FreshPorts -- The Place For Ports If you buy from Amazon USA, please support us by using this link.
Follow us
Blog
Twitter

We also have a status page: https://freshports.wordpress.com/

Port details
hostapd IEEE 802.11 AP, IEEE 802.1X/WPA/WPA2/EAP/RADIUS Authenticator
2.6_1 net on this many watch lists=1 search for ports that depend on this port An older version of this port was marked as vulnerable. Find issues related to this port Report an issue related to this port
Maintainer: leres@FreeBSD.org search for ports maintained by this maintainer
Port Added: 12 Feb 2011 04:53:00
License: BSD3CLAUSE
hostapd is a user space daemon for access point and authentication
servers. It implements IEEE 802.11 access point management, IEEE
802.1X/WPA/WPA2/EAP Authenticators, RADIUS client, EAP server, and
RADIUS authentication server. The current version supports Linux
(Host AP, madwifi, mac80211-based drivers) and FreeBSD (net80211).

To use the ports version instead of the base, add:

    hostapd_program="/usr/local/sbin/hostapd"

to /etc/rc.conf

WWW: https://w1.fi/hostapd/
SVNWeb : Homepage : PortsMon
    Pseudo-pkg-plist information, but much better, from make generate-plist
    Expand this list (7 items)
  1. sbin/hostapd
  2. sbin/hostapd_cli
  3. man/man1/hostapd_cli.1.gz
  4. man/man8/hostapd.8.gz
  5. /usr/local/share/licenses/hostapd-2.6_1/catalog.mk
  6. /usr/local/share/licenses/hostapd-2.6_1/LICENSE
  7. /usr/local/share/licenses/hostapd-2.6_1/BSD3CLAUSE
  8. Collapse this list.

To install the port: cd /usr/ports/net/hostapd/ && make install clean
To add the package: pkg install hostapd

PKGNAME: hostapd

distinfo:

TIMESTAMP = 1508200169
SHA256 (hostapd-2.6.tar.gz) = 01526b90c1d23bec4b0f052039cc4456c2fd19347b4d830d1d58a0a6aea7117d
SIZE (hostapd-2.6.tar.gz) = 1822341
SHA256 (rebased-v2.6-0001-hostapd-Avoid-key-reinstallation-in-FT-handshake.patch) = 529113cc81256c6178f3c1cf25dd8d3f33e6d770e4a180bd31c6ab7e4917f40b
SIZE (rebased-v2.6-0001-hostapd-Avoid-key-reinstallation-in-FT-handshake.patch) = 6218
SHA256 (rebased-v2.6-0002-Prevent-reinstallation-of-an-already-in-use-group-ke.patch) = d86d47ab74170f3648b45b91bce780949ca92b09ab43df065178850ec0c335d7
SIZE (rebased-v2.6-0002-Prevent-reinstallation-of-an-already-in-use-group-ke.patch) = 7883
SHA256 (rebased-v2.6-0003-Extend-protection-of-GTK-IGTK-reinstallation-of-WNM-.patch) = d4535e36739a0cc7f3585e6bcba3c0bb8fc67cb3e729844e448c5dc751f47e81
SIZE (rebased-v2.6-0003-Extend-protection-of-GTK-IGTK-reinstallation-of-WNM-.patch) = 6861
SHA256 (rebased-v2.6-0004-Prevent-installation-of-an-all-zero-TK.patch) = 793a54748161b5af430dd9de4a1988d19cb8e85ab29bc2340f886b0297cee20b
SIZE (rebased-v2.6-0004-Prevent-installation-of-an-all-zero-TK.patch) = 2566
SHA256 (rebased-v2.6-0005-Fix-PTK-rekeying-to-generate-a-new-ANonce.patch) = 147c8abe07606905d16404fb2d2c8849796ca7c85ed8673c09bb50038bcdeb9e
SIZE (rebased-v2.6-0005-Fix-PTK-rekeying-to-generate-a-new-ANonce.patch) = 1949
SHA256 (rebased-v2.6-0006-TDLS-Reject-TPK-TK-reconfiguration.patch) = 596d4d3b63ea859ed7ea9791b3a21cb11b6173b04c0a14a2afa47edf1666afa6
SIZE (rebased-v2.6-0006-TDLS-Reject-TPK-TK-reconfiguration.patch) = 4309
SHA256 (rebased-v2.6-0008-FT-Do-not-allow-multiple-Reassociation-Response-fram.patch) = c8840d857b9432f3b488113c85c1ff5d4a4b8d81078b7033388dae1e990843b1
SIZE (rebased-v2.6-0008-FT-Do-not-allow-multiple-Reassociation-Response-fram.patch) = 2750


NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.

Build dependencies:
  1. gmake : devel/gmake
There are no ports dependent upon this port

Configuration Options
     No options to configure

USES:
cpe gmake ssl

Master Sites:
  1. https://w1.fi/releases/

Number of commits found: 31

Commit History - (may be incomplete: see SVNWeb link above for full details)
DateByDescription
21 Oct 2017 00:45:50
Original commit files touched by this commit  2.6_1
Revision:452566
leres search for other commits by this committer
Update pkg-descr and Makefile in my ports to use https where possible.
Remove obsolete mirrors.

 - devel/arduino
 - devel/arduino-irremote
 - net/hostapd
 - security/broccoli
 - sysutils/lbl-cf
 - sysutils/lbl-hf
 - www/mini_httpd

Reviewed by:	ler (mentor), matthew (mentor)
Approved by:	ler (mentor), matthew (mentor)
Differential Revision:	https://reviews.freebsd.org/D12748
17 Oct 2017 01:30:47
Original commit files touched by this commit  2.6_1
Revision:452257
cy search for other commits by this committer
Add patch set 2017-1.

A vulnerability was found in how a number of implementations can be
triggered to reconfigure WPA/WPA2/RSN keys (TK, GTK, or IGTK) by
replaying a specific frame that is used to manage the keys. Such
reinstallation of the encryption key can result in two different types
of vulnerabilities: disabling replay protection and significantly
reducing the security of encryption to the point of allowing frames to
be decrypted or some parts of the keys to be determined by an attacker
depending on which cipher is used.

Approved by:	leres (maintainer)
Security:	https://w1.fi/security/2017-1/ \
		wpa-packet-number-reuse-with-replayed-messages.txt
Security:	https://www.krackattacks.com/
MFH:		2017Q4
Differential Revision:	D12691
17 Oct 2017 01:30:44
Original commit files touched by this commit  2.6
Revision:452256 This port version is marked as vulnerable.
cy search for other commits by this committer
Use https site.

Approved by:	leres (maintainer)
MFH:		2017Q4
Differential Revision:	D12691 (part of)
15 Sep 2017 18:18:26
Original commit files touched by this commit  2.6
Revision:449916 This port version is marked as vulnerable.
leres search for other commits by this committer
Update MAINTAINER on my ports and "Created by" on the ones I created
to use my @FreeBSD.org email address.

 - devel/arduino
 - devel/arduino-glcd
 - devel/arduino-irremote
 - devel/arduino-mk
 - devel/arduino-sevseg
 - net/hostapd
 - net/py-pcap
 - security/bro
 - security/broccoli
 - security/create-cert
 - sysutils/lbl-cf
 - sysutils/lbl-hf
 - www/mini_httpd

Reviewed by:	ler (mentor)
Approved by:	ler (mentor)
Differential Revision:	https://reviews.freebsd.org/D12374
07 May 2017 22:18:43
Original commit files touched by this commit  2.6
Revision:440391 This port version is marked as vulnerable.
ler search for other commits by this committer
net/hostapd fails to compile with libressl

Not bumping PORTREVISION as default options are NOT libressl

PR:		218802
Submitted by:	w.schwarzenfeld@utanet.at
Approved by:	adamw (mentor, implicit), leres@ee.lbl.gov (maintainer)
29 Mar 2017 01:49:02
Original commit files touched by this commit  2.6
Revision:437179 This port version is marked as vulnerable.
cy search for other commits by this committer
Fix build broken by r436625.

PR:		218036
21 Mar 2017 17:50:36
Original commit files touched by this commit  2.6
Revision:436625 This port version is marked as vulnerable.
krion search for other commits by this committer
Update net/hostapd to 2.6 and fix multiple vulnerabilities

PR:		217907
Submitted by:	maintainer
Approved by:	mat (mentor)
Differential Revision: https://reviews.freebsd.org/D10051
30 Sep 2016 20:14:33
Original commit files touched by this commit  2.5
Revision:423019 This port version is marked as vulnerable.
marino search for other commits by this committer
net/hostapd: Update os_unix.h to follow os_unix.c change

For completeness, make update os_unix.h patch to match the previous
commit to os_unix.c (no impact for FreeBSD)
30 Sep 2016 17:29:08
Original commit files touched by this commit  2.5
Revision:423004 This port version is marked as vulnerable.
marino search for other commits by this committer
net/hostapd: Fix build on DragonFly and with LibreSSL

1. Return the driver_bsd.c patch, it's still required for DF
2. Modify the os_unix.c patch to include exception for DF
3. Add patch to fix build with LibreSSL (originates from OpenBSD)
4. There's no configure set, so replace ineffective configure arg
   with CFLAGS and LDFLAGS for non-base SSL library

Approved by:	SSL blanket and DF blanket
23 Sep 2016 18:20:11
Original commit files touched by this commit  2.5
Revision:422688 This port version is marked as vulnerable.
madpilot search for other commits by this committer
Update to 2.5

PR:		212779
Submitted by:	leres at ee.lbl.gov (maintainer)
13 Sep 2016 05:01:26
Original commit files touched by this commit  2.4_2
Revision:421977 This port version is marked as vulnerable.
marino search for other commits by this committer
net/hostapd: Remove PORTS_SSL option and use SSL_DEFAULT

The port is now configured depending on the SSL base specified by the
SSL_DEFAULT variable.  Before it would break by default if SSL_DEFAULT
was set to non-base.  This changes puts hostapd in line with the rest
of the ports tree.

Approved by:	SSL blanket
16 Jun 2016 13:23:13
Original commit files touched by this commit  2.4_1
Revision:416966 This port version is marked as vulnerable.
mat search for other commits by this committer
Fix usage of WITH_OPENSSL_BASE, WITH_OPENSSL_PORT and OPENSSL_PORT.

WITH_OPENSSL_* can't be set after bsd.port.pre.mk.
Fold all other usage into using SSL_DEFAULT == foo

PR:		210149
Submitted by:	mat
Exp-run by:	antoine
Sponsored by:	The FreeBSD Foundation, Absolight
Differential Revision:	https://reviews.freebsd.org/D6577
06 Sep 2015 17:15:42
Original commit files touched by this commit  2.4_1
Revision:396228 This port version is marked as vulnerable.
danfe search for other commits by this committer
Remove BROKEN_* statements, the port builds fine everywhere.
02 Jun 2015 09:52:01
Original commit files touched by this commit  2.4_1
Revision:388314 This port version is marked as vulnerable.
marino search for other commits by this committer
net/hostapd: Address 3 latest security advisories

These are combined upstream patches 2015-2, 2015-3, 2015-4
They address the following security advisories:

  * CVE-2015-4141
  * CVE-2015-4142
  * CVE-2015-4143
  * CVE-2015-4144
  * CVE-2015-4145
  * CVE-2015-4146

These advisories also apply to security/wpa_supplicant

PR:		200567
Submitted by:	Jason Unovitch
Approved by:	maintainer (Craig Leres)
03 May 2015 15:12:06
Original commit files touched by this commit  2.4
Revision:385279 This port version is marked as vulnerable.
amdmi3 search for other commits by this committer
- Add CPE info

Approved by:	portmgr blanket
01 Apr 2015 18:57:32
Original commit files touched by this commit  2.4
Revision:382939 This port version is marked as vulnerable.
marino search for other commits by this committer
net/hostapd: Unbreak new version on DragonFly
29 Mar 2015 12:15:41
Original commit files touched by this commit  2.4
Revision:382595 This port version is marked as vulnerable.
marino search for other commits by this committer
net/hostapd: Upgrade version 2.3 => 2.4, add PORTS_SSL option

PR:		198889
Submitted by:	maintainer (leres - ee.lbl.gov)
15 Jan 2015 09:05:38
Original commit files touched by this commit  2.3_1
Revision:377064 This port version is marked as vulnerable.
tijl search for other commits by this committer
Add missing USE_OPENSSL=yes

PR:		195796
16 Oct 2014 07:19:53
Original commit files touched by this commit  2.3
Revision:370974 This port version is marked as vulnerable.
marino search for other commits by this committer
net/hostapd: Upgrade version 2.2 => 2.3

While upgrading to the latest version released last week:
  * Rebase .config file on latest sample versoin
  * Support non-default prefixes
  * Merge new contents of do-configure target into post-patch target

PR:		194315
Approved by:	maintainer: (Craig Leres)
12 Oct 2014 10:46:35
Original commit files touched by this commit  2.2
Revision:370693 This port version is marked as vulnerable.
marino search for other commits by this committer
net/hostapd: Update WWW + MASTER_SITES and support DragonFly

The domain for hostapd has changed from hostap.epitest.fi to w1.fi
although the former still redirects.  Update WWW and MASTER_SITES to
reflect the new name.

Regenerate the l2 packet patch so that hostapd also builds on DragonFly
(no-op for FreeBSD).

