|non port: security/wpa_supplicant/distinfo
Number of commits found: 13
Thu, 22 Aug 2019
[ 03:33 cy ] |
Update 2.8 --> 2.9
Mon, 22 Apr 2019
[ 15:56 cy ] |
Update wpa_supplicant/hostapd 2.7 --> 2.8
Thu, 6 Dec 2018
[ 20:11 cy ] |
Update 2.6 --> 2.7
Tue, 14 Aug 2018
[ 20:21 cy ] |
WPA: Ignore unauthenticated encrypted EAPOL-Key data
Ignore unauthenticated encrypted EAPOL-Key data in supplicant
processing. When using WPA2, these are frames that have the Encrypted
flag set, but not the MIC flag.
When using WPA2, EAPOL-Key frames that had the Encrypted flag set but
not the MIC flag, had their data field decrypted without first verifying
the MIC. In case the data field was encrypted using RC4 (i.e., when
negotiating TKIP as the pairwise cipher), this meant that
unauthenticated but decrypted data would then be processed. An adversary
could abuse this as a decryption oracle to recover sensitive information
in the data field of EAPOL-Key messages (e.g., the group key).
Signed-off-by: Mathy Vanhoef <Mathy.Vanhoef@cs.kuleuven.be>
Security: VuXML: 6bedc863-9fbe-11e8-945f-206a8a720317
Mon, 16 Oct 2017
[ 20:08 cy ] |
Add patch set 2017-1
A vulnerability was found in how a number of implementations can be
triggered to reconfigure WPA/WPA2/RSN keys (TK, GTK, or IGTK) by
replaying a specific frame that is used to manage the keys. Such
reinstallation of the encryption key can result in two different types
of vulnerabilities: disabling replay protection and significantly
reducing the security of encryption to the point of allowing frames to
be decrypted or some parts of the keys to be determined by an attacker
depending on which cipher is used.
Security: https://w1.fi/security/2017-1/ \
Thu, 17 Nov 2016
[ 17:43 jrm ] |
(Only the first 10 of 15 ports in this commit are shown above. )
security/wpa_supplicant: Update to version 2.6 and patch for LibreSSL support
- Remove patches that have been incorporated upstream
- Add patches for LibreSSL support
Approved by: AMDmi3 (mentor)
Differential Revision: https://reviews.freebsd.org/D8451
Sun, 11 Oct 2015
[ 22:52 marino ] |
security/wpa_supplicant: Upgrade version 2.4 => 2.5
Mon, 16 Mar 2015
[ 20:45 marino ] |
(Only the first 10 of 14 ports in this commit are shown above. )
security/wpa_supplicant: Upgrade version 2.3 => 2.4
See http://w1.fi/cgit/hostap/plain/wpa_supplicant/ChangeLog for list
of changes since version 2.3.
Sun, 12 Oct 2014
[ 21:20 marino ] |
(Only the first 10 of 22 ports in this commit are shown above. )
Revive security/wpa_supplicant after 6.5 years => version 2.3
This port was retired at version 0.3.8 because wpa_supplicant is
part of FreeBSD base. However, the last few releases have had a period
of only a few months, so the base is always going to be behind. DragonFly
is also affected, so I'm bringing the port back at the latest version.
It features the same patches as FreeBSD including the conversion to use
libutil's pidfile routines. There are some additional patches for
DragonFly support and to fix some bugs from the 9 Oct 2014 release.
The WPA Supplicant build system has been converted to ports options, and
there are dozens of them. I've set the defaults to match the
configuration in base and verified that it builds with all options
selected at once.
Fri, 25 Apr 2008
[ 23:21 pav ] |
- Remove, it's ancient and newer version is included in base of all supported
Suggested by: sam
Fri, 11 Nov 2005
[ 19:03 brooks ] |
(Only the first 10 of 16 ports in this commit are shown above. )
Wed, 16 Feb 2005
[ 07:03 brooks ] |
- Update to 0.3.8. See ChangeLog for details.
- Install sample config file in etc/wpa_supplication.conf.sample instead
- Obey PREFIX.
- Follow move of binaries from bin to sbin.
Committed from a laptop running this version against an AP with WPA-PSK
and AES encription.
Submitted by: Yamamoto Shigeru <shigeru at iij dot ad dot jp>
PR: 75609 (by Rong-En Fan <rafan at infor dot org>)
Sun, 12 Dec 2004
[ 22:23 imp ] |
WPA supplicant daemon for 802.11 networks.
Submitted by: sam
Number of commits found: 13