https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=218908
--- Comment #10 from Alexander Sherikov ---
Played a bit more with parameters without any success and also tried it in
Linux where it fails in the same way until I force wext driver when starting
wpa_supplicant. Don't want to waste more tim
On Thu, 20 May 2021, Bjoern A. Zeeb wrote:
Hi,
On 20 May 2021, at 12:48, Berislav Purgar wrote:
Any info will be great ..
+100 from me.
I resumed working on this yesterday updating and extracting the iwlwifi
specific bits from my dev repo.
I’ll have a better update for you by Monday eve
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=256120
Bjoern A. Zeeb changed:
What|Removed |Added
Assignee|wirel...@freebsd.org|b...@freebsd.org
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=256119
Bjoern A. Zeeb changed:
What|Removed |Added
Assignee|wirel...@freebsd.org|b...@freebsd.org
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=256118
Bjoern A. Zeeb changed:
What|Removed |Added
CC||b...@freebsd.org
Assign
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=256120
Bug ID: 256120
Summary: [net80211] [patch]: prevent plaintext injecting using
cloaked A-MSDUs
Product: Base System
Version: CURRENT
Hardware: Any
OS:
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=256119
Bug ID: 256119
Summary: [net80211] [patch]: mitigate A-MSDU FragAttacks design
flaw
Product: Base System
Version: CURRENT
Hardware: Any
OS: Any
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=256118
Bug ID: 256118
Summary: [net80211] [patch]: reject mixed plaintext/encrypted
fragments
Product: Base System
Version: CURRENT
Hardware: Any
OS: Any
Hey folks,
I am slightly confused about the bpf details for wireless devices.
First (minor nit) there is a bogus diagnostic printed by tcpdump when
trying to use monitor mode (-I) for non-montior-mode VAPs. It
tells me about the wrong mode VAP and claims:
To create a new montior mode VAP use: