hostapd/wpa_supplicant - new development release v0.6.0

Jouni Malinen j at w1.fi
Mon May 28 13:53:23 EDT 2007


New versions of wpa_supplicant and hostapd were just
released and are now available from http://w1.fi/

This release is from the development branch (0.6.x). Please note that
0.5.x branch continues to be the current source of stable releases.

This release is the first development release from the 0.6.x
branch. Number of files have been moved around to clean up the root
directories and builds are done in new subdirectories (hostapd and
wpa_supplicant). Directory restructuring is likely not yet done, so
more changes are to be expected in future 0.6.x development releases.


Changes from the last development release 0.5.6 (some of the bug fixes
has already been backported to 0.5.x branch and released in 0.5.7):

hostapd:
* added experimental IEEE 802.11r/D6.0 support
* updated EAP-SAKE to RFC 4763 and the IANA-allocated EAP type 48
* updated EAP-PSK to use the IANA-allocated EAP type 47
* fixed EAP-PSK bit ordering of the Flags field
* fixed configuration reloading (SIGHUP) to re-initialize WPA PSKs
  by reading wpa_psk_file [Bug 181]
* fixed EAP-TTLS AVP parser processing for too short AVP lengths
* fixed IPv6 connection to RADIUS accounting server
* updated EAP Generalized Pre-Shared Key (EAP-GPSK) to use the latest
  draft (draft-ietf-emu-eap-gpsk-04.txt)
* hlr_auc_gw: read GSM triplet file into memory and rotate through the
  entries instead of only using the same three triplets every time
  (this does not work properly with tests using multiple clients, but
  provides bit better triplet data for testing a single client; anyway,
  if a better quality triplets are needed, GSM-Milenage should be used
  instead of hardcoded triplet file)
* fixed EAP-MSCHAPv2 server to use a space between S and M parameters
  in Success Request [Bug 203]
* added support for sending EAP-AKA Notifications in error cases
* updated to use IEEE 802.11w/D2.0 for management frame protection
  (still experimental)
* RADIUS server: added support for processing duplicate messages
  (retransmissions from RADIUS client) by replying with the previous
  reply

wpa_supplicant:
* added network configuration parameter 'frequency' for setting
  initial channel for IBSS (adhoc) networks
* added experimental IEEE 802.11r/D6.0 support
* updated EAP-SAKE to RFC 4763 and the IANA-allocated EAP type 48
* updated EAP-PSK to use the IANA-allocated EAP type 47
* fixed EAP-PAX key derivation
* fixed EAP-PSK bit ordering of the Flags field
* fixed EAP-PEAP/TTLS/FAST to use the correct EAP identifier in
  tunnelled identity request (previously, the identifier from the outer
  method was used, not the tunnelled identifier which could be
  different)
* added support for fragmentation of outer TLS packets during Phase 2
  of EAP-PEAP/TTLS/FAST
* fixed EAP-TTLS AVP parser processing for too short AVP lengths
* added support for EAP-FAST authentication with inner methods that
  generate MSK (e.g., EAP-MSCHAPv2 that was previously only supported
  for PAC provisioning)
* added support for authenticated EAP-FAST provisioning
* added support for configuring maximum number of EAP-FAST PACs to
  store in a PAC list (fast_max_pac_list_len=<max> in phase1 string)
* added support for storing EAP-FAST PACs in binary format
  (fast_pac_format=binary in phase1 string)
* fixed dbus ctrl_iface to validate message interface before
  dispatching to avoid a possible segfault [Bug 190]
* fixed PeerKey key derivation to use the correct PRF label
* updated Windows binary build to link against OpenSSL 0.9.8d and
  added support for EAP-FAST
* updated EAP Generalized Pre-Shared Key (EAP-GPSK) to use the latest
  draft (draft-ietf-emu-eap-gpsk-04.txt)
* fixed EAP-AKA Notification processing to allow Notification to be
  processed after AKA Challenge response has been sent
* updated to use IEEE 802.11w/D2.0 for management frame protection
  (still experimental)
* fixed EAP-TTLS implementation not to crash on use of freed memory
  if TLS library initialization fails
* added support for EAP-TNC (Trusted Network Connect)
  (this version implements the EAP-TNC method and EAP-TTLS changes
  needed to run two methods in sequence (IF-T) and the IF-IMC and
  IF-TNCCS interfaces from TNCC)

-- 
Jouni Malinen                                            PGP id EFC895FA
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
Url : http://lists.shmoo.com/pipermail/hostap/attachments/20070528/6ad871b4/attachment.pgp 


More information about the HostAP mailing list