mirror of
https://git.openwrt.org/openwrt/openwrt.git
synced 2026-03-14 23:09:45 +01:00
In the aftermath of the KRACK attacks, hostapd gained an AP-side workaround
against WNM-Sleep Mode GTK/IGTK reinstallation attacks. WNM Sleep Mode is not
enabled by default on OpenWrt, but it is configurable through the option
wnm_sleep_mode. Thus, make the AP-side workaround configurable as well by
exposing the option wnm_sleep_mode_no_keys. If you use the option
wpa_disable_eapol_key_retries and have wnm_sleep_mode enabled, you might
consider using this workaround.
Signed-off-by: Timo Sigurdsson <public_timo.s@silentcreek.de>
[bump PKG_RELEASE]
Signed-off-by: Paul Spooren <mail@aparcar.org>
(cherry picked from commit
|
||
|---|---|---|
| .. | ||
| hostapd-basic.config | ||
| hostapd-full.config | ||
| hostapd-mini.config | ||
| hostapd.sh | ||
| multicall.c | ||
| wpa_supplicant-basic.config | ||
| wpa_supplicant-full.config | ||
| wpa_supplicant-mini.config | ||
| wpa_supplicant-p2p.config | ||
| wpad.init | ||
| wpad.json | ||
| wpad_acl.json | ||
| wps-hotplug.sh | ||