mirror of
https://github.com/openwrt/openwrt.git
synced 2024-12-28 09:39:00 +00:00
3eb34bc251
In the aftermath of the KRACK attacks, hostapd gained an AP-side workaround
against WNM-Sleep Mode GTK/IGTK reinstallation attacks. WNM Sleep Mode is not
enabled by default on OpenWrt, but it is configurable through the option
wnm_sleep_mode. Thus, make the AP-side workaround configurable as well by
exposing the option wnm_sleep_mode_no_keys. If you use the option
wpa_disable_eapol_key_retries and have wnm_sleep_mode enabled, you might
consider using this workaround.
Signed-off-by: Timo Sigurdsson <public_timo.s@silentcreek.de>
[bump PKG_RELEASE]
Signed-off-by: Paul Spooren <mail@aparcar.org>
(cherry picked from commit
|
||
---|---|---|
.. | ||
hostapd-basic.config | ||
hostapd-full.config | ||
hostapd-mini.config | ||
hostapd.sh | ||
multicall.c | ||
wpa_supplicant-basic.config | ||
wpa_supplicant-full.config | ||
wpa_supplicant-mini.config | ||
wpa_supplicant-p2p.config | ||
wpad_acl.json | ||
wpad.init | ||
wpad.json | ||
wps-hotplug.sh |