aboutsummaryrefslogtreecommitdiffstats
path: root/hostapd/hostapd.conf
Commit message (Collapse)AuthorAgeFilesLines
* hostapd: Initial IEEE 802.11ac (VHT) definitionsMahesh Palivela2012-06-301-0/+131
| | | | | | Add IEEE 802.11ac definitions for config, IEEE structures, constants. Signed-hostap: Mahesh Palivela <maheshp@posedge.com>
* WPS: Document NFC use cases with password/config tokenJouni Malinen2012-06-281-0/+12
| | | | Signed-hostap: Jouni Malinen <j@w1.fi>
* RADIUS DAS: Validate Event-TimestampJouni Malinen2012-06-171-0/+6
| | | | | | | | | | DAS will now validate Event-Timestamp value to be within an acceptable time window (300 seconds by default; can be set using radius_das_time_window parameter). In addition, Event-Timestamp can be required in Disconnect-Request and CoA-Request messages with radius_das_require_event_timestamp=1. Signed-hostap: Jouni Malinen <j@w1.fi>
* Add preliminary RADIUS dynamic authorization server (RFC 5176)Jouni Malinen2012-05-061-0/+13
| | | | | | | | | | This adds the basic DAS mechanism to enable hostapd to be configured to request dynamic authorization requests (Disconnect-Request and CoA-Request). This commit does not add actual processing of the requests, i.e., this will only receive and authenticate the requests and NAK them regardless of what operation is requested. Signed-hostap: Jouni Malinen <j@w1.fi>
* hostapd: Allow addition of arbitrary RADIUS attributesJouni Malinen2012-05-051-0/+30
| | | | | | | | New configuration parameters radius_auth_req_attr and radius_acct_req_attr can now be used to add (or override) RADIUS attributes in Access-Request and Accounting-Request packets. Signed-hostap: Jouni Malinen <j@w1.fi>
* hostapd: Add optional Chargeable-User-Identity request (RFC 4372)Jouni Malinen2012-05-051-0/+6
| | | | | | | | radius_request_cui=1 configuration parameter can now be used to configure hostapd to request CUI from the RADIUS server by including Chargeable-User-Identity attribute into Access-Request packets. Signed-hostap: Jouni Malinen <j@w1.fi>
* GAS server: Add support for ANQP Venue Name elementJouni Malinen2012-02-261-0/+9
| | | | | | | The new venue_name configuration parameter can now be used to configure the ANQP Venue Name values that stations can request through GAS. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
* hostapd: Make inactivity polling configurableYogesh Ashok Powar2011-12-251-0/+6
| | | | | | | | | | | | | | | hostapd uses the poll method to check if the station is alive after the station has been inactive for ap_max_inactivity seconds. Make the poll mechanism configurable so that user can choose to disconnect idle clients. This can be especially useful when some devices/firmwares have restrictions on the number of clients that can connect to the AP and that limit is smaller than the total number of stations trying to use the AP. Signed-off-by: Yogesh Ashok Powar <yogeshp@marvell.com> Signed-off-by: Nishant Sarmukadam <nishants@marvell.com>
* Allow WPA passphrase to be fetched with RADIUS Tunnel-Password attributeMichael Braun2011-12-111-0/+10
| | | | | | | | | | | | This allows per-device PSK to be configured for WPA-Personal using a RADIUS authentication server. This uses RADIUS-based MAC address ACL (macaddr_acl=2), i.e., Access-Request uses the MAC address of the station as the User-Name and User-Password. The WPA passphrase is returned in Tunnel-Password attribute in Access-Accept. This functionality can be enabled with the new hostapd.conf parameter, wpa_psk_radius. Signed-hostap: Michael Braun <michael-dev@fami-braun.de>
* WPS: Allow RF Bands value to be overriddenBharat Chakravarty2011-11-301-0/+6
| | | | | | | | A new hostapd.conf parameter, wps_rf_bands, can now be used to fix the RF Bands value in cases where hw_mode is not set or when operating a dual band dual concurrent AP. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
* EAP-pwd: Document group configuration for hostapd authentication serverDan Harkins2011-11-191-0/+4
|
* Add support for Time AdvertisementJouni Malinen2011-10-181-0/+11
| | | | | This adds preliminary support for IEEE 802.11v Time Advertisement mechanism with UTC TSF offset.
* Interworking: Add support for configuring Roaming Consortium ListJouni Malinen2011-10-171-0/+9
|
* IEEE 802.11u: Add configuration and advertisement for InterworkingJouni Malinen2011-10-161-0/+49
|
* Fix typos found by codespellPavel Roskin2011-09-221-1/+1
| | | | Signed-off-by: Pavel Roskin <proski@gnu.org>
* Change example hostapd.conf to use 2.4 GHz channelJouni Malinen2011-07-311-2/+2
| | | | | This is more likely to work if someone tests the example file with no or minimal changes.
* madwifi: Implement set_freq for hostapd, adjust hostapd.confPavel Roskin2011-07-291-3/+2
| | | | Signed-off-by: Pavel Roskin <proski@gnu.org>
* Allow PMKSA caching to be disabled on AuthenticatorJouni Malinen2011-07-051-0/+7
| | | | | | | A new hostapd configuration parameter, disable_pmksa_caching=1, can now be used to disable PMKSA caching on the Authenticator. This forces the stations to complete EAP authentication on every association when WPA2 is being used.
