openwrtv4/package/network/services/hostapd/files
Timo Sigurdsson 6515887ed9 hostapd: Expose the tdls_prohibit option to UCI
wpa_disable_eapol_key_retries can't prevent attacks against the
Tunneled Direct-Link Setup (TDLS) handshake. Jouni Malinen suggested
that the existing hostapd option tdls_prohibit can be used to further
complicate this possibility at the AP side. tdls_prohibit=1 makes
hostapd advertise that use of TDLS is not allowed in the BSS.

Note: If an attacker manages to lure both TDLS peers into a fake
AP, hiding the tdls_prohibit advertisement from them, it might be
possible to bypass this protection.

Make this option configurable via UCI, but disabled by default.

Signed-off-by: Timo Sigurdsson <public_timo.s@silentcreek.de>
2017-12-07 01:57:29 +02:00
..
hostapd-full.config hostapd: update hostapd full config 2017-09-28 00:26:11 +03:00
hostapd-mini.config hostapd: update hostapd mini config 2017-09-28 00:27:01 +03:00
hostapd.sh hostapd: Expose the tdls_prohibit option to UCI 2017-12-07 01:57:29 +02:00
multicall.c packages: sort network related packages into package/network/ 2012-10-10 12:32:29 +00:00
wpa_supplicant-full.config hostapd: rework frequency/ht/vht selection for ibss/mesh 2017-11-15 18:49:12 +01:00
wpa_supplicant-mini.config hostapd: rework frequency/ht/vht selection for ibss/mesh 2017-11-15 18:49:12 +01:00
wpa_supplicant-p2p.config hostapd: rework frequency/ht/vht selection for ibss/mesh 2017-11-15 18:49:12 +01:00
wps-hotplug.sh buttons: make all button handler scripts return 0 2015-07-24 09:11:35 +00:00