hostapd
hostapd is a user space daemon that implements IEEE 802.11 access point management and authentication servers, enabling the creation of Wi-Fi hotspots and handling authentication for wireless networks.[1] It supports key protocols including IEEE 802.1X for port-based network access control, WPA, WPA2, and WPA3 for secure wireless authentication and encryption, Extensible Authentication Protocol (EAP) methods, and RADIUS for remote authentication dial-in user service, allowing it to function as both an authenticator and a RADIUS server.[1] Developed by Jouni Malinen and initially released in 2002, hostapd is part of the broader hostap project, which also includes the wpa_supplicant for client-side Wi-Fi authentication, and it is licensed under the BSD license.[1]
The software operates on Linux systems (primarily using the nl80211 driver interface with mac80211-based drivers, as well as legacy drivers like Host AP), as well as FreeBSD with the net80211 framework, providing a flexible backend for turning compatible wireless hardware into access points without relying on proprietary firmware.[1] Configuration is managed through a text-based file (typically hostapd.conf), which defines parameters like SSID, encryption settings, and authentication methods, while a command-line interface (hostapd_cli) allows runtime control and monitoring of the daemon's operations.[1] Hostapd's modular design includes an EAP server implementation compliant with RFC 3748, supporting various authentication methods—some with keying material for WPA/WEP integration—and it facilitates advanced features like per-BSS (Basic Service Set) data handling for multi-virtual interface setups.[1] As an open-source tool, it has been widely adopted in embedded systems, routers, and research environments for prototyping and deploying secure wireless infrastructures, with ongoing development tracked through the hostap mailing list.[2]
Overview
Purpose and Functionality
hostapd is a user-space daemon designed for access point and authentication servers, implementing IEEE 802.11 access point management functions, including authentication, association, and other management frame processing.[1] This implementation occurs in the user space, allowing it to interface with kernel-level drivers to manage wireless operations without embedding AP-specific logic directly in the hardware firmware.[3]
A primary role of hostapd is to enable standard wireless network interface cards (NICs) to operate as Wi-Fi access points or hotspots, provided the underlying drivers support access point (AP) mode, such as mac80211-based drivers in Linux.[4] By handling the necessary AP protocols in software, hostapd eliminates the requirement for dedicated AP hardware or proprietary firmware, making it possible to repurpose commodity WLAN hardware for hotspot creation.[1]
hostapd serves as an authenticator for IEEE 802.1X, managing port access entity (PAE) operations and supporting both RADIUS client functionality to forward authentication requests to external servers and integrated RADIUS server operations for standalone authentication.[1] This dual capability allows it to enforce secure network access using protocols like EAP, ensuring encrypted connections via WPA/WPA2/WPA3 without relying on third-party authentication infrastructure in all scenarios.[3]
Common use cases include deploying software-based Wi-Fi networks on general-purpose computers, such as turning a Linux server or laptop into an access point for local connectivity in environments like home networks, educational settings, or temporary hotspots.[1]
Supported Standards
hostapd provides core support for IEEE 802.11 access point management, including processes such as beaconing, probing, and station association, enabling the implementation of wireless LAN access points across various amendments like 802.11a/b/g/n/ac/ax/be depending on the underlying hardware and driver capabilities.[1][5][6]
It implements IEEE 802.1X for port-based network access control, facilitating authentication and key distribution in enterprise environments through the Extensible Authentication Protocol over LAN (EAPOL).[1] For security, hostapd supports WPA (Wi-Fi Protected Access) using TKIP for personal and enterprise modes, WPA2 based on IEEE 802.11i/RSN with CCMP (AES in Counter mode with CBC-MAC) encryption, and WPA3 incorporating enhanced protections against offline dictionary attacks.[1][5]
WPA3 support includes Simultaneous Authentication of Equals (SAE) for personal networks, configured via key management options like SAE and FT-SAE, which provide forward secrecy and resistance to brute-force attacks.[5] The daemon also enables PMKSA (Pairwise Master Key Security Association) caching and opportunistic key caching to optimize re-authentication during handoffs, reducing latency in roaming scenarios.[1] Additionally, basic support for IEEE 802.11r (Fast Basic Service Set Transition) is available, allowing fast roaming through mechanisms like over-the-air or over-the-DS transitions, configurable with mobility domain identifiers and FT key lifetimes.[5]
