notbugAs an Amazon Associate I earn from qualifying purchases.
Want a good read? Try FreeBSD Mastery: Jails (IT Mastery Book 15)

Why was the website so slow for so long?

The cause of the slowdown was a change to the ZFS dataset. In conjunction with the database server, very little caching was being done. This combination resulted in increased disk I/O as the system churned through the database. Details in the blog post which outlines the various things which changed. Many graphs.

non port: net/hostapd/distinfo
SVNWeb

Number of commits found: 14

Thu, 22 Aug 2019
[ 03:33 cy ] Original commit   Revision:509577
509577 net/hostapd/Makefile
509577 net/hostapd/distinfo
Update 2.8 --> 2.9
Mon, 22 Apr 2019
[ 15:56 cy ] Original commit   Revision:499654
499654 net/hostapd/Makefile
499654 net/hostapd/distinfo
499654 security/wpa_supplicant/Makefile
499654 security/wpa_supplicant/distinfo
Update wpa_supplicant/hostapd 2.7 --> 2.8
Thu, 6 Dec 2018
[ 20:11 cy ] Original commit   Revision:486778
486778 net/hostapd/Makefile
486778 net/hostapd/distinfo
486778 net/hostapd/files/patch-crypto__openssl.c
486778 net/hostapd/files/patch-src_common_dhcp.h
486778 net/hostapd/files/patch-src_crypto_tls__openssl.c
Update 2.6 --> 2.7
Fri, 17 Aug 2018
[ 02:12 cy ] Original commit   Revision:477403
477403 net/hostapd/Makefile
477403 net/hostapd/distinfo
Chase net/wpa_supplicant r477202 and base contrib/wpa r337819.

WPA: Ignore unauthenticated encrypted EAPOL-Key data

Though hostapd is technically not vulnerable, the mitigation for
CVE-2018-14526 does apply cleanly, therefore it is applied to maintain
consistency with net/wpa_supplicant and wpa in base.

Approved by:	leres@
MFH:		2018Q3
Differential Revision:	https://reviews.freebsd.org/D16718
Tue, 17 Oct 2017
[ 01:30 cy ] Original commit   Revision:452257
452257 net/hostapd/Makefile
452257 net/hostapd/distinfo
Add patch set 2017-1.

A vulnerability was found in how a number of implementations can be
triggered to reconfigure WPA/WPA2/RSN keys (TK, GTK, or IGTK) by
replaying a specific frame that is used to manage the keys. Such
reinstallation of the encryption key can result in two different types
of vulnerabilities: disabling replay protection and significantly
reducing the security of encryption to the point of allowing frames to
be decrypted or some parts of the keys to be determined by an attacker
depending on which cipher is used.

Approved by:	leres (maintainer)
Security:	https://w1.fi/security/2017-1/ \
		wpa-packet-number-reuse-with-replayed-messages.txt
Security:	https://www.krackattacks.com/
MFH:		2017Q4
Differential Revision:	D12691
Tue, 21 Mar 2017
[ 17:50 krion ] Original commit   Revision:436625
436625 net/hostapd/Makefile
436625 net/hostapd/distinfo
436625 net/hostapd/files/patch-src-l2_packet-l2_packet_freebsd.c
436625 net/hostapd/files/patch-src_crypto_tls__openssl.c
Update net/hostapd to 2.6 and fix multiple vulnerabilities

PR:		217907
Submitted by:	maintainer
Approved by:	mat (mentor)
Differential Revision: https://reviews.freebsd.org/D10051
Fri, 23 Sep 2016
[ 18:20 madpilot ] Original commit   Revision:422688
422688 net/hostapd/Makefile
422688 net/hostapd/distinfo
422688 net/hostapd/files/patch-src_ap_wmm.c
422688 net/hostapd/files/patch-src_drivers_driver__bsd.c
422688 net/hostapd/files/patch-src_eap__peer_eap__pwd.c
422688 net/hostapd/files/patch-src_eap__server_eap__server__pwd.c
422688 net/hostapd/files/patch-src_utils_os.h
422688 net/hostapd/files/patch-src_utils_os__unix.c
422688 net/hostapd/files/patch-src_wps_httpread.c
Update to 2.5

PR:		212779
Submitted by:	leres at ee.lbl.gov (maintainer)
Sun, 29 Mar 2015
[ 12:15 marino ] Original commit   Revision:382595
382595 net/hostapd/Makefile
382595 net/hostapd/distinfo
net/hostapd: Upgrade version 2.3 => 2.4, add PORTS_SSL option

