hostapd/wpa_supplicant - new development release v0.6.6

Ahmad Ali Tabassam ahmadthe8 at yahoo.com
Tue Nov 25 04:10:13 EST 2008


Hello Jouni Malinen
 Its nice to hear about the new develompnet Release v0.6.6.
>updated userspace MLME instructions to match with the current Linux
   mac80211 implementation; please also note that this can only be used
   with driver_nl80211.c (the old code from driver_wext.c was removed).

There was no default configuration entry in "defconfig" of wpa_supplicant v0.6.6 for nl80211?
I configured it similar to the hostapd v0.6.6CONFIG_DRIVER_NL80211=y
CFLAGS += -I$(LIBNL)/include
LIBS += -L$(LIBNL)/lib
 
And I also enabled the MLME instructions to match with my linux mac80211 implementation.CONFIG_CLIENT_MLME=y
WIRELESS_DEV=/usr/src/wireless-testing
CFLAGS += -I$(WIRELESS_DEV)/net/mac80211

When I run # wpa_supplicant -dd -Dnl80211 -iwlan2 -puse_mlme=1 -c wpa_supplicant.ft_psk.conf
either for ath5k or ath9k, it always fails.userspace_mlme_allow_bssid_mismatch.patch and vif_conf.patch are there.
I get the following error.........
Failed to set interface wlan2 mode
Could not configure driver to use managed mode
nl80211: Using user space MLME
nl80211: Failed to enable userspace MLME

Does I am missing anything?
 
Best Regards 

Ahmad Ali Tabassam
Institute Industrial IT
Dept. of Electrical Engineering and Computer Science
University of Applied Sciences, Lemgo Germany
Cell:          +49 176 64672248
Land line: +49 5261 2835790




________________________________
From: Jouni Malinen <j at w1.fi>
To: hostap at lists.shmoo.com
Sent: Sunday, November 23, 2008 7:25:49 AM
Subject: hostapd/wpa_supplicant - new development release v0.6.6

New versions of wpa_supplicant and hostapd were just
released and are now available from http://w1.fi/

This release is from the development branch (0.6.x). Please note that
the 0.5.x branch continues to be the current source of stable releases.

hostapd:
* added a new configuration option, wpa_ptk_rekey, that can be used to
  enforce frequent PTK rekeying, e.g., to mitigate some attacks against
  TKIP deficiencies
* updated OpenSSL code for EAP-FAST to use an updated version of the
  session ticket overriding API that was included into the upstream
  OpenSSL 0.9.9 tree on 2008-11-15 (no additional OpenSSL patch is
  needed with that version anymore)
* changed channel flags configuration to read the information from
  the driver (e.g., via driver_nl80211 when using mac80211) instead of
  using hostapd as the source of the regulatory information (i.e.,
  information from CRDA is now used with mac80211); this allows 5 GHz
  channels to be used with hostapd (if allowed in the current
  regulatory domain)
* fixed EAP-TLS message processing for the last TLS message if it is
  large enough to require fragmentation (e.g., if a large Session
  Ticket data is included)
* fixed listen interval configuration for nl80211 drivers

wpa_supplicant:
* added Milenage SIM/USIM emulator for EAP-SIM/EAP-AKA
  (can be used to simulate test SIM/USIM card with a known private key;
  enable with CONFIG_SIM_SIMULATOR=y/CONFIG_USIM_SIMULATOR=y in .config
  and password="Ki:OPc"/password="Ki:OPc:SQN" in network configuration)
* added a new network configuration option, wpa_ptk_rekey, that can be
  used to enforce frequent PTK rekeying, e.g., to mitigate some attacks
  against TKIP deficiencies
* added an optional mitigation mechanism for certain attacks against
  TKIP by delaying Michael MIC error reports by a random amount of time
  between 0 and 60 seconds; this can be enabled with a build option
  CONFIG_DELAYED_MIC_ERROR_REPORT=y in .config
* fixed EAP-AKA to use RES Length field in AT_RES as length in bits,
  not bytes
* updated OpenSSL code for EAP-FAST to use an updated version of the
  session ticket overriding API that was included into the upstream
  OpenSSL 0.9.9 tree on 2008-11-15 (no additional OpenSSL patch is
  needed with that version anymore)
* updated userspace MLME instructions to match with the current Linux
  mac80211 implementation; please also note that this can only be used
  with driver_nl80211.c (the old code from driver_wext.c was removed)
* added support (Linux only) for RoboSwitch chipsets (often found in
  consumer grade routers); driver interface 'roboswitch'
* fixed canceling of PMKSA caching when using drivers that generate
  RSN IE and refuse to drop PMKIDs that wpa_supplicant does not know
  about


git-shortlog for 0.6.5 -> 0.6.6:

