Commit Graph

94 Commits

Author SHA1 Message Date
Arne Fitzenreiter
afd54bb41a hostapd: fix start/stop buttons
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-11-06 11:49:11 +01:00
Michael Tremer
3c904d268b hostapd: Enable logging to syslog
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2024-11-05 08:45:33 +01:00
Arne Fitzenreiter
202d48c340 hostapd: update to git 64d60bb4
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-09-30 16:05:07 +00:00
Michael Tremer
fc4ba90b43 wlanap.cgi: Disable generating Perl warnings
Reported-by: Waynie <waynet@ucpix.de>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-09-20 11:30:52 +01:00
Adolf Belka
6c6959694a hostapd: Update to version 2_11
- Update from version 2_10 to 2_11
- Update of rootfile not required
- Update of patches to latest source tarball
- Changelog
    2_11
	* Wi-Fi Easy Connect
	  - add support for DPP release 3
	  - allow Configurator parameters to be provided during config exchange
	* HE/IEEE 802.11ax/Wi-Fi 6
	  - various fixes
	* EHT/IEEE 802.11be/Wi-Fi 7
	  - add preliminary support
	* SAE: add support for fetching the password from a RADIUS server
	* support OpenSSL 3.0 API changes
	* support background radar detection and CAC with some additional
	  drivers
	* support RADIUS ACL/PSK check during 4-way handshake (wpa_psk_radius=3)
	* EAP-SIM/AKA: support IMSI privacy
	* improve 4-way handshake operations
	  - use Secure=1 in message 3 during PTK rekeying
	* OCV: do not check Frequency Segment 1 Channel Number for 160 MHz cases
	  to avoid interoperability issues
	* support new SAE AKM suites with variable length keys
	* support new AKM for 802.1X/EAP with SHA384
	* extend PASN support for secure ranging
	* FT: Use SHA256 to derive PMKID for AKM 00-0F-AC:3 (FT-EAP)
	  - this is based on additional details being added in the IEEE 802.11
	    standard
	  - the new implementation is not backwards compatible
	* improved ACS to cover additional channel types/bandwidths
	* extended Multiple BSSID support
	* fix beacon protection with FT protocol (incorrect BIGTK was provided)
	* support unsynchronized service discovery (USD)
	* add preliminary support for RADIUS/TLS
	* add support for explicit SSID protection in 4-way handshake
	  (a mitigation for CVE-2023-52424; disabled by default for now, can be
	  enabled with ssid_protection=1)
	* fix SAE H2E rejected groups validation to avoid downgrade attacks
	* use stricter validation for some RADIUS messages
	* a large number of other fixes, cleanup, and extensions

Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2024-08-07 09:32:57 +00:00
Michael Tremer
87d0d07bbc core176: Re-ship lots of stuff that is still linked against OpenSSL 1.1.1
There are no functional changes in these files, but they are however
linked against OpenSSL 1.1.1 and need to be re-shipped before we remove
the legacy library.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-06-27 10:06:45 +00:00
Michael Tremer
ef59185bf3 hostapd: Enable QCA vendor extensions to nl80211
This should allow hostapd to utilize some vendor-specific features in
Qualcomm/Atheros cards. I am not sure what my card supports, but it is
all running fine.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2023-04-24 18:42:25 +00:00
Adolf Belka
b493875f9e hostapd: Ship due to sobump from json-c update
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
2023-01-05 10:40:59 +00:00
Michael Tremer
c183124f58 Bump PAK_VER for all packages that use SERVICES
Since we have extended services.cgi that it reads the Services field
from the Pakfire metadata, we will need to make sure that that metadata
is going to be on those systems.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2022-09-15 10:43:54 +00:00
Peter Müller
9a7e4d8506 Switch checksums from MD5 to BLAKE2
Historically, the MD5 checksums in our LFS files serve as a protection
against broken downloads, or accidentally corrupted source files.

While the sources are nowadays downloaded via HTTPS, it make sense to
beef up integrity protection for them, since transparently intercepting
TLS is believed to be feasible for more powerful actors, and the state
of the public PKI ecosystem is clearly not helping.

Therefore, this patch switches from MD5 to BLAKE2, updating all LFS
files as well as make.sh to deal with this checksum algorithm. BLAKE2 is
notably faster (and more secure) than SHA2, so the performance penalty
introduced by this patch is negligible, if noticeable at all.

In preparation of this patch, the toolchain files currently used have
been supplied with BLAKE2 checksums as well on
https://source.ipfire.org/.

