aboutsummaryrefslogtreecommitdiffstats
path: root/target
diff options
context:
space:
mode:
authorTimo Sigurdsson <public_timo.s@silentcreek.de>2021-06-15 23:09:41 +0200
committerPaul Spooren <mail@aparcar.org>2021-06-22 11:10:06 -1000
commitbf98faaac8ed24cf7d3d93dd4fcd7304d109363b (patch)
tree8e45e568a2fb06808dd4deab617e4fd8a4929297 /target
parentcc7316d1e924977881f03a7cb5863b695f79d81e (diff)
downloadupstream-bf98faaac8ed24cf7d3d93dd4fcd7304d109363b.tar.gz
upstream-bf98faaac8ed24cf7d3d93dd4fcd7304d109363b.tar.bz2
upstream-bf98faaac8ed24cf7d3d93dd4fcd7304d109363b.zip
hostapd: make wnm_sleep_mode_no_keys configurable
In the aftermath of the KRACK attacks, hostapd gained an AP-side workaround against WNM-Sleep Mode GTK/IGTK reinstallation attacks. WNM Sleep Mode is not enabled by default on OpenWrt, but it is configurable through the option wnm_sleep_mode. Thus, make the AP-side workaround configurable as well by exposing the option wnm_sleep_mode_no_keys. If you use the option wpa_disable_eapol_key_retries and have wnm_sleep_mode enabled, you might consider using this workaround. Signed-off-by: Timo Sigurdsson <public_timo.s@silentcreek.de>
Diffstat (limited to 'target')
0 files changed, 0 insertions, 0 deletions