Release candidate for the next stable release (0.3.9-rc1)
Jouni Malinen
jkmaline
Wed May 18 20:56:52 PDT 2005
Finally, I managed to go through the fixes in the development branch
and merge the ones that apply to 0.3.x into the stable branch. I was
hoping to get v0.3.9 released earlier, but didn't have suitable time
for this before. Anyway, a release candidate for the next stable
release is now available at http://hostap.epitest.fi/releases/testing/.
I would hope to release this after about a week or so of testing. In
addition to the testing I can do, it would be useful if you would be
able to test whether this version has introduced any regression and
report any problems to the Host AP mailing list.
Here's a list of changes from the previous stable release:
hostap-driver:
* fixed background scans (iwlist wlan0 scan) not to break data
connection when in host_roaming 2 mode (e.g., when using
wpa_supplicant)
* fixed beacon frame when moving from monitor mode to master mode
(workaround for firmware bug that left IBSS IE in the Beacon frames)
wpa_supplicant:
* modified the EAP workaround that accepts EAP-Success with incorrect
Identifier to be even less strict about verification in order to
interoperate with some authentication servers
* fixed RSN IE in 4-Way Handshake message 2/4 for the case where
Authenticator rejects PMKSA caching attempt and the driver is not
using assoc_info events
* fixed a possible double free in EAP-TTLS fast-reauthentication when
identity or password is entered through control interface
* added -P<pid file> argument for wpa_supplicant to write the current
process id into a file
* driver_madwifi: fixed association in plaintext mode
* driver_madwifi: added preliminary support for compiling against 'BSD'
branch of madwifi CVS tree
hostapd:
* fixed a bug which caused some RSN pre-authentication cases to use
freed memory and potentially crash hostapd
* fixed private key loading for cases where passphrase is not set
* fixed WPA2 to add PMKSA cache entry when using integrated EAP
authenticator
* driver_madwifi: fixed pairwise key removal to allow WPA reauth
without disassociation
* fixed RADIUS attribute Class processing to only use Access-Accept
packets to update Class; previously, other RADIUS authentication
packets could have cleared Class attribute
* fixed PMKSA caching (EAP authentication was not skipped correctly
with the new state machine changes from IEEE 802.1X draft)
--
Jouni Malinen PGP id EFC895FA
More information about the Hostap
mailing list