Experimental WPA code (Authenticator and Supplicant) available for testing

Jouni Malinen jkmaline
Mon Feb 23 22:26:22 PST 2004


The current CVS snapshot of the development branch has new,
experimental, code for WPA Authenticator (in hostapd) and integrated
IEEE 802.1X Supplicant (in wpa_supplicant). Example configuration files
give some brief instructions/examples on how to configure these. In
addition, wpa_supplicant/README has some more information about the
integrated IEEE 802.1X Supplicant. I try to allocate some time for
writing more detailed instructions once the implementation stabilizes.

The current implementation is still quite experimental, although mostly
functional. Some parts have not yet been implemented and the
implementation should not be considered to be secure at this point,
e.g., due to missing Michael MIC countermeasures (hostapd) and server
certificate verification (wpa_supplicant). Anyway, brave people are
welcome to test the current snapshot.

Currently, the integrated IEEE 802.1X Supplicant in wpa_supplicant
supports only EAP-TLS. I'm planning on adding EAP-PEAP/MSCHAPv2 support.
Other EAP methods may be added in the future if there is need for them.
In any case, each new method can be easily disabled at compile time to
reduce the binary size. Xsupplicant can still be used with
wpa_supplicant (this requires new command line options, -e, for
wpa_supplicant), but it is not required for EAP-TLS, anymore.

-- 
Jouni Malinen                                            PGP id EFC895FA




More information about the Hostap mailing list