi-Fi
  Direct Client Policy". One of the allowed option there is 'not-allow'.
  It's intention is to block WiFi P2P capable devices from connecting to
  it. If a device trying to associate with an AP with this setting
  enabled is identified as "P2P capable" it gets blacklisted (I believe
  for a preconfigured time). More info about the option available at [1]
  and [2].

  This leads to a situation that it is impossible to connect to certain
  APs using certain WiFi chips using iwlwifi driver. I was able to
  determine that this at least affects Intel 8260 chip.

  What's going on on the WiFi level is:
  The AP broadcasts beacon frames with P2P IE:
  Tag: Vendor Specific: Wi-FiAll: P2P
      Tag Number: Vendor Specific (221)
      Tag length: 8
      OUI: 50-6f-9a (Wi-FiAll)
      Vendor Specific OUI Type: 9
      P2P Manageability: Bitmap field 0x5
          Attribute Type: P2P Manageability (10)
          Attribute Length: 1
          Manageability Bitmap field: 0x05
          .... ...1 = P2P Device Management: 0x1
          .... ..0. = Cross Connection Permitted: 0x0
          .... .1.. = Coexistence Optional: 0x1

  The client then sends a Probe Request, also with a P2P IE in it:
  Tag: Vendor Specific: Wi-FiAll: P2P
      Tag Number: Vendor Specific (221)
      Tag length: 17
      OUI: 50-6f-9a (Wi-FiAll)
      Vendor Specific OUI Type: 9
      P2P Capability: Device 0x25  Group 0x0
          Attribute Type: P2P Capability (2)
          Attribute Length: 2
          Device Capability Bitmap: 0x25
          .... ...1 = Service Discovery: 0x1
          .... ..0. = P2P Client Discoverability: 0x0
          .... .1.. = Concurrent Operation: 0x1
          .... 0... = P2P Infrastructure Managed: 0x0
          ...0 .... = P2P Device Limit: 0x0
          ..1. .... = P2P Invitation Procedure: 0x1
          Group Capability Bitmap: 0x00
          .... ...0 = P2P Group Owner: 0x0
          .... ..0. = Persistent P2P Group: 0x0
          .... .0.. = P2P Group Limit: 0x0
          .... 0... = Intra-BSS Distribution: 0x0
          ...0 .... = Cross Connection: 0x0
          ..0. .... = Persistent Reconnect: 0x0
          .0.. .... = Group Formation: 0x0
      Listen Channel: Operating Class 81  Channel Number 1
          Attribute Type: Listen Channel (6)
          Attribute Length: 5
          Country String: XX\004
          Operating Class: 81
          Channel Number: 1

  The AP never replies to that Probe Request and blacklists the device
  for a given period of time from all communication.

  I was able to test a custom kernel with all P2P interfaces commented
  out from iwlwifi/mvm/mac80211.c - it was able to connect to the AP
  without any issues.

  For instance this issue does not affect bcm43224 device running with
  brcm80211 - in this case the client device sends a Probe Request
  without the P2P IE. Despite it's is actually P2P-capable the AP does
  not recognize it as such and allows it to connect.

  I have also started a mailing list thread about it [3].

  What I think could fix it is either:
  * making it behave more like the broadcom driver so it allows users to connect
  * provide an user-friendly option of disabling p2p capabilites (including 
transmitting probe reuqests without P2P IE)
  * as suggested on the ML [4] implement sections 3.4.3/3.4.4 of the WiFi 
Direct spec in the driver

  According to my knowledge it affects all currently supported releases:
  Trusty, Xenial, Zesty plus Artful.

  [1] 
https://supportforums.cisco.com/t5/security-and-network-management/wi-fi-direct-client-policy/td-p/2253033
  [2] 
https://www.cisco.com/c/en/us/td/docs/wireless/controller/7-4/configuration/guides/consolidated/b_cg74_CONSOLIDATED/b_cg74_CONSOLIDATED_chapter_010111110.html
  [3] https://marc.info/?l=linux-wireless&m=150306048824814&w=2
  [4] https://marc.info/?l=linux-wireless&m=150461784431430&w=2

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1718688/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to