hostapd integrates an EAP server supporting multiple methods for authentication, including EAP-TLS (certificate-based), EAP-PEAPv0/v1 (with inner methods like MSCHAPv2 or GTC), EAP-TTLSv0/v1 (with PAP, CHAP, MSCHAPv2, or EAP-MD5-Challenge), EAP-MSCHAPv2, EAP-SIM/AKA (for SIM-based authentication), EAP-pwd (password-based), and others such as EAP-MD5-Challenge, EAP-GTC, and EAP-IKEv2.[1] These methods can operate with an internal EAP server or via external RADIUS servers, where hostapd acts as a RADIUS client or authenticator, encapsulating EAP packets for backend authentication.[1][5]
For hardware integration on modern Linux kernels, hostapd utilizes the nl80211 driver interface, which supports advanced features like high-throughput (HT), very high throughput (VHT), high efficiency (HE), and extremely high throughput (EHT) capabilities corresponding to 802.11n/ac/ax/be amendments (with preliminary EHT support as of version 2.11 in 2024).[5][6] This interface handles AP mode operations for mac80211-based drivers, ensuring compatibility with contemporary wireless chipsets.[1]
History
Development Origins
hostapd originated in 2002–2003 as part of the Host AP project, led by Jouni Malinen, to enable support for Intersil Prism2/2.5/3 wireless LAN cards on Linux systems.[7] The project addressed the absence of open-source tools capable of transforming standard Linux machines into functional Wi-Fi access points, particularly in an era when proprietary firmware and closed-source drivers dominated wireless networking.[8] Initial development focused on integrating with the Host AP kernel driver for Prism chipsets, allowing user-space control over access point operations without deep kernel modifications.[9]
This effort was motivated by the growing need for secure, open wireless infrastructure amid vulnerabilities in early Wi-Fi protocols like WEP, prompting the inclusion of IEEE 802.1X and emerging WPA support from the outset. hostapd was designed as a user-space daemon to handle authentication, association, and RADIUS integration, decoupling these functions from kernel-level drivers to facilitate portability across different hardware, including early Linux wireless stacks like MadWifi for Atheros-based cards. By emphasizing modularity, the software avoided heavy reliance on specific kernel versions, enabling broader adoption in the open-source community.[9]
From its inception, hostapd was released under a BSD license (with the advertising clause removed), promoting free redistribution and modification while aligning with the project's goal of fostering collaborative wireless development. Its initial implementation complemented the simultaneous development of wpa_supplicant in 2003, which provided client-side supplicant functionality; together, they formed a cohesive framework for WPA/RSN authentication, with hostapd serving as the authenticator relaying EAPOL frames.[10] Early mailing list discussions from January 2003 highlight community interest in enhancing hostapd for forking and additional features, underscoring its rapid evolution within the Host AP ecosystem.[11]
Key Milestones
In 2004, hostapd integrated support for WPA and WPA2, coinciding with the IEEE 802.11i standard's ratification on June 24, 2004, which formalized robust security mechanisms for wireless networks.[12] This addition enabled hostapd to serve as an authenticator implementing the RSN (Robust Security Network) features defined in the standard, marking a pivotal shift toward secure access point operations.[1]
By 2006, hostapd introduced an integrated EAP server implementation, allowing local processing of Extensible Authentication Protocol methods without relying solely on external servers, alongside enhancements to RADIUS integration for improved authentication handling.[13] These updates expanded hostapd's role in enterprise-grade 802.1X deployments, supporting methods like EAP-TLS and EAP-PEAP directly within the daemon.[14]
During the 2010s, hostapd transitioned to the nl80211 driver interface, enhancing compatibility with the Linux kernel's mac80211 subsystem and enabling support for a wider array of wireless hardware. This shift, initiated around 2010, facilitated better integration with modern chipsets and improved management of features like channel switching and frame handling. Preliminary support for WPA3, including SAE (Simultaneous Authentication of Equals) for personal mode, was added in 2018, aligning with the Wi-Fi Alliance's certification program launch.[15]
From 2020 to 2024, hostapd saw iterative releases bolstering security and protocol features. Version 2.10, released on January 16, 2022, incorporated enhancements to SAE, such as improved side-channel attack protections and options for sending SAE Confirm messages, alongside refinements to OWE (Opportunistic Wireless Encryption) key derivation.[16][17] Version 2.11, released on July 20, 2024, addressed security vulnerabilities including explicit SSID protection in the 4-way handshake (mitigating CVE-2023-52424) and stricter validation of SAE rejected groups to prevent downgrades, while adding hardware offload support for drivers like those compatible with Mediatek MT792x chipsets.[6][18]
Throughout its evolution, hostapd has been maintained under the w1.fi project by Jouni Malinen, with significant contributions from the Linux Wireless community via the hostap mailing list and git repository.[1][2] This collaborative effort ensures ongoing alignment with emerging IEEE 802.11 amendments and kernel developments.
