openwrt/package/network/services/hostapd
Timo Sigurdsson 3eb34bc251 hostapd: make wnm_sleep_mode_no_keys configurable
In the aftermath of the KRACK attacks, hostapd gained an AP-side workaround
against WNM-Sleep Mode GTK/IGTK reinstallation attacks. WNM Sleep Mode is not
enabled by default on OpenWrt, but it is configurable through the option
wnm_sleep_mode. Thus, make the AP-side workaround configurable as well by
exposing the option wnm_sleep_mode_no_keys. If you use the option
wpa_disable_eapol_key_retries and have wnm_sleep_mode enabled, you might
consider using this workaround.

Signed-off-by: Timo Sigurdsson <public_timo.s@silentcreek.de>
[bump PKG_RELEASE]
Signed-off-by: Paul Spooren <mail@aparcar.org>
(cherry picked from commit bf98faaac8)
2021-07-05 14:04:09 -10:00
..
files hostapd: make wnm_sleep_mode_no_keys configurable 2021-07-05 14:04:09 -10:00
patches hostapd: wolfssl: add RNG to EC key 2021-06-21 22:43:15 +02:00
src hostapd: return PID on config_add call 2021-01-10 19:15:51 +00:00
Config.in treewide: nuke DRIVER_11W_SUPPORT 2020-12-23 16:36:08 +01:00
Makefile hostapd: make wnm_sleep_mode_no_keys configurable 2021-07-05 14:04:09 -10:00