Carolin Latze (1):
      Separate OpenSSL engine configuration for Phase 2

Jouke Witteveen (2):
      Add RoboSwitch driver interface for wpa_supplicant
      Fixed a bug in read -> _read cleanup; one missed change

Jouni Malinen (46):
      Added Milenage USIM emulator for EAP-AKA (can be used to simulate test
      driver_ndis: Added a workaround for a driver that removes SSID IE in scan
      Added Milenage-GSM simulator for EAP-SIM
      Added support for enforcing frequent PTK rekeying
      EAP-FAST: Include Tunnel PAC request only after EAP authentication
      EAP-FAST server: allow expired PAC for PAC refresh
      Fixed EAP-AKA RES Length field in AT_RES as length in bits, not bytes
      EAP-AKA: Validate RES Length field in AT_RES
      EAP-SIM/AKA: fixed initialization to verify PIN even if identity is set
      Added an optional mitigation mechanism for certain attacks against TKIP by
      Updated indentation in the patch to match style used elsewhere in OpenSSL
      Modified the OpenSSL patch to use session ticket -specific function
      EAP-FAST: Reorder TLVs in PAC Acknowledgment to fix interop issues
      Updated interop results for ACS 4.2
      OpenSSL 0.9.9 API change for EAP-FAST session ticket overriding API
      Changed channel flags configuration to read the information from the driver
      driver_nl80211: Remove monitor interface if AP initialization fails
      Improved the error message for passive scan not being available
      Remove extra typedefs since they do not seem to be needed anymore
      Updated userspace MLME instructions for current mac80211
      roboswitch: Minor coding style cleanup
      EAP-PEAP: Copy Binding nonce from cryptobinding request to reply
      Fixed size_t printf format for 64-bit builds
      Changed PEAPv0 cryptobinding to be disabled by default
      Fixed EAPA-AKA warning message about AT_RES length to use bits
      Fixed Milenage debug output to use correct length for IK and CK
      Fixed EAP-TLS message fragmentation for the last TLS message
      wpa_gui: Add a PNG version of the tray icon for Windows binary build
      Silence printf() calls in wpa_gui to avoid stdout output from a GUI program
      Remove the unwanted Windows console from the Windows binary version of wpa_gui
      Fixed canceling of PMKSA caching with driver generated RSN IE
      Fixed hostapd build without l2_packet (e.g., RADIUS server only).
      Added an attribution based on the original SSLeay license for OpenSSL.
      reconfig.c file was not used at all, so remove it.
      Removed now unused reconfig variables.
      Removed partial IEEE 802.11h implementation
      Removed forgotten register_drivers() prototype
      Remove overly complex hostapd setup sequence with n+1 callbacks
      Remove experimental non-AP STA code from hostapd
      Add more verbose debug output for GSM-Milenage use (RAND,SRES,Kc)
      Fixed listen interval configuration for nl80211 drivers
      Allocate new Acct-Session-Id on EAPOL-Logoff
      Use SM_ENTER_GLOBAL to clean up EAPOL state machine debug messages
      Simplified RADIUS accounting id usage
      Preparations for 0.6.6 release
      Preparations for 0.6.6 release

Kel Modderman (1):
      wpa_gui-qt4: tweak icon Makefile

Martin Michlmayr (1):
      wpa_gui-qt4: FTBFS with GCC 4.4: missing #include

-- 
Jouni Malinen                                            PGP id EFC895FA
_______________________________________________
HostAP mailing list
HostAP at lists.shmoo.com
http://lists.shmoo.com/mailman/listinfo/hostap



      
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.shmoo.com/pipermail/hostap/attachments/20081125/74ec3fc3/attachment-0001.htm 


More information about the HostAP mailing list