While here, rearrange makefile to remove need for <pre> and <post> and
use of $PORTNAME in $WRKSRC which would break if PORTNAME changes.
07 Jun 2014 05:26:52
Original commit files touched by this commit  2.2
Revision:356881 This port version is marked as vulnerable.
danilo search for other commits by this committer
- Update from 2.1 to 2.2 [1]
- Use just BSD3CLAUSE as LICENSE (according to README)

PR:		ports/190726
Submitted by:	leres@ee.lbl.gov [1]
04 Apr 2014 13:56:36
Original commit files touched by this commit  2.1
Revision:350124 This port version is marked as vulnerable.
bapt search for other commits by this committer
s/-script://
13 Mar 2014 10:06:42
Original commit files touched by this commit  2.1
Revision:348049 This port version is marked as vulnerable.
pawel search for other commits by this committer
Update to version 2.1

PR:		ports/187459
Submitted by:	maintainer
28 Feb 2014 08:42:58
Original commit files touched by this commit  2.0
Revision:346465 This port version is marked as vulnerable.
ehaupt search for other commits by this committer
Support staging
20 Sep 2013 22:10:25
Original commit files touched by this commit  2.0
Revision:327755 This port version is marked as vulnerable.
bapt search for other commits by this committer
Add NO_STAGE all over the place in preparation for the staging support (cat:
net)
14 Aug 2013 22:35:54
Original commit files touched by this commit  2.0
Revision:324744  Sanity Test Failure This port version is marked as vulnerable.
ak search for other commits by this committer
- Remove MAKE_JOBS_SAFE variable

Approved by:	portmgr (bdrewery)
02 Feb 2013 11:44:41
Original commit files touched by this commit  2.0
Revision:311422 This port version is marked as vulnerable.
pawel search for other commits by this committer
Update to version 2.0

PR:		ports/175438
Submitted by:	Craig Leres <leres@ee.lbl.gov> (maintainer)
18 Jun 2012 22:27:36
Original commit files touched by this commit  1.0
 This port version is marked as vulnerable.
jgh search for other commits by this committer
- Update to 1.0
- Use ports framework for build:
  - Bonus: Now honours CC/CFLAGS/LDFLAGS
- Remove DISTNAME override
- Update LICENSE (GPLv2 not GPLv1)
- Mark MAKE_JOBS_SAFE
- Patch Makefile to see $(CC) not "CC" when not verbose
- Pet portlint (LICENSE order)

- while here shift where arch is tested, and use MAN{1,8}PREFIX

PR:     ports/169154 (based on)
Submitted by:   koobs.freebsd@gmail.com
Approved by:    maintainer, leres@ee.lbl.gov
10 Nov 2011 05:38:32
Original commit files touched by this commit  0.7.3
 This port version is marked as vulnerable.
linimon search for other commits by this committer
Mark broken on powerpc as well as sparc64.  (In fact, on all the tier-2s.)

Hat:            portmgr
10 Aug 2011 09:13:47
Original commit files touched by this commit  0.7.3
 This port version is marked as vulnerable.
linimon search for other commits by this committer
Mark as broken on sparc64: does not compile.
12 Feb 2011 04:52:47
Original commit files touched by this commit  0.7.3
 This port version is marked as vulnerable.
miwi search for other commits by this committer
hostapd is a user space daemon for access point and authentication
servers. It implements IEEE 802.11 access point management, IEEE
802.1X/WPA/WPA2/EAP Authenticators, RADIUS client, EAP server, and
RADIUS authentication server. The current version supports Linux
(Host AP, madwifi, mac80211-based drivers) and FreeBSD (net80211).

WWW: http://hostap.epitest.fi/hostapd/

PR:             ports/154621
Submitted by:   leres at ee.lbl.gov

Number of commits found: 31

Login
User Login
Create account

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD

This site
What is FreshPorts?
About the authors
Issues
FAQ
How big is it?
The latest upgrade!
Privacy
Forums
Blog
Contact

Search
Enter Keywords:
 
more...

Latest Vulnerabilities
opensslNov 02
openssl-develNov 02
wordpressNov 01
php56Oct 30
php70Oct 30
php71Oct 30
wiresharkOct 30
chromiumOct 28
wgetOct 27
wgetOct 27
openoffice-4*Oct 26
openoffice-devel*Oct 26
gitlabOct 25
nodeOct 25
node4Oct 25

No vulnerabilities have been reported in the past 14 days

* - modified, not new

All vulnerabilities


Ports
Home
Categories
Deleted ports
Sanity Test Failures
Newsfeeds

Statistics
Graphs
NEW Graphs (Javascript)
Traffic

Calculated hourly:
Port count 31888
Broken 125
Deprecated 46
Ignore 361
Forbidden 0
Restricted 173
No CDROM 78
Vulnerable 48
Expired 11
Set to expire 38
Interactive 0
new 24 hours 11
new 48 hours92
new 7 days3240
new fortnight3280
new month3474

Servers and bandwidth provided by
New York Internet, SuperNews, and RootBSD
Valid HTML, CSS, and RSS.
Copyright © 2000-2017 Dan Langille. All rights reserved.