Cc: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Acked-by: Michael Tremer <michael.tremeripfire.org>
2022-04-02 14:19:25 +00:00
Peter Müller
808e3ea192 hostapd: Repair LFS file after merge garbage
Reported-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
2022-02-21 21:09:48 +00:00
Matthias Fischer
6491a92335 hostapd: Update to 2.10
For details see:
https://w1.fi/cgit/hostap/plain/hostapd/ChangeLog

"2022-01-16 - v2.10
	* SAE changes
	  - improved protection against side channel attacks
	    [https://w1.fi/security/2022-1/]
	  - added option send SAE Confirm immediately (sae_config_immediate=1)
	    after SAE Commit
	  - added support for the hash-to-element mechanism (sae_pwe=1 or
	    sae_pwe=2)
	  - fixed PMKSA caching with OKC
	  - added support for SAE-PK
	* EAP-pwd changes
	  - improved protection against side channel attacks
	    [https://w1.fi/security/2022-1/]
	* fixed WPS UPnP SUBSCRIBE handling of invalid operations
	  [https://w1.fi/security/2020-1/]
	* fixed PMF disconnection protection bypass
	  [https://w1.fi/security/2019-7/]
	* added support for using OpenSSL 3.0
	* fixed various issues in experimental support for EAP-TEAP server
	* added configuration (max_auth_rounds, max_auth_rounds_short) to
	  increase the maximum number of EAP message exchanges (mainly to
	  support cases with very large certificates) for the EAP server
	* added support for DPP release 2 (Wi-Fi Device Provisioning Protocol)
	* extended HE (IEEE 802.11ax) support, including 6 GHz support
	* removed obsolete IAPP functionality
	* fixed EAP-FAST server with TLS GCM/CCM ciphers
	* dropped support for libnl 1.1
	* added support for nl80211 control port for EAPOL frame TX/RX
	* fixed OWE key derivation with groups 20 and 21; this breaks backwards
	  compatibility for these groups while the default group 19 remains
	  backwards compatible; owe_ptk_workaround=1 can be used to enabled a
	  a workaround for the group 20/21 backwards compatibility
	* added support for Beacon protection
	* added support for Extended Key ID for pairwise keys
	* removed WEP support from the default build (CONFIG_WEP=y can be used
	  to enable it, if really needed)
	* added a build option to remove TKIP support (CONFIG_NO_TKIP=y)
	* added support for Transition Disable mechanism to allow the AP to
	  automatically disable transition mode to improve security
	* added support for PASN
	* added EAP-TLS server support for TLS 1.3 (disabled by default for now)
	* a large number of other fixes, cleanup, and extensions"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-02-18 21:57:02 +00:00
Robin Roevens
f15707c78c buildprocess: Add extra metadata to pak lfs files
* Add a Summary and Services field to all pak lfs files
* Replace occurances of INSTALL_INITSCRIPT with new INSTALL_INITSCRIPTS
  macro in all pak lfs files.

Signed-off-by: Robin Roevens <robin.roevens@disroot.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-02-11 15:13:15 +00:00
Arne Fitzenreiter
82134432f5 wlanap.cgi: fix typo at reading country list
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-09-24 09:33:17 +00:00
Arne Fitzenreiter
dba01cdc8e hostapd: bump package to ship updated wlanap.cgi
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2021-09-10 07:28:27 +00:00
Michael Tremer
f1fc2193a7 Bump release of all packages with CGI files
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-06-18 15:08:57 +00:00
Michael Tremer
758565ce86 hostapd: Bump package version
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-04-16 10:06:14 +00:00
Michael Tremer
5b2fc5d65f hostapd: Update to development version
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-01-18 13:03:36 +00:00
Michael Tremer
2127c97b8f hostapd: Bump package version
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-12-29 10:17:09 +00:00
Michael Tremer
75f3182a39 hostapd: Bump package version
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-10-27 11:56:00 +00:00
Michael Tremer
1f5c0c563a hostapd: Bump version to ship updated wlanap.cgi
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2020-09-24 17:36:37 +00:00
Michael Tremer
2dc2a27803 lfs: Drop quotes in DEPS variable
Not sure why this has ever been there. This simply makes it
nicer to read and edit because we can have line-breaks now.

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2020-03-24 08:57:27 +00:00
peter.mueller@ipfire.org
41fe437400 fix typo in hostapd initscript
Fixes: #11237

Reported-by: Tom Rymes <tomvend@rymes.com>
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2019-10-14 17:40:25 +00:00
Matthias Fischer
2fc8d41915 hostapd: Update to 2.9
For details see:
https://w1.fi/cgit/hostap/plain/hostapd/ChangeLog

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2019-10-08 18:09:10 +00:00
Matthias Fischer
3f7cec61c9 hostapd: Update to 2.8
For details see:
https://w1.fi/cgit/hostap/plain/hostapd/ChangeLog

