Commit Graph

28 Commits

Author SHA1 Message Date
Peter Müller
9a7e4d8506 Switch checksums from MD5 to BLAKE2
Historically, the MD5 checksums in our LFS files serve as a protection
against broken downloads, or accidentally corrupted source files.

While the sources are nowadays downloaded via HTTPS, it make sense to
beef up integrity protection for them, since transparently intercepting
TLS is believed to be feasible for more powerful actors, and the state
of the public PKI ecosystem is clearly not helping.

Therefore, this patch switches from MD5 to BLAKE2, updating all LFS
files as well as make.sh to deal with this checksum algorithm. BLAKE2 is
notably faster (and more secure) than SHA2, so the performance penalty
introduced by this patch is negligible, if noticeable at all.

In preparation of this patch, the toolchain files currently used have
been supplied with BLAKE2 checksums as well on
https://source.ipfire.org/.

Cc: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Acked-by: Michael Tremer <michael.tremeripfire.org>
2022-04-02 14:19:25 +00:00
Matthias Fischer
f51f8b1303 wpa_supplicant: Update to 2.10
For details see:
https://w1.fi/cgit/hostap/plain/wpa_supplicant/ChangeLog

"2022-01-16 - v2.10
	* SAE changes
	  - improved protection against side channel attacks
	    [https://w1.fi/security/2022-1/]
	  - added support for the hash-to-element mechanism (sae_pwe=1 or
	    sae_pwe=2); this is currently disabled by default, but will likely
	    get enabled by default in the future
	  - fixed PMKSA caching with OKC
	  - added support for SAE-PK
	* EAP-pwd changes
	  - improved protection against side channel attacks
	  [https://w1.fi/security/2022-1/]
	* fixed P2P provision discovery processing of a specially constructed
	  invalid frame
	  [https://w1.fi/security/2021-1/]
	* fixed P2P group information processing of a specially constructed
	  invalid frame
	  [https://w1.fi/security/2020-2/]
	* fixed PMF disconnection protection bypass in AP mode
	  [https://w1.fi/security/2019-7/]
	* added support for using OpenSSL 3.0
	* increased the maximum number of EAP message exchanges (mainly to
	  support cases with very large certificates)
	* fixed various issues in experimental support for EAP-TEAP peer
	* added support for DPP release 2 (Wi-Fi Device Provisioning Protocol)
	* a number of MKA/MACsec fixes and extensions
	* added support for SAE (WPA3-Personal) AP mode configuration
	* added P2P support for EDMG (IEEE 802.11ay) channels
	* fixed EAP-FAST peer with TLS GCM/CCM ciphers
	* improved throughput estimation and BSS selection
	* dropped support for libnl 1.1
	* added support for nl80211 control port for EAPOL frame TX/RX
	* fixed OWE key derivation with groups 20 and 21; this breaks backwards
	  compatibility for these groups while the default group 19 remains
	  backwards compatible
	* added support for Beacon protection
	* added support for Extended Key ID for pairwise keys
	* removed WEP support from the default build (CONFIG_WEP=y can be used
	  to enable it, if really needed)
	* added a build option to remove TKIP support (CONFIG_NO_TKIP=y)
	* added support for Transition Disable mechanism to allow the AP to
	  automatically disable transition mode to improve security
	* extended D-Bus interface
	* added support for PASN
	* added a file-based backend for external password storage to allow
	  secret information to be moved away from the main configuration file
	  without requiring external tools
	* added EAP-TLS peer support for TLS 1.3 (disabled by default for now)
	* added support for SCS, MSCS, DSCP policy
	* changed driver interface selection to default to automatic fallback
	  to other compiled in options
	* a large number of other fixes, cleanup, and extensions"

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
2022-02-18 21:57:05 +00:00
Michael Tremer
93d540832a wpa_supplicant: Update to development version
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2021-01-18 13:03:43 +00:00
Matthias Fischer
19addaa5aa wpa_supplicant: Update to 2.9
For details see:
https://w1.fi/cgit/hostap/plain/wpa_supplicant/ChangeLog

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Reviewed-by: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Arne Fitzenreiter <arne_f@ipfire.org>
2019-10-08 18:09:08 +00:00
Matthias Fischer
33fb0c91ec wpa_supplicant: Update to 2.8
For details see:
https://w1.fi/cgit/hostap/plain/wpa_supplicant/ChangeLog

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-06-11 07:00:05 +01:00
Matthias Fischer
b2ee5e8aa4 wpa_supplicant: Update to 2.7
For details see:
https://w1.fi/cgit/hostap/plain/wpa_supplicant/ChangeLog

Best,
Matthias

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2019-03-04 09:26:58 +00:00
Peter Müller
eee037b890 update disclaimer in LFS files
Most of these files still used old dates and/or domain names for contact
mail addresses. This is now replaced by an up-to-date copyright line.