* WPS: Add a workaround for Windows 7 capability discovery for PBCJouni Malinen2011-05-171-0/+12
| | | | | | | | | | | | Windows 7 uses incorrect way of figuring out AP's WPS capabilities by acting as a Registrar and using M1 from the AP. The config methods attribute in that message is supposed to indicate only the configuration method supported by the AP in Enrollee role, i.e., to add an external Registrar. For that case, PBC shall not be used and as such, the PushButton config method is removed from M1 by default. If pbc_in_m1=1 is included in the configuration file, the PushButton config method is left in M1 (if included in config_methods parameter) to allow Windows 7 to use PBC instead of PIN (e.g., from a label in the AP).
* hostapd: Add require_ht configuration parameterJouni Malinen2011-02-091-0/+3
| | | | | This can be used to configure hostapd to reject association with any station that does not support HT PHY.
* AP: Enable WMM with default parameters by default for HTJohannes Berg2011-02-011-1/+0
| | | | | | | | If WMM is not disabled explicitly (wmm_enabled=0 in hostapd.conf), enable WMM automatically whenever HT (ieee80211n) is enabled. Use the default WMM parameters for AP TX queues and the EDCA parameters advertised for stations in WMM IE if no overriding values are included in the configuration.
* hostapd: Allow TDLS use to be prohibited in the BSSJouni Malinen2011-01-281-0/+8
| | | | | | tdls_prohibit=1 and tdls_prohibit_chan_switch=1 and now be used to disable use of TDLS or TDLS channel switching in the BSS using extended cabilities IE as defined in IEEE 802.11z.
* Allow AP mode to disconnect STAs based on low ACK conditionJohannes Berg2010-12-281-0/+5
| | | | | | | | | | | The nl80211 driver can report low ACK condition (in fact it reports complete loss right now only). Use that, along with a config option, to disconnect stations when the data connection is not working properly, e.g., due to the STA having went outside the range of the AP. This is disabled by default and can be enabled with disassoc_low_ack=1 in hostapd or wpa_supplicant configuration file. Signed-off-by: Johannes Berg <johannes.berg@intel.com>
* Allow client isolation to be configured (ap_isolate=1)Felix Fietkau2010-11-091-0/+4
| | | | | | Client isolation can be used to prevent low-level bridging of frames between associated stations in the BSS. By default, this bridging is allowed.
* Add bridge handling for WDS STA interfacesFelix Fietkau2010-11-091-0/+5
| | | | | By default, add them to the configured bridge of the AP interface (if present), but allow the user to specify a separate bridge.
* Remove unused TX queue parameters related to Beacon framesJouni Malinen2010-11-051-12/+0
| | | | | | | These are not used by any driver wrapper, i.e., only the four data queues (BK, BE, VI, VO) are configurable. Better remove these so that there is no confusion about being able to configure something additional.
* P2P: Add forgotten allow_cross_connection exampleJouni Malinen2010-09-091-0/+3
|
* P2P: Add preliminary P2P Manager AP support for hostapdJouni Malinen2010-09-091-0/+5
|
* WPS 2.0: Add virtual/physical display and pushbutton config methodsJouni Malinen2010-09-091-2/+3
|
* WPS: Add support for dynamic AP PIN managementJouni Malinen2010-08-241-2/+6
| | | | | | | | | A new hostapd_cli command, wps_ap_pin, can now be used to manage AP PIN at runtime. This can be used to generate a random AP PIN and to only enable the AP PIN for short period (e.g., based on user action on the AP device). Use of random AP PIN that is only enabled for short duration is highly recommended to avoid security issues with a static AP PIN.
* EAP server: Add support for configuring fragment sizeJouni Malinen2010-07-201-0/+3
|
* Allow advertising of U-APSD functionality in BeaconYogesh Ashok Powar2010-04-111-0/+4
| | | | | | | | hostapd does not implement UAPSD functionality. However, if U-APSD functionality is implemented outside hostapd, add support to advertise the functionality in beacon. Signed-off-by: yogeshp@marvell.com
* Fix a typo in r1kh config parameter descriptionJouni Malinen2010-03-071-1/+1
| | | | The second item on the line is R1KH-ID, not R0KH-ID.
* hostapd: Detect bridge interface automaticallyJouni Malinen2010-01-161-3/+11
| | | | | | | | | | | This makes the bridge parameter unnecessary for cases where the interface is already in a bridge and sysfs is mounted to /sys so that the detection code works. For nl80211, the bridge parameter can be used to request the AP interface to be added to the bridge automatically (brctl may refuse to do this before hostapd has been started to change the interface mode). If needed, the bridge interface is also created.
* hostapd: Add WDS (4-address frame) mode with per-station interfacesFelix Fietkau2009-12-241-0/+6
| | | | | | This mode allows associated stations to use 4-address frames to allow layer 2 bridging to be used. At least for the time being, this is only supported with driver=nl80211.
