aboutsummaryrefslogtreecommitdiffstats
path: root/package/network/services/hostapd/Config.in
diff options
context:
space:
mode:
authorPetr Štetiar <ynezz@true.cz>2020-05-04 10:14:32 +0200
committerPetr Štetiar <ynezz@true.cz>2020-05-21 08:18:01 +0200
commit472fd98c5b12b531e0cb8dacb2625dd1810b278d (patch)
treea1f2106a16a8d1446cc2225f2933509921671af0 /package/network/services/hostapd/Config.in
parent0a3ec87a66baa29a9dcb367847a1dcb093d3de16 (diff)
downloadupstream-472fd98c5b12b531e0cb8dacb2625dd1810b278d.tar.gz
upstream-472fd98c5b12b531e0cb8dacb2625dd1810b278d.tar.bz2
upstream-472fd98c5b12b531e0cb8dacb2625dd1810b278d.zip
hostapd: disable support for Wired Equivalent Privacy by default
Upstream in commit 200c7693c9a1 ("Make WEP functionality an optional build parameter") has made WEP functionality an optional build parameter disabled as default, because WEP should not be used for anything anymore. As a step towards removing it completely, they moved all WEP related functionality behind CONFIG_WEP blocks and disabled it by default. This functionality is subject to be completely removed in a future release. So follow this good security advice, deprecation notice and disable WEP by default, but still allow custom builds with WEP support via CONFIG_WPA_ENABLE_WEP config option till upstream removes support for WEP completely. Signed-off-by: Petr Štetiar <ynezz@true.cz>
Diffstat (limited to 'package/network/services/hostapd/Config.in')
-rw-r--r--package/network/services/hostapd/Config.in9
1 files changed, 9 insertions, 0 deletions
diff --git a/package/network/services/hostapd/Config.in b/package/network/services/hostapd/Config.in
index 9dfa44e313..2cdd1ed970 100644
--- a/package/network/services/hostapd/Config.in
+++ b/package/network/services/hostapd/Config.in
@@ -73,3 +73,12 @@ config DRIVER_11AC_SUPPORT
config DRIVER_11W_SUPPORT
bool
default n
+
+config WPA_ENABLE_WEP
+ bool "Enable support for unsecure and obsolete WEP"
+ help
+ Wired equivalent privacy (WEP) is an obsolete cryptographic data
+ confidentiality algorithm that is not considered secure. It should not be used
+ for anything anymore. The functionality needed to use WEP is available in the
+ current hostapd release under this optional build parameter and completely
+ removed in a future release.