[BACK]Return to hostapd.conf CVS log [TXT][DIR] Up to [local] / src / etc

Diff for /src/etc/Attic/hostapd.conf between version 1.4 and 1.5

version 1.4, 2005/09/29 23:03:49 version 1.5, 2005/09/29 23:24:56
Line 1 
Line 1 
 reyk is a lazy slacker  # $OpenBSD$
   # sample hostapd configuration file
   # see hostapd.conf(5)
   
   # "wavelan is a battle field"
   
   #
   # Macros
   #
   
   # Define macros for the interfaces to be used by hostapd. The "wlan"
   # interface is optional.
   wlan="ath0"
   wired="sis0"
   
   #
   # Tables
   #
   
   # Define the MAC addresses (BSSIDs) for your accesspoints in a table.
   table <myess> {
           00:90:4b:0d:fd:c8,
           00:02:6f:21:ea:8b
   }
   
   # Address masks are providing a simple way to match by MAC vendor ID.
   #
   # table <senao> { 00:02:6f:ff:ff:ff & ff:ff:ff:00:00:00 }
   
   #
   # Global options
   #
   
   # Uncomment this option to run hostapd in passive IAPP monitoring mode.
   set hostap interface $wlan
   
   # Should be the default, the opposite is "pcap" without radiotap headers.
   set hostap mode radiotap
   
   # According to the revised standard, multicast is used. hostapd supports
   # broadcast for IAPP messages as well.
   set iapp interface $wired
   set iapp mode multicast
   
   #
   # Event rules
   #
   
   # Log probe requests
   hostap handle type management subtype probe request \
      with iapp type radiotap
   
   # Log and annoy foreign accesspoints
   #
   # This will be logged as well but the important thing is to
   # annoy other accesspoints in your wireless territory.
   hostap handle type data bssid !<myess> \
       with frame type management subtype deauth reason auth expire \
       from &bssid to ff:ff:ff:ff:ff:ff bssid &bssid
   
   # The first deauth example will not work with some newer stuff, like
   # iwi(4)/ipw(4) "centrino", because they ignore management frames to
   # the broadcast address as a countermeasure against the "void11"
   # attack.
   #
   # hostap handle type data bssid !<myess> \
   #    with frame type management subtype deauth reason auth expire \
   #    from &bssid to &from bssid &bssid
   
   # Finally log any rogue accesspoints limited to every second.
   # The skip keywords instructs hostapd to ignore further IAPP
   # processing.
   hostap handle skip type management subtype beacon bssid !<myess> \
       with iapp type radiotap limit 1 sec

Legend:
Removed from v.1.4  
changed lines
  Added in v.1.5