⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 changelog

📁 hostapd源代码
💻
📖 第 1 页 / 共 2 页
字号:
ChangeLog for hostapd2006-04-27 - v0.5.3	* do not build nt_password_hash and hlr_auc_gw by default to avoid	  requiring a TLS library for a successful build; these programs can be	  build with 'make nt_password_hash' and 'make hlr_auc_gw'	* added a new configuration option, eapol_version, that can be used to	  set EAPOL version to 1 (default is 2) to work around broken client	  implementations that drop EAPOL frames which use version number 2	  [Bug 89]	* added support for EAP-SAKE (no EAP method number allocated yet, so	  this is using the same experimental type 255 as EAP-PSK)	* fixed EAP-MSCHAPv2 message length validation2006-03-19 - v0.5.2	* fixed stdarg use in hostapd_logger(): if both stdout and syslog	  logging was enabled, hostapd could trigger a segmentation fault in	  vsyslog on some CPU -- C library combinations	* moved HLR/AuC gateway implementation for EAP-SIM/AKA into an external	  program to make it easier to use for implementing real SS7 gateway;	  eap_sim_db is not anymore used as a file name for GSM authentication	  triplets; instead, it is path to UNIX domain socket that will be used	  to communicate with the external gateway program (e.g., hlr_auc_gw)	* added example HLR/AuC gateway implementation, hlr_auc_gw, that uses	  local information (GSM authentication triplets from a text file and	  hardcoded AKA authentication data); this can be used to test EAP-SIM	  and EAP-AKA	* added Milenage algorithm (example 3GPP AKA algorithm) to hlr_auc_gw	  to make it possible to test EAP-AKA with real USIM cards (this is	  disabled by default; define AKA_USE_MILENAGE when building hlr_auc_gw	  to enable this)	* driver_madwifi: added support for getting station RSN IE from	  madwifi-ng svn r1453 and newer; this fixes RSN that was apparently	  broken with earlier change (r1357) in the driver	* changed EAP method registration to use a dynamic list of methods	  instead of a static list generated at build time	* fixed WPA message 3/4 not to encrypt Key Data field (WPA IE)	  [Bug 125]	* added ap_max_inactivity configuration parameter2006-01-29 - v0.5.1	* driver_test: added better support for multiple APs and STAs by using	  a directory with sockets that include MAC address for each device in	  the name (test_socket=DIR:/tmp/test)	* added support for EAP expanded type (vendor specific EAP methods)2005-12-18 - v0.5.0 (beginning of 0.5.x development releases)	* added experimental STAKey handshake implementation for IEEE 802.11e	  direct link setup (DLS); note: this is disabled by default in both	  build and runtime configuration (can be enabled with CONFIG_STAKEY=y	  and stakey=1)	* added support for EAP methods to use callbacks to external programs	  by buffering a pending request and processing it after the EAP method	  is ready to continue	* improved EAP-SIM database interface to allow external request to GSM	  HLR/AuC without blocking hostapd process	* added support for using EAP-SIM pseudonyms and fast re-authentication	* added support for EAP-AKA in the integrated EAP authenticator	* added support for matching EAP identity prefixes (e.g., "1"*) in EAP	  user database to allow EAP-SIM/AKA selection without extra roundtrip	  for EAP-Nak negotiation	* added support for storing EAP user password as NtPasswordHash instead	  of plaintext password when using MSCHAP or MSCHAPv2 for	  authentication (hash:<16-octet hex value>); added nt_password_hash	  tool for hashing password to generate NtPasswordHash2005-11-20 - v0.4.7 (beginning of 0.4.x stable releases)	* driver_wired: fixed EAPOL sending to optionally use PAE group address	  as the destination instead of supplicant MAC address; this is	  disabled by default, but should be enabled with use_pae_group_addr=1	  in configuration file if the wired interface is used by only one	  device at the time (common switch configuration)	* driver_madwifi: configure driver to use TKIP countermeasures in order	  to get correct behavior (IEEE 802.11 association failing; previously,	  association succeeded, but hostpad forced disassociation immediately)	* driver_madwifi: added support for madwifi-ng2005-10-27 - v0.4.6	* added support for replacing user identity from EAP with RADIUS	  User-Name attribute from Access-Accept message, if that is included,	  for the RADIUS accounting messages (e.g., for