Host AP/hostapd/wpa_supplicant - new stable release v0.2.6
Jouni Malinen
jkmaline
Sat Dec 25 11:18:18 PST 2004
New versions of Prism2/2.5/3 Host AP driver, hostapd, and
wpa_supplicant were just released and are now available from
http://hostap.epitest.fi/
This release is a bug fix version from the stable (0.2.x) branch and
replaces 0.2.5 as the recommended stable version. However, people using
Linux 2.2.x versions or older 2.4.x/2.6.x versions may have to use the
old stable series (0.1.x) since the 0.2.x versions do not support some
of the older kernel versions. Main development continues in the
development branch (0.3.x).
hostap-driver:
* added support for changed PCI API in Linux 2.6.10-rc1 and newer:
pci_{save,restore}_state() lost one argument, pci_register_driver()
changed
hostapd:
* fixed RADIUS accounting to generate a new session id for cases where
a station reassociates without first being complete deauthenticated
* fixed STA disassociation handler to mark next timeout state to
deauthenticate the station, i.e., skip long wait for inactivity poll
and extra disassociation, if the STA disassociates without
deauthenticating
* removed 'daemonize' configuration file option since it has not really
been used at all for more than year
wpa_supplicant:
* added driver interface for Intel ipw2100 driver
* fixed a bug in PMKSA cache processing: skip sending of EAPOL-Start
only if there is a PMKSA cache entry for the current AP
* fixed error handling for case where reading of scan results fails:
must schedule a new scan or wpa_supplicant will remain waiting
forever
* set pairwise/group cipher suite for non-WPA IEEE 802.1X to WEP-104
if keys are not configured to be used; this fixes IEEE 802.1X mode
with drivers that use this information to configure whether Privacy
bit can be in Beacon frames (e.g., ndiswrapper)
* improved downgrade attack detection in IE verification of msg 3/4:
verify both WPA and RSN IEs, if present, not only the selected one;
reject the AP if an RSN IE is found in msg 3/4, but not in Beacon or
Probe Response frame, and RSN is enabled in wpa_supplicant
configuration
* fixed WPA msg 3/4 processing to allow Key Data field contain other
IEs than just one WPA IE
* modified association event handler to set portEnabled = FALSE before
clearing port Valid in order to reset EAP state machine and avoid
problems with new authentication getting ignored because of state
machines ending up in AUTHENTICATED/SUCCESS state based on old
information
hostap-utils:
* split_combined_hex: updated to use head/tail -n argument
(tail +N did not work anymore)
--
Jouni Malinen PGP id EFC895FA
More information about the Hostap
mailing list