summaryrefslogtreecommitdiff
path: root/usr.sbin/hostapd/hostapd.h
AgeCommit message (Collapse)Author
2006-12-31add a channel hopper for wireless interfaces. the channel hopper willReyk Floeter
jump to the next available channel after a configurable delay for the specified list of wireless "hostap" interfaces, see the new "set hostap hopper" commands in hostapd.conf(5). with help by jsg@
2006-09-28hostapd tree search speedup via inlined compare functionReyk Floeter
suggested by Mike Belopuhov (mkb at crypt dot org dot ru)
2006-06-27add new event rules to match optional elements of radiotap headers:Reyk Floeter
signal percentage, transmit rate and channel frequency. ok and hints by jsg@ jmc@
2006-05-15initial implementation of "IP Roaming" in hostapd, see hostapd.conf(5).Reyk Floeter
ok dlg@
2005-12-18Update my e-mail address in the copyright statement, no binary changes.Reyk Floeter
2005-12-10add an option to increase the multicast ttl which is currently limitedReyk Floeter
to 1 hop. by using a higher multicast ttl, you could use inter-network multicast forwarding of hostapd messages (i.e. with mrouted(8) or multicast-capable routing switches); "set iapp mode multicast ttl 2".
2005-12-01add configuration option to enable/disable specified iapp subtype handlingReyk Floeter
2005-12-01support netmasks in table entry ip address assignmentsReyk Floeter
2005-12-01move iapp configuration in a separate data structureReyk Floeter
2005-12-01deauthenticate all stations on startup which will force them toReyk Floeter
reassociate cleanly.
2005-11-23add optional interface rule for event rulesReyk Floeter
2005-11-20add support for multiple hostap (wireless) interfaces.Reyk Floeter
for example, if you run one hostapd with two ath(4) devices. you have to specify "set hostap interface { ath0, ath1 }" in hostapd.conf(5). man page bits by jmc@, tested by others
2005-10-07move IAPP definitions to separate header fileReyk Floeter
2005-09-30implement a way to match IEEE 802.11 flooding. this will help to detectReyk Floeter
known DoS attacks, like de-auth flooding against wireless networks. an example is provided in the manual page. "or could you just got for it?", deraadt@
2005-09-09replace hasch tables with red-black trees used by the node tables.Reyk Floeter
ok mcbride@
2005-07-30enable -WboundedReyk Floeter
ok anil
2005-07-04add 'random' action address and auth open request/responseReyk Floeter
2005-06-17first step to implement a proactive wireless monitoring system usingReyk Floeter
hostapd(8). it's a very simple but powerful approach using highly flexible and stateless event and action rules for IEEE 802.11 traffic. you can monitor a wireless network by watching frames with types and addresses (with support for tables and masks) and you can trigger actions like writing log messages, sending pcap/radiotap dumps to the IAPP network, removing nodes from the hostap, resending received frames and sending contructed 802.11 frames in reply to traffic received from any rogue nodes. it's based on some initial work from the c2k5 which has been tested and improved during the last weeks. some missing documentation for hostapd.conf(5) will be written as soon as possible. ok deraadt@
2005-04-13KNGHenning Brauer
2005-04-13add the initial version of the OpenBSD hostapd daemonReyk Floeter
ok deraadt@