EAP-PEAP/TTLS to get	  tunneled identity into accounting messages when the RADIUS server	  does not support better way of doing this with Class attribute)	* driver_madwifi: fixed EAPOL packet receive for configuration where	  ath# is part of a bridge interface	* added a configuration file and log analyzer script for logwatch	* fixed EAPOL state machine step function to process all state	  transitions before processing new events; this resolves a race	  condition in which EAPOL-Start message could trigger hostapd to send	  two EAP-Response/Identity frames to the authentication server2005-09-25 - v0.4.5	* added client CA list to the TLS certificate request in order to make	  it easier for the client to select which certificate to use	* added experimental support for EAP-PSK	* added support for WE-19 (hostap, madwifi)2005-08-21 - v0.4.4	* fixed build without CONFIG_RSN_PREAUTH	* fixed FreeBSD build2005-06-26 - v0.4.3	* fixed PMKSA caching to copy User-Name and Class attributes so that	  RADIUS accounting gets correct information	* start RADIUS accounting only after successful completion of WPA	  4-Way Handshake if WPA-PSK is used	* fixed PMKSA caching for the case where STA (re)associates without	  first disassociating2005-06-12 - v0.4.2	* EAP-PAX is now registered as EAP type 46	* fixed EAP-PAX MAC calculation	* fixed EAP-PAX CK and ICK key derivation	* renamed eap_authenticator configuration variable to eap_server to	  better match with RFC 3748 (EAP) terminology	* driver_test: added support for testing hostapd with wpa_supplicant	  by using test driver interface without any kernel drivers or network	  cards2005-05-22 - v0.4.1	* fixed RADIUS server initialization when only auth or acct server	  is configured and the other one is left empty	* driver_madwifi: added support for RADIUS accounting	* driver_madwifi: added preliminary support for compiling against 'BSD'	  branch of madwifi CVS tree	* driver_madwifi: fixed pairwise key removal to allow WPA reauth	  without disassociation	* added support for reading additional certificates from PKCS#12 files	  and adding them to the certificate chain	* fixed RADIUS Class attribute processing to only use Access-Accept	  packets to update Class; previously, other RADIUS authentication	  packets could have cleared Class attribute	* added support for more than one Class attribute in RADIUS packets	* added support for verifying certificate revocation list (CRL) when	  using integrated EAP authenticator for EAP-TLS; new hostapd.conf	  options 'check_crl'; CRL must be included in the ca_cert file for now2005-04-25 - v0.4.0 (beginning of 0.4.x development releases)	* added support for including network information into	  EAP-Request/Identity message (ASCII-0 (nul) in eap_message)	  (e.g., to implement draft-adrange-eap-network-discovery-07.txt)	* fixed a bug which caused some RSN pre-authentication cases to use	  freed memory and potentially crash hostapd	* fixed private key loading for cases where passphrase is not set	* added support for sending TLS alerts and aborting authentication	  when receiving a TLS alert	* fixed WPA2 to add PMKSA cache entry when using integrated EAP	  authenticator	* fixed PMKSA caching (EAP authentication was not skipped correctly	  with the new state machine changes from IEEE 802.1X draft)	* added support for RADIUS over IPv6; own_ip_addr, auth_server_addr,	  and acct_server_addr can now be IPv6 addresses (CONFIG_IPV6=y needs	  to be added to .config to include IPv6 support); for RADIUS server,	  radius_server_ipv6=1 needs to be set in hostapd.conf and addresses	  in RADIUS clients file can then use IPv6 format	* added experimental support for EAP-PAX	* replaced hostapd control interface library (hostapd_ctrl.[ch]) with	  the same implementation that wpa_supplicant is using (wpa_ctrl.[ch])2005-02-12 - v0.3.7 (beginning of 0.3.x stable releases)2005-01-23 - v0.3.5	* added support for configuring a forced PEAP version based on the	  Phase 1 identity	* fixed PEAPv1 to use tunneled EAP-Success/Failure instead of EAP-TLV	  to terminate authentication	* fixed EAP identifier duplicate processing with the new IEEE 802.1X	  draft	* clear accounting data in the driver when starting a new accounting	  session	* driver_madwifi: filter wireless events based on ifindex to allow more	  than one network interface to be used

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -