#1818: Fragmentation bug in adhoc/ahdemo mode when using WEP encryption
-----------------------------------------+----------------------------------
      Reporter:  [EMAIL PROTECTED]  |       Owner:                         
          Type:  defect                  |      Status:  new                    
      Priority:  major                   |   Milestone:                         
     Component:  madwifi: driver         |     Version:  v0.9.3.3               
    Resolution:                          |    Keywords:  fragmentation adhoc WEP
Patch_attached:  0                       |  
-----------------------------------------+----------------------------------
Changes (by mrenzmann):

  * priority:  critical => major

Old description:

> Very simple scenario and very easy to reproduce the bug:
>  2 PCs with madwifi ( I tried 0.9.3.2 & 0.9.3.3 ) are in adhoc mode and
> using
>  WEP encryption (keylength doesn't matter). One of the PC is pinging the
> other one,
>  with a defined packetsize S (ping -s packetsize IPaddr).
> If I put the Fragmentation Threshold to 300 Bytes (for example), I will
> not get
> a ping reply for the following packetsizes:
>  S = 509, 510, 511, 512 & S = 781, 782, 783, 784 & every S = S + 272, ...
> !
> I sniffed in the air and saw what's wrong:
>  let's take S = 508 , in the air you will see 2 WLAN-Fragments,
>  both with the length of 300Bytes and both are complete.
>
>  when S = 509, in the air you will see again 2 WLAN-Fragmets, both with
> the
>  length of 300Bytes ! So the last fragment lost the last Byte (509 - 508)
> of the
>  initial packet.
>
>  when S = 510 the last fragment is truncated by the 2 last Bytes and so
> on till
>  S = 513, when a third fragment takes the last 5 Bytes of the initial
> packet
>  and puts it on the air, so everything works again fine !
>
> The general rule for the bug can be defined like this:
>  When a packet (in the air) is 1 to 4 bytes longer then the multiple of
> the
>  fragmentation threshold, the driver does NOT generate a new necessary
> fragment
>  for this last 1 to 4 bytes ! The packet is delivered by madwifi
> truncated by this last 1 to 4 bytes !!!
>  It begins to generate a new fragment, only with at least 5 bytes length
> !
>
> I hope that somebody can solve this problem, after this detailed
> explanation ;-)
>
> CC

New description:

 Very simple scenario and very easy to reproduce the bug:

 2 PCs with MadWifi ( I tried 0.9.3.2 & 0.9.3.3 ) are in adhoc mode and
 using WEP encryption (keylength doesn't matter). One of the PC is pinging
 the other one, with a defined packetsize S ({{{ping -s ''<packetsize>''
 ''<IPaddr>'').

 If I put the fragmentation threshold to 300 bytes (for example), I will
 not get a ping reply for the following packet sizes:

 S = 509, 510, 511, 512 & S = 781, 782, 783, 784 & every S = S + 272, ... !

 I sniffed in the air and saw what's wrong:

 Let's take S = 508, in the air you will see 2 WLAN-ragments,
 both with the length of 300 bytes and both are complete.

 When S = 509, in the air you will see again 2 WLAN-fragments, both with
 the length of 300 bytes! So the last fragment lost the last byte (509 -
 508) of the initial packet.

 When S = 510 the last fragment is truncated by the 2 last bytes and so on
 till S = 513, when a third fragment takes the last 5 bytes of the initial
 packet and puts it on the air, so everything works again fine!

 The general rule for the bug can be defined like this:

 When a packet (in the air) is 1 to 4 bytes longer then the multiple of the
 fragmentation threshold, the driver does NOT generate a new necessary
 fragment for this last 1 to 4 bytes! The packet is delivered by MadWifi
 truncated by this last 1 to 4 bytes!!!

 It begins to generate a new fragment, only with at least 5 bytes length!

 I hope that somebody can solve this problem, after this detailed
 explanation ;-)

 CC

Comment:

 Please test to see if the issue still exists in trunk.

-- 
Ticket URL: <https://madwifi.org/ticket/1818#comment:1>
madwifi.org <http://madwifi.org/>
Multiband Atheros Driver for Wireless Fidelity
-------------------------------------------------------------------------
This SF.net email is sponsored by: Microsoft
Defy all challenges. Microsoft(R) Visual Studio 2008.
http://clk.atdmt.com/MRT/go/vse0120000070mrt/direct/01/
_______________________________________________
Madwifi-tickets mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/madwifi-tickets

Reply via email to