PR:		198889
Submitted by:	maintainer (leres - ee.lbl.gov)
Thu, 16 Oct 2014
[ 07:19 marino ] Original commit   Revision:370974
370974 net/hostapd/Makefile
370974 net/hostapd/distinfo
370974 net/hostapd/files/config
net/hostapd: Upgrade version 2.2 => 2.3

While upgrading to the latest version released last week:
  * Rebase .config file on latest sample versoin
  * Support non-default prefixes
  * Merge new contents of do-configure target into post-patch target

PR:		194315
Approved by:	maintainer: (Craig Leres)
Sat, 7 Jun 2014
[ 05:26 danilo ] Original commit   Revision:356881
356881 net/hostapd/Makefile
356881 net/hostapd/distinfo
- Update from 2.1 to 2.2 [1]
- Use just BSD3CLAUSE as LICENSE (according to README)

PR:		ports/190726
Submitted by:	leres@ee.lbl.gov [1]
Thu, 13 Mar 2014
[ 10:06 pawel ] Original commit   Revision:348049
348049 net/hostapd/Makefile
348049 net/hostapd/distinfo
Update to version 2.1

PR:		ports/187459
Submitted by:	maintainer
Sat, 2 Feb 2013
[ 11:44 pawel ] Original commit   Revision:311422
311422 net/hostapd/Makefile
311422 net/hostapd/distinfo
311422 net/hostapd/files/config
Update to version 2.0

PR:		ports/175438
Submitted by:	Craig Leres <leres@ee.lbl.gov> (maintainer)
Mon, 18 Jun 2012
[ 22:27 jgh ] Original commit 
1.4 net/hostapd/Makefile
1.2 net/hostapd/distinfo
- Update to 1.0
- Use ports framework for build:
  - Bonus: Now honours CC/CFLAGS/LDFLAGS
- Remove DISTNAME override
- Update LICENSE (GPLv2 not GPLv1)
- Mark MAKE_JOBS_SAFE
- Patch Makefile to see $(CC) not "CC" when not verbose
- Pet portlint (LICENSE order)

- while here shift where arch is tested, and use MAN{1,8}PREFIX

PR:     ports/169154 (based on)
Submitted by:   koobs.freebsd@gmail.com
Approved by:    maintainer, leres@ee.lbl.gov
Sat, 12 Feb 2011
[ 04:52 miwi ] Original commit 
1.2313 net/Makefile
1.1 net/hostapd/Makefile
1.1 net/hostapd/distinfo
1.1 net/hostapd/files/config
1.1 net/hostapd/files/patch-src-l2_packet-l2_packet_freebsd.c
1.1 net/hostapd/pkg-descr
hostapd is a user space daemon for access point and authentication
servers. It implements IEEE 802.11 access point management, IEEE
802.1X/WPA/WPA2/EAP Authenticators, RADIUS client, EAP server, and
RADIUS authentication server. The current version supports Linux
(Host AP, madwifi, mac80211-based drivers) and FreeBSD (net80211).

WWW: http://hostap.epitest.fi/hostapd/

PR:             ports/154621
Submitted by:   leres at ee.lbl.gov

Number of commits found: 14

Login
User Login
Create account

Servers and bandwidth provided by
New York Internet, iXsystems, and RootBSD

This site
What is FreshPorts?
About the authors
Issues
FAQ
How big is it?
The latest upgrade!
Privacy
Blog
Contact

Search
Enter Keywords:
 
more...

Latest Vulnerabilities
apache24Apr 02
cactiApr 02
chromiumApr 02
haproxyApr 02
haproxy18Apr 02
haproxy19Apr 02
haproxy21Apr 02
rubygem-json*Apr 02
gnutlsMar 31
postgresql10-serverMar 29
postgresql11-serverMar 29
postgresql12-serverMar 29
postgresql96-serverMar 29
gitlab-ceMar 26
jenkinsMar 25

12 vulnerabilities affecting 110 ports have been reported in the past 14 days

* - modified, not new

All vulnerabilities

Last updated:
2020-04-02 20:42:28


Ports
Home
Categories
Deleted ports
Sanity Test Failures
Newsfeeds

Statistics
Graphs
NEW Graphs (Javascript)
Traffic

Calculated hourly:
Port count 38985
Broken 591
Deprecated 526
Ignore 862
Forbidden 5
Restricted 150
No CDROM 72
Vulnerable 24
Expired 3
Set to expire 499
Interactive 0
new 24 hours 10
new 48 hours11
new 7 days56
new fortnight97
new month154

Servers and bandwidth provided by
New York Internet, iXsystems, and RootBSD
Valid HTML, CSS, and RSS.
Copyright © 2000-2020 Dan Langille. All rights reserved.