* WPS: Make Config Methods configurable for wpa_supplicantJouni Malinen2009-12-211-0/+2
| | | | | | | | This adds config_methods configuration option for wpa_supplicant following the design used in hostapd. In addition, the string is now parsed in common code from src/wps/wps_common.c and the list of configurable methods include all the defined methods from WPS 1.0h spec.
* Remove obsolete Prism54.org driver support (driver_prism54.c)Jouni Malinen2009-12-121-1/+1
| | | | | | | | | | | | | | | | | The Prism54.org project seems have been dead for a while and it does not look like this driver would ever be maintained again. Furthermore, it is difficult to find a version that would work with the driver_prism54.c wrapper and there is another driver for these card in the Linux kernel tree. The hostapd integration in driver_prism54.c is quite different from the other driver wrappers and would require major effort to get it cleaned up. Since there does not seem to be any real users for the cleaned up version, there does not seem to be justification to spend this effort on the wrapper. This old code is making it much more difficult to clean up the driver interface and at this point, the best option seems to be to remove the driver wrappers. Should someone really still need this, the old code will continue to be available in hostapd 0.6.x.
* hostapd: Remove unused bridge_packets configuration optionJouni Malinen2009-12-091-24/+0
| | | | | | There was code for configuring this, but no driver wrapper actually implements the actual setting. Remove this for now to reduce potential confusion and to simply the driver interface.
* Add more Doxygen documentation for RADIUS server implementationJouni Malinen2009-12-021-2/+2
|
* hostapd: Remove unused passive scan functionalityJouni Malinen2009-04-171-20/+4
| | | | | | | This was not really supported by any of the included driver wrappers. If this functionality is desired in the future, this (or something similar) can be added with the changes needed into a driver wrapper to use the mechanism.
* Allow more complex BSSID masks to be used for multi-BSSIDJouni Malinen2009-03-121-1/+4
| | | | | | | If every secondary BSS is configured with a pre-set BSSID, hostapd does not enforce the BSSID mask requirements anymore, i.e., they are used only if hostapd is responsible for generating MAC addresses for virtual interfaces.
* Fix UP-to-AC mapping for prio 3 (EE) to be AC_BE, not AC_VIJouni Malinen2009-03-051-2/+2
|
* WMM cleanup (WME -> WMM rename, comments, etc.)Jouni Malinen2009-03-041-21/+22
| | | | | | | This updates the terminogy to match with the final WMM specification. In addition, some of the WMM TSPEC structure fields were in incorrect order and used without byte order swapping. Those are also taken care of this cleanup patch.
* 802.11n: scan for overlapping BSSes before starting 20/40 MHz channelJouni Malinen2009-02-041-0/+4
| | | | | | | | | Try to match PRI/SEC channel with neighboring 20/40 MHz BSSes per IEEE 802.11n/D7.0 11.14.3.2. This is not yet complete implementation, but at least some parts of the 40 MHz coex are improved. 40 MHz operation maybe rejected (i.e., fall back to using 20 MHz) or pri/sec channels may be switched if needed.
* Do not use country_code default (was: US)Jouni Malinen2009-01-301-3/+2
| | | | | If country_code is not included in hostapd.conf, refuse to enable IEEE 802.11d and do not try to set the regulatory domain in kernel.
* WPS: Add support for external Registrars using UPnP transportJouni Malinen2009-01-291-0/+22
| | | | | | | | | | | | | This adds mostly feature complete external Registrar support with the main missing part being proper support for multiple external Registrars working at the same time and processing of concurrent registrations when using an external Registrar. This code is based on Sony/Saice implementation (https://www.saice-wpsnfc.bz/) and the changes made by Ted Merrill (Atheros) to make it more suitable for hostapd design and embedded systems. Some of the UPnP code is based on Intel's libupnp. Copyrights and licensing are explained in src/wps/wps_upnp.c in more detail.
* WPS: Lock AP Setup on multiple AP PIN validation failuresJouni Malinen2009-01-231-0/+5
| | | | | | If a Registrar tries to configure the AP, but fails to validate the device password (AP PIN), lock the AP setup after four failures. This protects the AP PIN against brute force guessing attacks.
* Added ap_settings option for overriding WPS AP Settings in M7Jouni Malinen2009-01-231-0/+7
| | | | | | This optional configuration parameter can be used to override AP Settings attributes in M7 similarly to extra_cred option for Credential attribute(s) in M8.
* WPS: Added option to disable AP auto-config on first registrationJouni Malinen2009-01-211-0/+2
| | | | | | | | | This operation can now be moved into an external program by configuring hostapd with wps_cred_processing=1 and skip_cred_build=1. A new ctrl_iface message (WPS-REG-SUCCESS <Enrollee MAC addr> <UUID-E>) will be used to notify external programs of each successful registration and that can be used as a tricker to move from unconfigured to configured state.
* Added wps_cred_processing configuration option for hostapdJouni Malinen2009-01-211-0/+8
| | | | | | | This behaves like the one in wpa_supplicant, i.e., hostapd can be configured not to process new credentials (AP settings) internally and instead pass the WPS attributes for an external program to process over ctrl_iface.