Implementations
Jouni Malinen's hostapd
Jouni Malinen's hostapd is the primary and actively maintained open-source implementation of a user-space daemon for IEEE 802.11 access points and authentication servers, developed by Jouni Malinen along with various contributors. Released under the BSD license, it provides robust support for managing wireless access points, including full IEEE 802.11 access point management capabilities. The latest stable release, version 2.11, was made available on July 20, 2024, incorporating ongoing enhancements tracked through detailed changelogs.[19]
Key features of this implementation include an integrated EAP and RADIUS server for authentication, support for WPA3-SAE (Simultaneous Authentication of Equals) to enable secure password-based authentication, and the ability to handle multi-BSS configurations for virtual access points on a single physical interface. It also accommodates vendor-specific elements in beacons and probe responses, allowing customization for proprietary hardware extensions. These features make it suitable for deploying enterprise-grade Wi-Fi networks with advanced security protocols. In March 2025, a vulnerability (CVE-2025-24912) was disclosed affecting RADIUS packet processing, potentially allowing man-in-the-middle attacks to disrupt authentications; users are advised to update to patched versions.[1][20]
This version supports a wide range of drivers, particularly those based on nl80211 with the mac80211 framework, including ath9k and ath10k for Atheros/Qualcomm chipsets, iwlwifi for Intel wireless adapters, and others like b43 for Broadcom. It is compatible with multiple operating systems, such as Linux, FreeBSD, QNX, and Android, enabling deployment across diverse embedded and desktop environments. Active development continues through a public Git repository, with recent updates adding support for enhancements like the Device Provisioning Protocol (DPP) in Wi-Fi Easy Connect, as seen in version 2.11. The project's official resources, including source code and documentation, are hosted at w1.fi/hostapd.[1][21]
OpenBSD's hostapd
OpenBSD's hostapd is a specialized user-space daemon developed by Reyk Floeter for enhancing wireless network management within the operating system. First introduced in OpenBSD 3.8 on November 1, 2005, its last stable release, version 3.9, arrived with OpenBSD 3.9 on May 1, 2006. Distributed under the BSD license as part of the OpenBSD base system, it emphasizes security through code auditing and minimalism.[22][23]
This implementation introduces unique features tailored for robust wireless environments, including enhanced roaming support via the Inter-Access Point Protocol (IAPP) defined in IEEE 802.11f. IAPP enables access points to exchange station association updates across an Extended Service Set (ESS), facilitating seamless handoffs for mobile clients in large-scale deployments, such as those spanning dozens of OpenBSD-based access points. Additionally, it provides advanced monitoring tools, such as event-based logging of station movements and beacon frames to detect rogue access points, along with frame injection capabilities using bpf(4) for debugging and basic wireless intrusion prevention, like sending deauthentication frames against unauthorized devices. These features include rate limiting for detection of abuse, such as logging events when more than 100 non-beacon management frames are received in 5 seconds to identify potential DoS attacks.[23][24]
Deeply integrated with OpenBSD's net80211 kernel wireless stack, hostapd operates alongside drivers in Host AP mode, such as ath(4) for Atheros chipsets, to track station states and manage resources efficiently. While the broader OpenBSD wireless framework supports IEEE 802.1X authentication and WPA encryption through kernel-level mechanisms like ifconfig(8), this hostapd variant prioritizes roaming and monitoring over direct authentication handling and omits support for subsequent protocols like WPA3. Configurations leverage radiotap headers for detailed frame analysis, including signal strength and transmission rates, to aid in network optimization.[23][25][26]
