hostap/hostapd/wpa_supplicant - new stable release v0.3.9
Jouni Malinen
jkmaline
Fri Jun 10 20:35:58 PDT 2005
New versions of the Host AP driver, hostapd, and wpa_supplicant were
just released and are now available from http://hostap.epitest.fi/
This release is a bug fix version from the stable (0.3.x) branch and
it replaces 0.3.7/0.3.8 as the recommended stable version. Main
development continues in the development branch (0.4.x).
hostap-driver:
* fixed background scans (iwlist wlan0 scan) not to break data
connection when in host_roaming 2 mode (e.g., when using
wpa_supplicant)
* fixed beacon frame when moving from monitor mode to master mode
(workaround for firmware bug that left IBSS IE in the Beacon frames)
hostapd:
* fixed a bug which caused some RSN pre-authentication cases to use
freed memory and potentially crash hostapd
* fixed private key loading for cases where passphrase is not set
* fixed WPA2 to add PMKSA cache entry when using integrated EAP
authenticator
* driver_madwifi: fixed pairwise key removal to allow WPA reauth
without disassociation
* fixed RADIUS attribute Class processing to only use Access-Accept
packets to update Class; previously, other RADIUS authentication
packets could have cleared Class attribute
* fixed PMKSA caching (EAP authentication was not skipped correctly
with the new state machine changes from IEEE 802.1X draft)
wpa_supplicant:
* modified the EAP workaround that accepts EAP-Success with incorrect
Identifier to be even less strict about verification in order to
interoperate with some authentication servers
* fixed RSN IE in 4-Way Handshake message 2/4 for the case where
Authenticator rejects PMKSA caching attempt and the driver is not
using assoc_info events
* fixed a possible double free in EAP-TTLS fast-reauthentication when
identity or password is entered through control interface
* added -P<pid file> argument for wpa_supplicant to write the current
process id into a file
* driver_madwifi: fixed association in plaintext mode
* driver_madwifi: added preliminary support for compiling against 'BSD'
branch of madwifi CVS tree
* added EAP workaround for PEAPv1 session resumption: allow outer,
i.e., not tunneled, EAP-Success to terminate session since; this can
be disabled with eap_workaround=0
* driver_ipw: updated driver structures to match with ipw2200-1.0.4
(note: ipw2100-1.1.0 is likely to require an update to work with
this)
* driver_broadcom: fixed couple of memory leaks in scan result
processing
--
Jouni Malinen PGP id EFC895FA
More information about the Hostap
mailing list