hostap/hostapd/wpa_supplicant - new stable release v0.4.7

Jouni Malinen jkmaline
Sun Nov 20 18:30:01 PST 2005


New versions of Host AP driver, wpa_supplicant, and hostapd were just
released and are now available from http://hostap.epitest.fi/

This release moves 0.4.x branch from development to stable status. In
other words, from now on, 0.4.x versions are the latest available
stable releases. 0.3.x branch continues to be supported, but it is
moving more towards only including critical fixes. 0.2.x branch is
about to reach its end of life. I'm planning on releasing one more
0.2.x version with whatever changes have accumulated in the branch and
after that, no more changes are made to 0.2.x branch. In other words,
I would recommend starting to move to either 0.4.x or 0.3.x versions
if you are still using 0.2.x.

I will move 0.4.x development into its own branch (hostap_0_4_branch)
and CVS trunk will become new development branch with eventual 0.5.x
releases. This means that CVS trunk is again open for larger changes.
Please also note that hostap-driver is now developed in Linux 2.6 tree
and I do not plan on making external 0.5.x releases of the driver from
my CVS repository. In other words, 0.5.x releases are mainly expected
for hostapd and wpa_supplicant.


hostapd:
* driver_wired: fixed EAPOL sending to optionally use PAE group address
  as the destination instead of supplicant MAC address; this is
  disabled by default, but should be enabled with use_pae_group_addr=1
  in configuration file if the wired interface is used by only one
  device at the time (common switch configuration)
* driver_madwifi: configure driver to use TKIP countermeasures in order
  to get correct behavior (IEEE 802.11 association failing; previously,
  association succeeded, but hostpad forced disassociation immediately)
* driver_madwifi: added support for madwifi-ng

wpa_supplicant:
* l2_packet_pcap: fixed wired IEEE 802.1X authentication with libpcap
  and WinPcap to receive frames sent to PAE group address
* disable EAP state machine when IEEE 802.1X authentication is not used
  in order to get rid of bogus "EAP failed" messages
* fixed OpenSSL error reporting to go through all pending errors to
  avoid confusing reports of old errors being reported at later point
  during handshake
* fixed configuration file updating to not write empty variables
  (e.g., proto or key_mgmt) that the file parser would not accept
* fixed ADD_NETWORK ctrl_iface command to use the same default values
  for variables as empty network definitions read from config file
  would get
* fixed EAP state machine to not discard EAP-Failure messages in many
  cases (e.g., during TLS handshake)
* fixed a infinite loop in private key reading if the configured file
  cannot be parsed successfully
* driver_madwifi: added support for madwifi-ng
* wpa_gui: do not display password/PSK field contents
* wpa_gui: added CA certificate configuration
* driver_ndis: fixed scan request in ap_scan=2 mode not to change SSID
* driver_ndis: include Beacon IEs in AssocInfo in order to notice if
  the new AP is using different WPA/RSN IE
* use longer timeout for IEEE 802.11 association to avoid problems with
  drivers that may take more than five second to associate


No changes in hostap-driver or hostap-utils, so previous versions were
released as-is to start the stable branch with shared version number
for all components.


-- 
Jouni Malinen                                            PGP id EFC895FA




More information about the Hostap mailing list