hostap/hostapd/wpa_supplicant - new stable release v0.3.7

Jouni Malinen jkmaline
Sat Feb 12 09:04:02 PST 2005


New versions of the Host AP driver, hostapd, and wpa_supplicant were
just released and are now available from http://hostap.epitest.fi/

This release is the first v0.3.x stable release and beginning of a new
stable branch. This 0.3.x branch replaces 0.2.x as the current stable
branch. Development continues in CVS trunk.

Most of the new features in 0.3.x (when compared to 0.2.x) are in
wpa_supplicant and hostapd. Host AP driver and hostap-utils got only
minor changes and most of the bug fixes were already merged into 0.2.x
versions.

wpa_supplicant:
- new operation system support: FreeBSD and Windows
- new driver interface: driver_broadcom
- new EAP methods: EAP-PSK, EAP-AKA, EAP-FAST
- DH/DSA parasmeters configuration and ephemeral DH key exchange (TLS)
  (dh_file)
- matching subject of the authentication server certificate
  (subject_match)
- private key as PKCS#12 (PFX) file
- new EAP workaround for EAP-PEAP interoperability with CiscoACS
  (includes_tls_length=1 in phase1 variable)
- support for larger scan results report
- improved driver interface API
- multiple interfaces (radios) can be controlled with one wpa_supplicant
  process
- new operation mode (ap_scan=2) to allow drivers to take care of
  association and roaming (e.g., for ndiswrapper and NDIS drivers)
- control interface (e.g., for wpa_cli) can be removed at build time;
  add CONFIG_CTRL_IFACE=y to .config to include it in order to match
  0.2.x behavior

hostapd:
- RADIUS accounting improvements
- RADIUS authentication and accounting client MIB (RFC2618, RFC2620)
- added support for FreeBSD
- support for multiple drivers: madwifi, Prism54, wired, bsd
- support multiple WPA pre-shared keys
- updated from IEEE 802.1X-2001 to IEEE 802.1X-REV (not d11)
- updated minimal IAPP support from draft 3 to IEEE 802.11F-2003
- control interface and example CLI, hostapd_cli
- dual-licensed under GPLv2 and BSD licenses
- added integrated EAP authenticator that can be used as a replacement
  for an external RADIUS authentication server; in addition, this can
  be used as a RADIUS authentication server for other devices;
  supported EAP methods: EAP-MD5, EAP-TLS, EAP-MSCHAPv2, EAP-GTC,
  EAP-PEAP, EAP-TTLS, EAP-SIM
- new configuration variables: driver, eap_reauth_period,
  wpa_strict_rekey, eap_authenticator, eap_user_file, ca_cert,
  server_cert, private_key, private_key_passwd


See ChangeLogs for 0.3.x development versions for more details.


-- 
Jouni Malinen                                            PGP id EFC895FA




More information about the Hostap mailing list