You cannot select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
6515887ed9
wpa_disable_eapol_key_retries can't prevent attacks against the Tunneled Direct-Link Setup (TDLS) handshake. Jouni Malinen suggested that the existing hostapd option tdls_prohibit can be used to further complicate this possibility at the AP side. tdls_prohibit=1 makes hostapd advertise that use of TDLS is not allowed in the BSS. Note: If an attacker manages to lure both TDLS peers into a fake AP, hiding the tdls_prohibit advertisement from them, it might be possible to bypass this protection. Make this option configurable via UCI, but disabled by default. Signed-off-by: Timo Sigurdsson <public_timo.s@silentcreek.de> |
7 years ago | |
---|---|---|
.. | ||
hostapd-full.config | 7 years ago | |
hostapd-mini.config | 7 years ago | |
hostapd.sh | 7 years ago | |
multicall.c | 12 years ago | |
wpa_supplicant-full.config | 7 years ago | |
wpa_supplicant-mini.config | 7 years ago | |
wpa_supplicant-p2p.config | 7 years ago | |
wps-hotplug.sh | 9 years ago |