mirror of
https://github.com/openwrt/openwrt.git
synced 2024-12-23 07:22:33 +00:00
bf98faaac8
In the aftermath of the KRACK attacks, hostapd gained an AP-side workaround against WNM-Sleep Mode GTK/IGTK reinstallation attacks. WNM Sleep Mode is not enabled by default on OpenWrt, but it is configurable through the option wnm_sleep_mode. Thus, make the AP-side workaround configurable as well by exposing the option wnm_sleep_mode_no_keys. If you use the option wpa_disable_eapol_key_retries and have wnm_sleep_mode enabled, you might consider using this workaround. Signed-off-by: Timo Sigurdsson <public_timo.s@silentcreek.de> |
||
---|---|---|
.. | ||
hostapd-basic.config | ||
hostapd-full.config | ||
hostapd-mini.config | ||
hostapd.sh | ||
multicall.c | ||
wpa_supplicant-basic.config | ||
wpa_supplicant-full.config | ||
wpa_supplicant-mini.config | ||
wpa_supplicant-p2p.config | ||
wpad_acl.json | ||
wpad.init | ||
wpad.json | ||
wps-hotplug.sh |