hostap/hostapd/wpa_supplicant - new stable release v0.4.7
Jouni Malinen
jkmaline
Sun Nov 20 18:30:01 PST 2005
New versions of Host AP driver, wpa_supplicant, and hostapd were just
released and are now available from http://hostap.epitest.fi/
This release moves 0.4.x branch from development to stable status. In
other words, from now on, 0.4.x versions are the latest available
stable releases. 0.3.x branch continues to be supported, but it is
moving more towards only including critical fixes. 0.2.x branch is
about to reach its end of life. I'm planning on releasing one more
0.2.x version with whatever changes have accumulated in the branch and
after that, no more changes are made to 0.2.x branch. In other words,
I would recommend starting to move to either 0.4.x or 0.3.x versions
if you are still using 0.2.x.
I will move 0.4.x development into its own branch (hostap_0_4_branch)
and CVS trunk will become new development branch with eventual 0.5.x
releases. This means that CVS trunk is again open for larger changes.
Please also note that hostap-driver is now developed in Linux 2.6 tree
and I do not plan on making external 0.5.x releases of the driver from
my CVS repository. In other words, 0.5.x releases are mainly expected
for hostapd and wpa_supplicant.
hostapd:
* driver_wired: fixed EAPOL sending to optionally use PAE group address
as the destination instead of supplicant MAC address; this is
disabled by default, but should be enabled with use_pae_group_addr=1
in configuration file if the wired interface is used by only one
device at the time (common switch configuration)
* driver_madwifi: configure driver to use TKIP countermeasures in order
to get correct behavior (IEEE 802.11 association failing; previously,
association succeeded, but hostpad forced disassociation immediately)
* driver_madwifi: added support for madwifi-ng
wpa_supplicant:
* l2_packet_pcap: fixed wired IEEE 802.1X authentication with libpcap
and WinPcap to receive frames sent to PAE group address
* disable EAP state machine when IEEE 802.1X authentication is not used
in order to get rid of bogus "EAP failed" messages
* fixed OpenSSL error reporting to go through all pending errors to
avoid confusing reports of old errors being reported at later point
during handshake
* fixed configuration file updating to not write empty variables
(e.g., proto or key_mgmt) that the file parser would not accept
* fixed ADD_NETWORK ctrl_iface command to use the same default values
for variables as empty network definitions read from config file
would get
* fixed EAP state machine to not discard EAP-Failure messages in many
cases (e.g., during TLS handshake)
* fixed a infinite loop in private key reading if the configured file
cannot be parsed successfully
* driver_madwifi: added support for madwifi-ng
* wpa_gui: do not display password/PSK field contents
* wpa_gui: added CA certificate configuration
* driver_ndis: fixed scan request in ap_scan=2 mode not to change SSID
* driver_ndis: include Beacon IEs in AssocInfo in order to notice if
the new AP is using different WPA/RSN IE
* use longer timeout for IEEE 802.11 association to avoid problems with
drivers that may take more than five second to associate
No changes in hostap-driver or hostap-utils, so previous versions were
released as-is to start the stable branch with shared version number
for all components.
--
Jouni Malinen PGP id EFC895FA
More information about the Hostap
mailing list