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-06-10 09:45:54 +01:00
Arne Fitzenreiter
20c7552e0d Merge branch 'master' into next
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2019-04-26 19:39:55 +02:00
Arne Fitzenreiter
31568a1982 hostapd: bump package version
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2019-04-26 07:43:21 +02:00
Michael Tremer
dc850cb32f hostap: Enable 80MHz bandwidth by default (when using ACS)
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-04-24 10:43:50 +01:00
Michael Tremer
37a83c83cd hostap: Enable option to force clients to use 802.11w
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-04-24 10:39:25 +01:00
Michael Tremer
ea10f1a0b5 hostap: Allow to use Automatic Channel Selection (ACS)
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-04-24 10:12:29 +01:00
Michael Tremer
57521504a8 hostapd: Bump package version
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-03-16 12:34:19 +00:00
Matthias Fischer
d6d5999af1 hostapd: Update to 2.7
For details see:
https://w1.fi/cgit/hostap/plain/hostapd/ChangeLog

This patch sticks to 'wpa_supplicant: Update to 2.7'.

Best,
Matthias

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-03-04 09:26:58 +00:00
Arne Fitzenreiter
d823d5f072 hostapd: add switch to disable neigborhood scan
this may violate regulatory rules because 40Mhz channels should disabled
if there are other networks but nearly every commercial router ignore this.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2018-10-27 16:47:12 +02:00
Michael Tremer
eb80bf38df hostapd: Bump package version
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2018-10-18 14:50:48 +01:00
Peter Müller
eee037b890 update disclaimer in LFS files
Most of these files still used old dates and/or domain names for contact
mail addresses. This is now replaced by an up-to-date copyright line.

Just some housekeeping... :-)

Signed-off-by: Peter Müller <peter.mueller@link38.eu>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2018-09-10 19:20:36 +01:00
Michael Tremer
0bd7b73132 hostapd: Fix detection of wireless devices with kernel 4.14
Fixes #11738

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2018-05-22 20:38:47 +01:00
Michael Tremer
ca4c354e08 Bump release of all packages linked against OpenSSL
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2018-02-26 16:28:16 +00:00
Michael Tremer
d7d5774529 KRACK attack: Patch wpa_supplicant & hostapd
A vulnerability was found in how a number of implementations can be
triggered to reconfigure WPA/WPA2/RSN keys (TK, GTK, or IGTK) by
replaying a specific frame that is used to manage the keys. Such
reinstallation of the encryption key can result in two different types
of vulnerabilities: disabling replay protection and significantly
reducing the security of encryption to the point of allowing frames to
be decrypted or some parts of the keys to be determined by an attacker
depending on which cipher is used.

This fixes: CVE-2017-13077, CVE-2017-13078, CVE-2017-13079,
  CVE-2017-13080, CVE-2017-13081, CVE-2017-13082, CVE-2017-13086,
  CVE-2017-13087, CVE-2017-13088

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-10-16 15:49:35 +01:00
Michael Tremer
c4791488a2 hostapd: Bump package version for updated wlanap.cgi
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-09-20 22:23:53 +01:00
Matthias Fischer
15b6f6f99a hostapd: Update to 2.6
For details see:
https://w1.fi/cgit/hostap/plain/hostapd/ChangeLog

Best,
Matthias

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-08-15 11:50:06 +01:00
Jonatan Schlag
6a4df2fd3b Move initscript to src/initscripts/packages and use new macro
Signed-off-by: Jonatan Schlag <jonatan.schlag@ipfire.org>
2017-02-22 13:13:49 +01:00
Jonatan Schlag
c6060f2dcf Move the initscript of the hostapd package into the packages directory
Signed-off-by: Jonatan Schlag <jonatan.schlag@ipfire.org>
2017-02-22 11:24:00 +01:00
Arne Fitzenreiter
2b47cc27e3 bump package version of corrupted paks.
I had uploaded the wrong arch of this paks so bump version to fix this
in pakfire.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2016-07-13 13:33:21 +02:00
Michael Tremer
4da318ab6f hostapd: Bump release version
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2016-04-26 22:32:17 +01:00
Sascha Kilian
3d4eb053a9 Update: hostapd to 2.5
Signed-off-by: Sascha Kilian <sascha@sakisoft.de>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2016-04-26 22:31:59 +01:00
Arne Fitzenreiter
ed974e08c5 hostapd: fix crash at txpower set on ath10k
ath10k generate a fault if iwconfig try to set txpower
while the device is down.

Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2016-03-26 15:35:31 +01:00
Arne Fitzenreiter
acb759575e hostapd: update to 2.4 2015-04-11 22:03:03 +02:00
Arne Fitzenreiter
9ee54998cb hostapd: increase EAPOL timeouts
Android clients need more time because sleep modes and low wlan interrupt priority.
2015-04-09 15:32:42 +02:00
Arne Fitzenreiter
9c47987e25 hostapd: undo rename if dual interfaces are not supported. 2015-01-30 17:39:34 +01:00
Arne Fitzenreiter
12f74b8f91 wlanap.cgi: remove trailing 0 from channellist. 2015-01-21 14:20:54 +01:00