查看: 841|回复: 0


发表于 2017-11-18 10:41:35 | 显示全部楼层 |阅读模式


您需要 登录 才可以下载或查看,没有帐号?立即注册

Access Control List (ACL) is a mechanism in AP mode operation to restrict association of clients based on their MAC addresses. User can add MAC addresses to the ACL and also configure policyto be used for allowing client association based on this list. The policy can be either to allow or deny association of clients with MAC address matching one of the addresses in the ACL.。
上面的意思就是ACL是AP模式里面控制client 连接的一种方式,这种方式是基于client的MAC地址。需要注意的是此书的ACL的实现是在收到client的认证请求帧时进行处理的。
在代码ieee80211_vap_setup()中的最后有函数:    ieee80211_scs_vattach(vap);由此可以知道此处的ACL是建立在VAP的基础之上的,在文件ieee80211_acl.c中有如下的定义:
* IEEE 802.11 MAC ACL support.
* When this module is loaded the sender address of each received
* frame is passed to the iac_check method and the module indicates
* if the frame should be accepted or rejected.  If the policy is
* set to ACL_POLICY_OPEN then all frames are accepted w/o checking
* the address.  Otherwise, the address is looked up in the database
* and if found the frame is either accepted (ACL_POLICY_ALLOW)
* or rejected (ACL_POLICY_DENT).
    ACL_POLICY_OPEN             = 0,/* open, don't check ACL's */
    ACL_POLICY_ALLOW        = 1,/* allow traffic from MAC */
    ACL_POLICY_DENY             = 2,/* deny traffic from MAC */
当client发送认证请求帧的时候,认证请求帧属于管理帧#define IEEE80211_FC0_TYPE_MGT          0x00。在管理帧的处理函数ieee80211_recv_mgmt()中如果收到的数据包的subtype为:
#define IEEE80211_FC0_SUBTYPE_AUTH          0xb0 此是表示收到的管理帧为认证请求帧。接着向下查看源码可以到达函数ieee80211_mlme_recv_auth()中,在向下mlme_recv_auth_ap()函数中有如下代码:
         * Consult the ACL policy module if setup.
        if (!ieee80211_acl_check(vap, wh->i_addr2))//当找到特定的MAC地址之后,返回refused.
            IEEE80211_DPRINTF(vap, IEEE80211_MSG_ACL,
                              "[%s] auth: disallowed by ACL \n",ether_sprintf(wh->i_addr2));
            response_status = IEEE80211_STATUS_REFUSED;
            indication_status = IEEE80211_STATUS_REFUSED;
* This function is always called from tasklet context and it may be noted
* that the same tasklet is not scheduled on more than one CPU at the same
* time. The user context functions that modify the ACL use spin_lock_dpc
* which disable softIrq on the current CPU. However, a softIrq scheduled
* on another CPU could execute the rx tasklet. Hence, protection is needed
* here. spinlock is sufficient as it disables kernel preemption and if the
* user task is accessing this list, the rx tasklet will wait until the user
* task releases the spinlock. The original code didn't use any protection.
ieee80211_acl_check(wlan_if_t vap, const u_int8_t mac[IEEE80211_ADDR_LEN])
    ieee80211_acl_t acl = vap->iv_acl;
    if (acl == NULL) return 1;
    /* EV : 89216
     * WPS2.0 : Ignore MAC Address Filtering if WPS Enabled
     * Display the message.
     * return 1 to report success
        printk("\n WPS Enabled : Ignoring MAC Filtering\n");
        return 1;
    switch (acl->acl_policy) {
        struct ieee80211_acl_entry *entry;
        case ACL_POLICY_OPEN:
            return 1;
        case ACL_POLICY_ALLOW:
            entry = _find_acl(acl, mac);
            return entry != NULL;
        case ACL_POLICY_DENY:
            entry = _find_acl(acl, mac);
            return entry == NULL;
    return 0; /* should not happen */
int ieee80211_acl_attach(wlan_if_t vap);
int ieee80211_acl_detach(wlan_if_t vap);
int ieee80211_acl_add(wlan_if_t vap, const u_int8_t mac[IEEE80211_ADDR_LEN]);
int ieee80211_acl_remove(wlan_if_t vap, const u_int8_t mac[IEEE80211_ADDR_LEN]);
int ieee80211_acl_get(wlan_if_t vap, u_int8_t *macList, int len, int *num_mac);
int ieee80211_acl_check(wlan_if_t vap, const u_int8_t mac[IEEE80211_ADDR_LEN]);
int ieee80211_acl_flush(wlan_if_t vap);
int ieee80211_acl_setpolicy(wlan_if_t vap, int);
int ieee80211_acl_getpolicy(wlan_if_t vap);



使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册


Archiver|手机版|小黑屋|CaryStudio ( 粤ICP备16022806号 )

GMT+8, 2021-9-17 07:47 , Processed in 0.057655 second(s), 12 queries .

Powered by Discuz! X3.4

© 2001-2017 Comsenz Inc.

快速回复 返回顶部 返回列表