mirror of
https://github.com/vanhoefm/fragattacks.git
synced 2024-12-02 20:28:24 -05:00
Remove some obsolete information from hostapd README file
Number of the URLs were not valid anymore and some of the notes have been obsolete for years. Signed-off-by: Jouni Malinen <j@w1.fi>
This commit is contained in:
parent
b0fc2ef3a3
commit
2bdbace634
@ -70,7 +70,7 @@ Requirements
|
|||||||
Current hardware/software requirements:
|
Current hardware/software requirements:
|
||||||
- drivers:
|
- drivers:
|
||||||
Host AP driver for Prism2/2.5/3.
|
Host AP driver for Prism2/2.5/3.
|
||||||
(http://hostap.epitest.fi/)
|
(http://w1.fi/hostap-driver.html)
|
||||||
Please note that station firmware version needs to be 1.7.0 or newer
|
Please note that station firmware version needs to be 1.7.0 or newer
|
||||||
to work in WPA mode.
|
to work in WPA mode.
|
||||||
|
|
||||||
@ -81,8 +81,7 @@ Current hardware/software requirements:
|
|||||||
Any wired Ethernet driver for wired IEEE 802.1X authentication
|
Any wired Ethernet driver for wired IEEE 802.1X authentication
|
||||||
(experimental code)
|
(experimental code)
|
||||||
|
|
||||||
FreeBSD -current (with some kernel mods that have not yet been
|
FreeBSD -current
|
||||||
committed when hostapd v0.3.0 was released)
|
|
||||||
BSD net80211 layer (e.g., Atheros driver)
|
BSD net80211 layer (e.g., Atheros driver)
|
||||||
|
|
||||||
|
|
||||||
@ -186,23 +185,13 @@ Authenticator and RADIUS encapsulation between the Authenticator and
|
|||||||
the Authentication Server. Other than this, the functionality is similar
|
the Authentication Server. Other than this, the functionality is similar
|
||||||
to the case with the co-located Authentication Server.
|
to the case with the co-located Authentication Server.
|
||||||
|
|
||||||
Authentication Server and Supplicant
|
Authentication Server
|
||||||
------------------------------------
|
---------------------
|
||||||
|
|
||||||
Any RADIUS server supporting EAP should be usable as an IEEE 802.1X
|
Any RADIUS server supporting EAP should be usable as an IEEE 802.1X
|
||||||
Authentication Server with hostapd Authenticator. FreeRADIUS
|
Authentication Server with hostapd Authenticator. FreeRADIUS
|
||||||
(http://www.freeradius.org/) has been successfully tested with hostapd
|
(http://www.freeradius.org/) has been successfully tested with hostapd
|
||||||
Authenticator and both Xsupplicant (http://www.open1x.org) and Windows
|
Authenticator.
|
||||||
XP Supplicants. EAP/TLS was used with Xsupplicant and
|
|
||||||
EAP/MD5-Challenge with Windows XP.
|
|
||||||
|
|
||||||
http://www.missl.cs.umd.edu/wireless/eaptls/ has useful information
|
|
||||||
about using EAP/TLS with FreeRADIUS and Xsupplicant (just replace
|
|
||||||
Cisco access point with Host AP driver, hostapd daemon, and a Prism2
|
|
||||||
card ;-). http://www.freeradius.org/doc/EAP-MD5.html has information
|
|
||||||
about using EAP/MD5 with FreeRADIUS, including instructions for WinXP
|
|
||||||
configuration. http://www.denobula.com/EAPTLS.pdf has a HOWTO on
|
|
||||||
EAP/TLS use with WinXP Supplicant.
|
|
||||||
|
|
||||||
Automatic WEP key configuration
|
Automatic WEP key configuration
|
||||||
-------------------------------
|
-------------------------------
|
||||||
@ -243,16 +232,15 @@ networks that require some kind of security. Task group I (Security)
|
|||||||
of IEEE 802.11 working group (http://www.ieee802.org/11/) has worked
|
of IEEE 802.11 working group (http://www.ieee802.org/11/) has worked
|
||||||
to address the flaws of the base standard and has in practice
|
to address the flaws of the base standard and has in practice
|
||||||
completed its work in May 2004. The IEEE 802.11i amendment to the IEEE
|
completed its work in May 2004. The IEEE 802.11i amendment to the IEEE
|
||||||
802.11 standard was approved in June 2004 and this amendment is likely
|
802.11 standard was approved in June 2004 and this amendment was
|
||||||
to be published in July 2004.
|
published in July 2004.
|
||||||
|
|
||||||
Wi-Fi Alliance (http://www.wi-fi.org/) used a draft version of the
|
Wi-Fi Alliance (http://www.wi-fi.org/) used a draft version of the
|
||||||
IEEE 802.11i work (draft 3.0) to define a subset of the security
|
IEEE 802.11i work (draft 3.0) to define a subset of the security
|
||||||
enhancements that can be implemented with existing wlan hardware. This
|
enhancements that can be implemented with existing wlan hardware. This
|
||||||
is called Wi-Fi Protected Access<TM> (WPA). This has now become a
|
is called Wi-Fi Protected Access<TM> (WPA). This has now become a
|
||||||
mandatory component of interoperability testing and certification done
|
mandatory component of interoperability testing and certification done
|
||||||
by Wi-Fi Alliance. Wi-Fi provides information about WPA at its web
|
by Wi-Fi Alliance.
|
||||||
site (http://www.wi-fi.org/OpenSection/protected_access.asp).
|
|
||||||
|
|
||||||
IEEE 802.11 standard defined wired equivalent privacy (WEP) algorithm
|
IEEE 802.11 standard defined wired equivalent privacy (WEP) algorithm
|
||||||
for protecting wireless networks. WEP uses RC4 with 40-bit keys,
|
for protecting wireless networks. WEP uses RC4 with 40-bit keys,
|
||||||
|
Loading…
Reference in New Issue
Block a user