Documentation for OpenBSD's hostapd is comprehensively provided through system manual pages, including hostapd(8) for daemon operation and hostapd.conf(5) for configuration syntax, such as defining IAPP multicast interfaces or event rules for frame handling. Its inclusion in the base OpenBSD installation ensures audited, secure usage without external dependencies, promoting reliable deployment in environments prioritizing stability and minimal attack surface.[23][25]
Devicescape's hostapd
Devicescape's hostapd was a GPL-licensed fork of the original hostapd software, developed by Devicescape Software, Inc. as part of their efforts to build an open-source wireless access point stack for Linux. Based closely on early versions of Jouni Malinen's source code, it integrated with Devicescape's proprietary Linux wireless driver stack to enable IEEE 802.11 access point functionality, including support for authentication and management features tailored to their Universal Wireless Platform (UWP).[27][28][29]
Launched around 2006–2007 amid Devicescape's commercial push into wireless networking solutions, the project aimed to provide a complete open-source AP implementation compatible with Linux wireless extensions, supporting chipsets from vendors like Atheros, Broadcom, and Marvell. The fork operated under the GNU General Public License version 2, with no independent stable releases issued; instead, key components such as the Devicescape-specific driver interface were contributed upstream to the main hostapd repository. The project's website, devicescape.org, is now inactive.[27][28][29]
Development on the fork ceased by the late 2000s, as evidenced by the 2007 upstream integration and renaming of the Devicescape driver to the more general nl80211 interface, reflecting a shift in focus toward Devicescape's commercial products like Wi-Fi offload and analytics services. The company experienced limited adoption of its open-source contributions due to the rapid evolution of Linux wireless subsystems, and the fork lacks support for modern features such as WPA3 or contemporary drivers. Devicescape itself was acquired by Pareteum Corporation in 2019; Pareteum filed for Chapter 11 bankruptcy in 2022, further marking the end of any potential revival for the project.[30][31]
Configuration and Usage
Configuration File Structure
The hostapd configuration file, typically named hostapd.conf and located at /etc/hostapd/hostapd.conf in many Linux distributions, uses an INI-style format consisting of key-value pairs separated by equals signs, with comments prefixed by # and sections delineated by comment headers such as ##### [IEEE 802.11](/page/IEEE_802.11) related configuration #####.[32][5] Empty lines and commented lines are ignored, allowing for flexible organization of parameters into logical groups without strict section brackets.[5]
Core global parameters define the overall setup for the access point. The interface parameter specifies the network device name, such as wlan0, which can be overridden via the command-line -i option.[5] The driver parameter selects the interface type for hardware control, with common values including nl80211 for Linux mac80211 drivers or hostap as the default.[5] Additional foundational settings include country_code, which sets the ISO/IEC 3166-1 regulatory domain (e.g., US) to enforce local channel and power limits, and ctrl_interface, which defines the path for the UNIX domain socket (default: /var/run/hostapd) to enable external control via tools like hostapd_cli.[5]
Parameters related to the Basic Service Set (BSS) configure the wireless network specifics, often following the global settings in the file. The ssid parameter sets the network identifier, supporting formats like plain text (e.g., ssid=MyNetwork), double-quoted strings, or hexdump representations.[5] The hw_mode specifies the operational frequency band, such as g for 2.4 GHz 802.11g or a for 5 GHz 802.11a, with a default of b if unset.[5] The channel parameter assigns the operating channel number (e.g., channel=6), defaulting to 0 (unset), and may integrate with automatic channel selection if the CONFIG_ACS build option is enabled.[5]
