Received: by 2002:a25:8b12:0:0:0:0:0 with SMTP id i18csp2506928ybl; Mon, 19 Aug 2019 03:13:18 -0700 (PDT) X-Google-Smtp-Source: APXvYqxN9k6dS//5gxdKwv544O/HGeDadS9XlepnOL96zaMlvrU3d+UGF0kMCuHHSHGj8Lo2wJTp X-Received: by 2002:a17:90a:6581:: with SMTP id k1mr19824371pjj.47.1566209598856; Mon, 19 Aug 2019 03:13:18 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1566209598; cv=none; d=google.com; s=arc-20160816; b=GJXqZkxCtiwk+l8f3seVrrgwH3GtNbtcgFAjSAPVcJlPoMf+T1hbgJcRC66p50AdLN f6FHpQp5JSbYVmC0HXxVQeo80/wwZBWdCLYQp6+7Ehj/nGC4jslb/iEfBBuoSKVtP4XG Ejjbqli45l9OsUcYD0tdOs+31DUmzaM3Owe7YW8tu56INyFRPSADBsi+B+sVH5YMOmFY oa1luM6yucIpP1M6js10xjNgY8OC8VvHLQuraWSFWApSDm0wpVs6+VLIjLWZEtu7O9Ki 7tH45pcg4K2KpnwZlFSbgxGzaMIS6k07PcnhYZjHKFQsCa561Ym/WEP/Uo7T1FAlpWUS 4QDw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:date:cc:to:from:subject :message-id; bh=zE3Daf37Jl+gtlbP8oHxcFPKEj+suEemvfqGcaMe5rM=; b=OBEz/VcKf6LAPjrjaBM56t7HqMyuV1TM3qTWbyRq5GBScV0hV2vETzwWGNRbBC8PRw 5y7tx1ogs8yoxiRy9rJFBVDHICch56n5Mbx9XpWbax43MM8a6pigRm8xVnleV2wAgUK7 0SL47RC6OBqa2AkImc5vW382xHdfb5DDIHUEIUHosDLB6hCcM0cPv88B6uK77nKbF6vi /7QBiiJK7YVF2axmzCVShOS5lwPrFjhlMCENQ4j6fpgrf883TfH0r8uBX7zS1oRAHfUz leuDVsTawRsW4jEUd8ltl6fKrnTh8MueI3uICXFipJXP5+nuZFq/l5Dg8kQI4k5DjvGa XyNg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-wireless-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id go13si9645098plb.297.2019.08.19.03.12.53; Mon, 19 Aug 2019 03:13:18 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-wireless-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-wireless-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727172AbfHSKMr (ORCPT + 99 others); Mon, 19 Aug 2019 06:12:47 -0400 Received: from s3.sipsolutions.net ([144.76.43.62]:38874 "EHLO sipsolutions.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726703AbfHSKMq (ORCPT ); Mon, 19 Aug 2019 06:12:46 -0400 Received: by sipsolutions.net with esmtpsa (TLS1.3:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.92) (envelope-from ) id 1hzeea-0007a4-Nk; Mon, 19 Aug 2019 12:12:44 +0200 Message-ID: <9985fddfb059640f36665efc9c1ef2dc0bdb7662.camel@sipsolutions.net> Subject: Re: Implementing Mikrotik IE From: Johannes Berg To: Josef Miegl , Sebastian Gottschall Cc: linux-wireless Date: Mon, 19 Aug 2019 12:12:43 +0200 In-Reply-To: <20190816113818.ohktykc4fyetzyvq@pepin-laptop.localdomain> (sfid-20190816_133830_699223_6B854E12) References: <20190815152844.k5mmddvbwrohkzr6@pepin-laptop.localdomain> <3a079683-6f57-3b42-f909-90c46e14f14f@newmedia-net.de> <20190816111044.4ntizgmpa3twbzcg@pepin-laptop.localdomain> <20190816113818.ohktykc4fyetzyvq@pepin-laptop.localdomain> (sfid-20190816_133830_699223_6B854E12) Content-Type: text/plain; charset="UTF-8" User-Agent: Evolution 3.30.5 (3.30.5-1.fc29) MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Sender: linux-wireless-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org On Fri, 2019-08-16 at 13:38 +0200, Josef Miegl wrote: > On Fri, Aug 16, 2019 at 01:15:30PM +0200, Sebastian Gottschall wrote: > > in station mode you are right. you need to modify mac80211. > Even if I don't need to capture the IE back? All I want is to include > extra vendor IE in client assoc/reassoc frames. If this is something the > current wireless stack cannot do, perhaps it should be implemented. Contrary to what Sebastian states, it certainly is possible today, although not through wpa_supplicant's config file, only through the wpa_cli interface, using the VENDOR_ELEM_ADD command. There are various tests showing how to use this. johannes