• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

WLAN configurator does not warn about hostapd failure

webGUI
2
3
1.7k
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • S
    Samsonov
    last edited by Feb 26, 2012, 8:54 AM Feb 26, 2012, 8:26 AM

    webGUI for wireless interface configuration is dangerously ignorant on syntax errors in particular and hostapd's failures in general.

    For example, while recently moving from PSK to EAP, I had to fill-in the 802.1X Authentication Server IP Address field. As I prefer to use DNS names as much as possible instead of literal numeric addresses, I just typed in “localhost”, — when a numeric IP address is absolutely required, webGUI always warns about it after you press the Save button. But not this time.

    As a result, hostapd disliked the configuration and refused to start. And webGUI didn't warn about that, too! The network became completely unprotected — anyone could connect without any authenticaion and gain access to LAN, WAN or whatever allowed by firewall. And it was not before some hours of digging why even mixed PSK/EAP mode won't work anymore, that I launched hostapd from CLI and saw it was complaining about syntax error in auth_server_addr directive.

    IMHO, this is an unacceptable behavior. pfSense should:

    • apply strict value checking for all parameters of all integrated components — not just the majority of them, which puts the user into false sense of protection against any syntax error;
    • warn if hostapd refused the new configuration, and provide verbose information on that;
    • have an option to monitor hostapd state and shut the WLAN interface down if that process somehow stopped.

    Because with wireless networking there is no such thing as “too much security”!

    1 Reply Last reply Reply Quote 0
    • C
      cmb
      last edited by Feb 26, 2012, 9:42 AM

      make a list of exactly which parts are missing input validation and open a bug ticket at redmine.pfsense.org.

      1 Reply Last reply Reply Quote 0
      • S
        Samsonov
        last edited by Feb 26, 2012, 12:08 PM

        @cmb:

        Make a list of exactly which parts are missing input validation and open a bug ticket.

        This would require studying of sources of both pfSense/webGUI and hostapd. ;D

        But my point is not just about syntax checking, rather than about a major security flaw. What if hostapd crashes while running because of a bug or another issue? What if such issue can be deliberately exploited by an unauthenticated wireless user to crash hostapd? The network would be left widely open to anyone, and you won't know of it until some friendly person receives a warning about connecting to unprotected WLAN and informs you.

        1 Reply Last reply Reply Quote 0
        1 out of 3
        • First post
          1/3
          Last post
        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.