Just some housekeeping... :-)

Signed-off-by: Peter Müller <peter.mueller@link38.eu>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2018-09-10 19:20:36 +01:00
Michael Tremer
d7d5774529 KRACK attack: Patch wpa_supplicant & hostapd
A vulnerability was found in how a number of implementations can be
triggered to reconfigure WPA/WPA2/RSN keys (TK, GTK, or IGTK) by
replaying a specific frame that is used to manage the keys. Such
reinstallation of the encryption key can result in two different types
of vulnerabilities: disabling replay protection and significantly
reducing the security of encryption to the point of allowing frames to
be decrypted or some parts of the keys to be determined by an attacker
depending on which cipher is used.

This fixes: CVE-2017-13077, CVE-2017-13078, CVE-2017-13079,
  CVE-2017-13080, CVE-2017-13081, CVE-2017-13082, CVE-2017-13086,
  CVE-2017-13087, CVE-2017-13088

Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-10-16 15:49:35 +01:00
Matthias Fischer
1b0ff72dad wpa_supplicant: Update to 2.6
For details see:
https://w1.fi/cgit/hostap/plain/wpa_supplicant/ChangeLog

Signed-off-by: Matthias Fischer <matthias.fischer@ipfire.org>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2017-09-23 22:16:14 +01:00
Sascha Kilian
e4ad596bd7 wpa_supplicant: Update to 2.5
Signed-off-by: Sascha Kilian <sascha@sakisoft.de>
Signed-off-by: Michael Tremer <michael.tremer@ipfire.org>
2016-04-26 22:37:44 +01:00
Arne Fitzenreiter
f3dce17984 wpa_supplicant: update to 2.4 2015-04-11 22:02:33 +02:00
Arne Fitzenreiter
97c73abc88 hostapd/wpa_supplicant: update to 2.3. 2015-01-04 20:26:59 +01:00
Arne Fitzenreiter
cd5f645968 wpa_supplicant: update to 2.2. 2014-07-12 18:39:34 +02:00
Arne Fitzenreiter
f89678de2f hostapd: update to 2.1. 2014-03-19 07:22:49 +01:00
Arne Fitzenreiter
d50fe89686 wpa_supplicant: update to 2.0. 2013-02-05 01:47:58 +01:00
Arne Fitzenreiter
d77b8843c7 wpa_supplicant: update to 1.1. 2012-12-29 18:17:10 +01:00
Arne Fitzenreiter
c6389bdab4 wpa_supplicant: updated 1.0. 2012-10-31 20:55:29 +01:00
Arne Fitzenreiter
fdecb90721 kernel: use 3.2.x as default kernel.
config for arm kirkwoord and versatile is still missing.
some modules and addons are not build yet.
2012-08-04 11:29:21 +02:00
Michael Tremer
cc72d5cbcc Introduce MACHINE_TYPE to lfs files. 2011-09-15 23:55:16 +02:00
Michael Tremer
e1e7669b61 Reenable hostapd and wpa_supplicant.
Disabled support for madwifi on ARM.
2011-09-08 18:27:51 +00:00
Arne Fitzenreiter
3a1179be19 Updated wpa_supplicant (0.7.3). 2010-09-15 17:42:38 +02:00
Arne Fitzenreiter
999d55de05 Add compat-wireless, add support of nl80211 wlan drivers 2009-04-20 19:33:34 +02:00
Arne Fitzenreiter
055f260979 Updated madwifi (free hal) hostapd+wpa_supplicant 0.6.9 2009-04-11 14:14:19 +02:00
Arne Fitzenreiter
d7be31cb18 Updated wpa_supplicant to 0.6.8
cleaned hostapd build
2009-03-21 19:06:18 +01:00
Maniacikarus
df07848550 Upgraded wireless stack to current stables 2008-12-07 20:03:16 +01:00
Arne Fitzenreiter
fad7b108e2 Readd madwifi, hostapd & wpa_supplicant 2008-06-12 19:34:34 +02:00
Michael Tremer
dd36ba849c Revert "Introduced access point feature."
This reverts commit a6090720da.

We need some additional work to an extra wlan kernel.
2008-04-27 21:34:42 +02:00
Michael Tremer
a6090720da Introduced access point feature.
There is still missing the rootfile of madwifi.
2008-04-22 16:37:53 +02:00