hostapd: make wnm_sleep_mode_no_keys configurable
authorTimo Sigurdsson <public_timo.s@silentcreek.de>
Tue, 15 Jun 2021 21:09:41 +0000 (23:09 +0200)
committerPaul Spooren <mail@aparcar.org>
Tue, 6 Jul 2021 00:04:09 +0000 (14:04 -1000)
commit3eb34bc2516b0f3e51f5710ab537d13c427ecbb0
tree3a4549a830117a855327ac7492b9e6be912dee8e
parent89d21b7f6299b8c3746c1af8671b0dba19f63598
hostapd: make wnm_sleep_mode_no_keys configurable

In the aftermath of the KRACK attacks, hostapd gained an AP-side workaround
against WNM-Sleep Mode GTK/IGTK reinstallation attacks. WNM Sleep Mode is not
enabled by default on OpenWrt, but it is configurable through the option
wnm_sleep_mode. Thus, make the AP-side workaround configurable as well by
exposing the option wnm_sleep_mode_no_keys. If you use the option
wpa_disable_eapol_key_retries and have wnm_sleep_mode enabled, you might
consider using this workaround.

Signed-off-by: Timo Sigurdsson <public_timo.s@silentcreek.de>
[bump PKG_RELEASE]
Signed-off-by: Paul Spooren <mail@aparcar.org>
(cherry picked from commit bf98faaac8ed24cf7d3d93dd4fcd7304d109363b)
package/network/services/hostapd/Makefile
package/network/services/hostapd/files/hostapd.sh