hostapd/wpa_supplicant - new development release v0.6.6
Jouni Malinen
j
Sun Nov 23 07:25:49 PST 2008
New versions of wpa_supplicant and hostapd were just
released and are now available from http://w1.fi/
This release is from the development branch (0.6.x). Please note that
the 0.5.x branch continues to be the current source of stable releases.
hostapd:
* added a new configuration option, wpa_ptk_rekey, that can be used to
enforce frequent PTK rekeying, e.g., to mitigate some attacks against
TKIP deficiencies
* updated OpenSSL code for EAP-FAST to use an updated version of the
session ticket overriding API that was included into the upstream
OpenSSL 0.9.9 tree on 2008-11-15 (no additional OpenSSL patch is
needed with that version anymore)
* changed channel flags configuration to read the information from
the driver (e.g., via driver_nl80211 when using mac80211) instead of
using hostapd as the source of the regulatory information (i.e.,
information from CRDA is now used with mac80211); this allows 5 GHz
channels to be used with hostapd (if allowed in the current
regulatory domain)
* fixed EAP-TLS message processing for the last TLS message if it is
large enough to require fragmentation (e.g., if a large Session
Ticket data is included)
* fixed listen interval configuration for nl80211 drivers
wpa_supplicant:
* added Milenage SIM/USIM emulator for EAP-SIM/EAP-AKA
(can be used to simulate test SIM/USIM card with a known private key;
enable with CONFIG_SIM_SIMULATOR=y/CONFIG_USIM_SIMULATOR=y in .config
and password="Ki:OPc"/password="Ki:OPc:SQN" in network configuration)
* added a new network configuration option, wpa_ptk_rekey, that can be
used to enforce frequent PTK rekeying, e.g., to mitigate some attacks
against TKIP deficiencies
* added an optional mitigation mechanism for certain attacks against
TKIP by delaying Michael MIC error reports by a random amount of time
between 0 and 60 seconds; this can be enabled with a build option
CONFIG_DELAYED_MIC_ERROR_REPORT=y in .config
* fixed EAP-AKA to use RES Length field in AT_RES as length in bits,
not bytes
* updated OpenSSL code for EAP-FAST to use an updated version of the
session ticket overriding API that was included into the upstream
OpenSSL 0.9.9 tree on 2008-11-15 (no additional OpenSSL patch is
needed with that version anymore)
* updated userspace MLME instructions to match with the current Linux
mac80211 implementation; please also note that this can only be used
with driver_nl80211.c (the old code from driver_wext.c was removed)
* added support (Linux only) for RoboSwitch chipsets (often found in
consumer grade routers); driver interface 'roboswitch'
* fixed canceling of PMKSA caching when using drivers that generate
RSN IE and refuse to drop PMKIDs that wpa_supplicant does not know
about
git-shortlog for 0.6.5 -> 0.6.6:
Carolin Latze (1):
Separate OpenSSL engine configuration for Phase 2
Jouke Witteveen (2):
Add RoboSwitch driver interface for wpa_supplicant
Fixed a bug in read -> _read cleanup; one missed change
Jouni Malinen (46):
Added Milenage USIM emulator for EAP-AKA (can be used to simulate test
driver_ndis: Added a workaround for a driver that removes SSID IE in scan
Added Milenage-GSM simulator for EAP-SIM
Added support for enforcing frequent PTK rekeying
EAP-FAST: Include Tunnel PAC request only after EAP authentication
EAP-FAST server: allow expired PAC for PAC refresh
Fixed EAP-AKA RES Length field in AT_RES as length in bits, not bytes
EAP-AKA: Validate RES Length field in AT_RES
EAP-SIM/AKA: fixed initialization to verify PIN even if identity is set
Added an optional mitigation mechanism for certain attacks against TKIP by
Updated indentation in the patch to match style used elsewhere in OpenSSL
Modified the OpenSSL patch to use session ticket -specific function
EAP-FAST: Reorder TLVs in PAC Acknowledgment to fix interop issues
Updated interop results for ACS 4.2
OpenSSL 0.9.9 API change for EAP-FAST session ticket overriding API
Changed channel flags configuration to read the information from the driver
driver_nl80211: Remove monitor interface if AP initialization fails
Improved the error message for passive scan not being available
Remove extra typedefs since they do not seem to be needed anymore
Updated userspace MLME instructions for current mac80211
roboswitch: Minor coding style cleanup
EAP-PEAP: Copy Binding nonce from cryptobinding request to reply
Fixed size_t printf format for 64-bit builds
Changed PEAPv0 cryptobinding to be disabled by default
Fixed EAPA-AKA warning message about AT_RES length to use bits
Fixed Milenage debug output to use correct length for IK and CK
Fixed EAP-TLS message fragmentation for the last TLS message
wpa_gui: Add a PNG version of the tray icon for Windows binary build
Silence printf() calls in wpa_gui to avoid stdout output from a GUI program
Remove the unwanted Windows console from the Windows binary version of wpa_gui
Fixed canceling of PMKSA caching with driver generated RSN IE
Fixed hostapd build without l2_packet (e.g., RADIUS server only).
Added an attribution based on the original SSLeay license for OpenSSL.
reconfig.c file was not used at all, so remove it.
Removed now unused reconfig variables.
Removed partial IEEE 802.11h implementation
Removed forgotten register_drivers() prototype
Remove overly complex hostapd setup sequence with n+1 callbacks
Remove experimental non-AP STA code from hostapd
Add more verbose debug output for GSM-Milenage use (RAND,SRES,Kc)
Fixed listen interval configuration for nl80211 drivers
Allocate new Acct-Session-Id on EAPOL-Logoff
Use SM_ENTER_GLOBAL to clean up EAPOL state machine debug messages
Simplified RADIUS accounting id usage
Preparations for 0.6.6 release
Preparations for 0.6.6 release
Kel Modderman (1):
wpa_gui-qt4: tweak icon Makefile
Martin Michlmayr (1):
wpa_gui-qt4: FTBFS with GCC 4.4: missing #include
--
Jouni Malinen PGP id EFC895FA
More information about the Hostap
mailing list