wpa 2:2.6-15ubuntu1 source package in Ubuntu
Changelog
wpa (2:2.6-15ubuntu1) bionic; urgency=low * Merge from Debian unstable. Remaining changes: - debian/patches/wpa_service_ignore-on-isolate.patch: add IgnoreOnIsolate=yes so that when switching "runlevels" in oem-config will not kill off wpa and cause wireless to be unavailable on first boot. - debian/patches/session-ticket.patch: disable the TLS Session Ticket extension to fix auth with 802.1x PEAP on some hardware. - debian/patches/android_hal_fw_path_change.patch: add a DBus method for requesting a firmware change when working with the Android HAL; this is used to set a device in P2P or AP mode; conditional to CONFIG_ANDROID_HAL being enabled. - debian/config/wpasupplicant/linux: enable CONFIG_ANDROID_HAL. - debian/control: Build-Depends on android-headers to get the required wifi headers for the HAL support. - debian/patches/dbus-available-sta.patch: Make the list of connected stations available on DBus for hotspot mode; along with some of the station properties, such as rx/tx packets, bytes, capabilities, etc. * Updated debian/patches/dbus-available-sta.patch for new getter API and refreshed other patches. wpa (2:2.6-15) unstable; urgency=medium * Update debian/control: - Update Maintainer field to point to $<email address hidden> - Update Vcs-* fields to point to salsa.d.o - Drop no longer active uploaders. wpa (2:2.6-14) unstable; urgency=medium * Replace the PEM fix patch by Lukasz Siudut with an upstream patch. Thanks to David Benjamin <email address hidden>. * Apply patches from Beniamino Galvani: - Fix race condition in detecting MAC address change - Update MAC address when driver detects a change * Disable WNM to resolve a compatibility issue with wl. Thanks to YOSHINO Yoshihito <email address hidden>. Hopefully really closes: #833507. wpa (2:2.6-13) unstable; urgency=medium * Fix a typo in functions.sh (Closes: #883659). wpa (2:2.6-12) unstable; urgency=medium * Add wl to the blacklist for MAC randomisation. (Closes: #833507) * Blacklist an out-of-tree driver for Realtek RTL8188EU too. wpa (2:2.6-11) unstable; urgency=medium * Unbreak EAP-TLS. Thanks to Dmitry Borodaenko <email address hidden> wpa (2:2.6-10) unstable; urgency=medium * Mask hostapd every time it has no valid configuration. wpa (2:2.6-9) unstable; urgency=medium * Tell NetworkManager to not touch MAC addresses on unsupported drivers. Hopefully, this will fix #849077. wpa (2:2.6-8) unstable; urgency=medium * Revert "Build wpa_supplicant with interface matching support." (Closes: #882716). * Drop override_dh_builddeb. * Use dh 10. * Prevent hostapd from failing on the package install when there isn't a valid configuration file yet (Closes: #882740): - Don't enable hostapd.service by default. - Mask hostapd.service on the first install. wpa (2:2.6-7) unstable; urgency=medium * Upload to unstable. * Optional AP side workaround for key reinstallation attacks (LP: #1730399). wpa (2:2.6-6) experimental; urgency=medium [ Reiner Herrmann ] * Port wpa_gui to Qt5 (Closes: #875233). [ Andrew Shadura ] * Add a service file for hostapd. * Build wpa_supplicant with interface matching support (Closes: #879208). [ Benedikt Wildenhain (BO) ] * Install wpa_supplicant-wired@.service (Closes: #871488). [ Jan-Benedict Glaw ] * Consider all ifupdown configuration, not only /etc/network/interfaces (Closes: #853293). wpa (2:2.6-5) experimental; urgency=medium [ Yves-Alexis Perez ] * Fix multiple issues in WPA protocol (CVE-2017-13077, CVE-2017-13078, CVE-2017-13079, CVE-2017-13080, CVE-2017-13081, CVE-2017-13082, CVE-2017-13086, CVE-2017-13087, CVE-2017-13088): - hostapd: