Remove some obsolete information from hostapd README file

Number of the URLs were not valid anymore and some of the notes have
been obsolete for years.

Signed-off-by: Jouni Malinen <j@w1.fi>
This commit is contained in:
Jouni Malinen 2017-08-02 12:01:08 +03:00
parent b0fc2ef3a3
commit 2bdbace634

View file

@ -70,7 +70,7 @@ Requirements
Current hardware/software requirements: Current hardware/software requirements:
- drivers: - drivers:
Host AP driver for Prism2/2.5/3. Host AP driver for Prism2/2.5/3.
(http://hostap.epitest.fi/) (http://w1.fi/hostap-driver.html)
Please note that station firmware version needs to be 1.7.0 or newer Please note that station firmware version needs to be 1.7.0 or newer
to work in WPA mode. to work in WPA mode.
@ -81,8 +81,7 @@ Current hardware/software requirements:
Any wired Ethernet driver for wired IEEE 802.1X authentication Any wired Ethernet driver for wired IEEE 802.1X authentication
(experimental code) (experimental code)
FreeBSD -current (with some kernel mods that have not yet been FreeBSD -current
committed when hostapd v0.3.0 was released)
BSD net80211 layer (e.g., Atheros driver) BSD net80211 layer (e.g., Atheros driver)
@ -186,23 +185,13 @@ Authenticator and RADIUS encapsulation between the Authenticator and
the Authentication Server. Other than this, the functionality is similar the Authentication Server. Other than this, the functionality is similar
to the case with the co-located Authentication Server. to the case with the co-located Authentication Server.
Authentication Server and Supplicant Authentication Server
------------------------------------ ---------------------
Any RADIUS server supporting EAP should be usable as an IEEE 802.1X Any RADIUS server supporting EAP should be usable as an IEEE 802.1X
Authentication Server with hostapd Authenticator. FreeRADIUS Authentication Server with hostapd Authenticator. FreeRADIUS
(http://www.freeradius.org/) has been successfully tested with hostapd (http://www.freeradius.org/) has been successfully tested with hostapd
Authenticator and both Xsupplicant (http://www.open1x.org) and Windows Authenticator.
XP Supplicants. EAP/TLS was used with Xsupplicant and
EAP/MD5-Challenge with Windows XP.
http://www.missl.cs.umd.edu/wireless/eaptls/ has useful information
about using EAP/TLS with FreeRADIUS and Xsupplicant (just replace
Cisco access point with Host AP driver, hostapd daemon, and a Prism2
card ;-). http://www.freeradius.org/doc/EAP-MD5.html has information
about using EAP/MD5 with FreeRADIUS, including instructions for WinXP
configuration. http://www.denobula.com/EAPTLS.pdf has a HOWTO on
EAP/TLS use with WinXP Supplicant.
Automatic WEP key configuration Automatic WEP key configuration
------------------------------- -------------------------------
@ -243,16 +232,15 @@ networks that require some kind of security. Task group I (Security)
of IEEE 802.11 working group (http://www.ieee802.org/11/) has worked of IEEE 802.11 working group (http://www.ieee802.org/11/) has worked
to address the flaws of the base standard and has in practice to address the flaws of the base standard and has in practice
completed its work in May 2004. The IEEE 802.11i amendment to the IEEE completed its work in May 2004. The IEEE 802.11i amendment to the IEEE
802.11 standard was approved in June 2004 and this amendment is likely 802.11 standard was approved in June 2004 and this amendment was
to be published in July 2004. published in July 2004.
Wi-Fi Alliance (http://www.wi-fi.org/) used a draft version of the Wi-Fi Alliance (http://www.wi-fi.org/) used a draft version of the
IEEE 802.11i work (draft 3.0) to define a subset of the security IEEE 802.11i work (draft 3.0) to define a subset of the security
enhancements that can be implemented with existing wlan hardware. This enhancements that can be implemented with existing wlan hardware. This
is called Wi-Fi Protected Access<TM> (WPA). This has now become a is called Wi-Fi Protected Access<TM> (WPA). This has now become a
mandatory component of interoperability testing and certification done mandatory component of interoperability testing and certification done
by Wi-Fi Alliance. Wi-Fi provides information about WPA at its web by Wi-Fi Alliance.
site (http://www.wi-fi.org/OpenSection/protected_access.asp).
IEEE 802.11 standard defined wired equivalent privacy (WEP) algorithm IEEE 802.11 standard defined wired equivalent privacy (WEP) algorithm
for protecting wireless networks. WEP uses RC4 with 40-bit keys, for protecting wireless networks. WEP uses RC4 with 40-bit keys,