hostapd/wpa_supplicant - stable release v0.4.10

Jouni Malinen j
Mon Feb 19 09:00:18 PST 2007


New versions of wpa_supplicant and hostapd were just released and are
now available from http://w1.fi/

This release is a bug fix version from the old stable (0.4.x) branch
and it replaces 0.4.9 as the recommended stable version if you have
not yet updated to the current stable branch (0.5.x).

If you are already using 0.5.7, you have all the fixes included in
this 0.4.10 release. If you are still using 0.3.x versions, I would
recommend upgrading to either 0.5.7 or this 0.4.10 release. There will
likely be one more 0.3.x bug fix release, but the 0.3.x branch is
getting close to reaching its end.


hostapd:
* added -P<pid file> argument for wpa_supplicant to write the current
  process id into a file
* fixed hostapd to add PMKID KDE into 4-Way Handshake Message 1 when
  using WPA2 even if PMKSA caching is not used
* driver_madwifi: fixed configuration of unencrypted modes (plaintext
  and IEEE 802.1X without WEP)
* fixed session timeout processing with drivers that do not use
  ieee802_11.c (e.g., madwifi)
* fixed EAP-PSK bit ordering of the Flags field
* fixed configuration reloading (SIGHUP) to re-initialize WPA PSKs
  by reading wpa_psk_file [Bug 181]
* fixed EAP-TTLS AVP parser processing for too short AVP lengths
* fixed IPv6 connection to RADIUS accounting server

wpa_supplicant:
* driver_madwifi: fixed TKIP and CCMP sequence number configuration on
  big endian hosts [Bug 146]
* Windows: added a workaround for UDP-based control interface to
  prevent packets with forged addresses from being accepted as local
  control requests
* fixed EAP-SIM/AKA key derivation for re-authentication case (only
  affects IEEE 802.1X with dynamic WEP keys)
* fixed WPA PSK update through ctrl_iface for the case where the old
  PSK was derived from an ASCII passphrase and the new PSK is set as
  a raw PSK (hex string)
* fixed configuration parser not to remove CCMP from group cipher list
  if WPA-None (adhoc) is used (pairwise=NONE in that case)
* driver_ndis: fixed static WEP configuration to avoid race condition
  issues with some NDIS drivers between association and setting WEP
  keys
* driver_ndis: added validation for IELength value in scan results to
  avoid crashes when using buggy NDIS drivers [Bug 165]
* fixed selection of the first network in ap_scan=2 mode; previously,
  wpa_supplicant could get stuck in SCANNING state when only the first
  network for enabled (e.g., after 'wpa_cli select_network 0')
* driver_ndis: added support for selecting AP based on BSSID
* fixed USIM PIN status determination for the case that PIN is not
  needed (this allows EAP-AKA to be used with USIM cards that do not
  use PIN)
* added support for reading 3G USIM AID from EF_DIR to allow EAP-AKA to
  be used with cards that do not support file selection based on
  partial AID
* fixed EAP-PSK bit ordering of the Flags field
* fixed EAP-PEAP/TTLS/FAST to use the correct EAP identifier in
  tunnelled identity request (previously, the identifier from the outer
  method was used, not the tunnelled identifier which could be
  different)
* fixed EAP-TTLS AVP parser processing for too short AVP lengths
* updated Windows binary build to link against OpenSSL 0.9.8d and
  added support for EAP-FAST
* added a workaround for a case where the AP is using unknown address
  (e.g., MAC address of the wired interface) as the source address for
  EAPOL-Key frames; previously, that source address was used as the
  destination for EAPOL-Key frames and in key derivation; now, BSSID is
  used even if the source address does not match with it
  (this resolves an interoperability issue with Thomson SpeedTouch 580)

-- 
Jouni Malinen                                            PGP id EFC895FA




More information about the Hostap mailing list