hostapd/hostapd-2.7.tar.gz.asc
Karol Babioch 4f037ffde3 Accepting request 656165 from home:mnhauke:network
- Update to version 2.7
  * fixed WPA packet number reuse with replayed messages and key
    reinstallation
    [http://w1.fi/security/2017-1/] (CVE-2017-13082)
  * added support for FILS (IEEE 802.11ai) shared key authentication
  * added support for OWE (Opportunistic Wireless Encryption, RFC 8110;
    and transition mode defined by WFA)
  * added support for DPP (Wi-Fi Device Provisioning Protocol)
  * FT:
    - added local generation of PMK-R0/PMK-R1 for FT-PSK
      (ft_psk_generate_local=1)
    - replaced inter-AP protocol with a cleaner design that is more
      easily extensible; this breaks backward compatibility and requires
      all APs in the ESS to be updated at the same time to maintain FT
      functionality
    - added support for wildcard R0KH/R1KH
    - replaced r0_key_lifetime (minutes) parameter with
      ft_r0_key_lifetime (seconds)
    - fixed wpa_psk_file use for FT-PSK
    - fixed FT-SAE PMKID matching
    - added expiration to PMK-R0 and PMK-R1 cache
    - added IEEE VLAN support (including tagged VLANs)
    - added support for SHA384 based AKM
  * SAE
    - fixed some PMKSA caching cases with SAE
    - added support for configuring SAE password separately of the
      WPA2 PSK/passphrase
    - added option to require MFP for SAE associations
      (sae_require_pmf=1)
    - fixed PTK and EAPOL-Key integrity and key-wrap algorithm selection

OBS-URL: https://build.opensuse.org/request/show/656165
OBS-URL: https://build.opensuse.org/package/show/Base:System/hostapd?expand=0&rev=45
2018-12-17 08:48:14 +00:00

8 lines
181 B
Plaintext

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iEYEABECAAYFAlwEQ5wACgkQK270Mu/IlfpX/gCeKuTFVjKy3P5J0fwW5twOccCZ
p90An2HZ+1jz75dIAN8m2HVaGGsceGhp
=DDIo
-----END PGP SIGNATURE-----