Avoid key reinstallation in FT handshake - Prevent reinstallation of an already in-use group key - Extend protection of GTK/IGTK reinstallation of - Fix TK configuration to the driver in EAPOL-Key 3/4 - Prevent installation of an all-zero TK - Fix PTK rekeying to generate a new ANonce - TDLS: Reject TPK-TK reconfiguration - WNM: Ignore WNM-Sleep Mode Response if WNM-Sleep Mode - WNM: Ignore WNM-Sleep Mode Response without pending - FT: Do not allow multiple Reassociation Response frames - TDLS: Ignore incoming TDLS Setup Response retries wpa (2:2.6-4) experimental; urgency=medium * Upload to experimental. * Bump the epoch to 2:, as the upload to unstable had to bump epoch. -- Julian Andres Klode <email address hidden> Thu, 18 Jan 2018 19:47:17 +0100
Upload details
- Uploaded by:
- Julian Andres Klode
- Uploaded to:
- Bionic
- Original maintainer:
- Ubuntu Developers
- Architectures:
- linux-any kfreebsd-any
- Section:
- net
- Urgency:
- Medium Urgency
See full publishing history Publishing
Series | Published | Component | Section |
---|
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
wpa_2.6.orig.tar.xz | 1.9 MiB | 4492629ea15c9b571ac5e41679dca6703a25b637828272a0e72f3349dd1b4eac |
wpa_2.6-15ubuntu1.debian.tar.xz | 102.8 KiB | d6059b280c5e858b1c5f12fd25d1ee82908d79408ba9230695fc008b59397019 |
wpa_2.6-15ubuntu1.dsc | 2.5 KiB | 3e497b619471464face4fe983fbc149fe838194ee957512630859d8be2b7f0d5 |
Available diffs
- diff from 2:2.4-1.1ubuntu1 to 2:2.6-15ubuntu1 (805.1 KiB)
Binary packages built by this source
- hostapd: IEEE 802.11 AP and IEEE 802.1X/WPA/WPA2/EAP Authenticator
Originally, hostapd was an optional user space component for Host AP
driver. It adds more features to the basic IEEE 802.11 management
included in the kernel driver: using external RADIUS authentication
server for MAC address based access control, IEEE 802.1X Authenticator
and dynamic WEP keying, RADIUS accounting, WPA/WPA2 (IEEE 802.11i/RSN)
Authenticator and dynamic TKIP/CCMP keying.
.
The current version includes support for other drivers, an integrated
EAP authenticator (i.e., allow full authentication without requiring
an external RADIUS authentication server), and RADIUS authentication
server for EAP authentication.
.
hostapd works with the following drivers:
.
* mac80211 based drivers with support for master mode [linux]
* Host AP driver for Prism2/2.5/3 [linux]
* Driver interface for FreeBSD net80211 layer [kfreebsd]
* Any wired Ethernet driver for wired IEEE 802.1X authentication.
- hostapd-dbgsym: debug symbols for hostapd
- wpagui: graphical user interface for wpa_supplicant
wpagui provides a Qt interface for choosing which configured network
to connect to. It also provides a method for browsing 802.11 SSID scan
results, an event history log of messages generated by wpa_supplicant,
and a method to add or edit wpa_supplicant networks.
- wpagui-dbgsym: debug symbols for wpagui
- wpasupplicant: client support for WPA and WPA2 (IEEE 802.11i)
WPA and WPA2 are methods for securing wireless networks, the former
using IEEE 802.1X, and the latter using IEEE 802.11i. This software
provides key negotiation with the WPA Authenticator, and controls
association with IEEE 802.11i networks.
- wpasupplicant-dbgsym: debug symbols for wpasupplicant
- wpasupplicant-udeb: Client support for WPA and WPA2 (IEEE 802.11i)
WPA and WPA2 are methods for securing wireless networks, the former
using IEEE 802.1X, and the latter using IEEE 802.11i. This software
provides key negotiation with the WPA Authenticator, and controls
association with IEEE 802.11i networks.
.
This is a udeb of wpasupplicant for use by the debian-installer.