Security parameters enable authentication and encryption protocols within the BSS section. The wpa parameter activates WPA modes as a bitfield (bit 0 for WPA, bit 1 for WPA2/RSN), such as wpa=2 for WPA2 only, with WPA disabled by default.[5] For pre-shared key authentication, wpa_passphrase provides an ASCII string of 8-63 characters (e.g., wpa_passphrase=MySecurePass).[5] The rsn_pairwise parameter defines cipher suites for unicast encryption under RSN, such as CCMP for AES-based protection, defaulting to the value of wpa_pairwise if unspecified.[5] For enterprise authentication, eap_server=1 enables the integrated EAP server, requiring a companion eap_user_file for the user database.[5]
Advanced parameters extend functionality for specialized deployments. The multi_ap parameter configures Multi-AP coordination (0 for disabled, 1 for backhaul BSS, 2 for fronthaul, 3 for both), defaulting to 0 and supporting virtual BSS instances.[5] Management frame protection is handled by ieee80211w, with values of 0 (disabled), 1 (optional), or 2 (required), defaulting to 0 to prevent deauthentication attacks.[5] For multiple SSIDs, additional BSS configurations are added using bss=<interface_name> sections, each with their own ssid and security settings.[5]
# Example minimal hostapd.conf for WPA2-PSK on 2.4 GHz
interface=wlan0
driver=nl80211
country_code=US
ctrl_interface=/var/run/hostapd
ssid=MyAP
hw_mode=g
channel=6
wpa=2
wpa_passphrase=secretpass
rsn_pairwise=CCMP
ieee80211w=1
```[](https://w1.fi/cgit/hostap/plain/hostapd/hostapd.conf)
### Basic Setup Examples
To deploy a basic hostapd-based access point, begin by preparing the wireless interface on a Linux system supporting the nl80211 driver, such as those using mac80211-compatible hardware like ath9k chips. First, create a virtual AP interface from the physical one (e.g., wlan0) using the iw tool: `iw dev wlan0 interface add ap0 type __ap`. Next, bring the interface up and assign it an IP address, for example: `ifconfig ap0 up 192.168.1.1 netmask 255.255.255.0`.[](https://w1.fi/hostapd/)
For a minimal open SSID configuration on the 2.4 GHz band using channel 6, create a configuration file such as `/etc/hostapd/hostapd.conf` with the following essential parameters:
# Example minimal hostapd.conf for WPA2-PSK on 2.4 GHz
interface=wlan0
driver=nl80211
country_code=US
ctrl_interface=/var/run/hostapd
ssid=MyAP
hw_mode=g
channel=6
wpa=2
wpa_passphrase=secretpass
rsn_pairwise=CCMP
ieee80211w=1
```[](https://w1.fi/cgit/hostap/plain/hostapd/hostapd.conf)
### Basic Setup Examples
To deploy a basic hostapd-based access point, begin by preparing the wireless interface on a Linux system supporting the nl80211 driver, such as those using mac80211-compatible hardware like ath9k chips. First, create a virtual AP interface from the physical one (e.g., wlan0) using the iw tool: `iw dev wlan0 interface add ap0 type __ap`. Next, bring the interface up and assign it an IP address, for example: `ifconfig ap0 up 192.168.1.1 netmask 255.255.255.0`.[](https://w1.fi/hostapd/)
For a minimal open SSID configuration on the 2.4 GHz band using channel 6, create a configuration file such as `/etc/hostapd/hostapd.conf` with the following essential parameters:
interface=ap0
driver=nl80211
ssid=OpenAP
hw_mode=g
channel=6
This setup enables an open wireless network without encryption, suitable for testing or non-sensitive environments.[](https://w1.fi/cgit/hostap/plain/hostapd/hostapd.conf) To start the access point, run the hostapd daemon with the configuration file: `hostapd /etc/hostapd/hostapd.conf`.
For a more secure WPA2-PSK setup, extend the minimal [configuration](/page/Configuration) by adding WPA2 parameters, including a [passphrase](/page/Passphrase) (8-63 characters) and pairwise ciphers like CCMP for [AES](/page/AES) encryption. Update the `/etc/hostapd/hostapd.conf` file as follows:
This setup enables an open wireless network without encryption, suitable for testing or non-sensitive environments.[](https://w1.fi/cgit/hostap/plain/hostapd/hostapd.conf) To start the access point, run the hostapd daemon with the configuration file: `hostapd /etc/hostapd/hostapd.conf`.
For a more secure WPA2-PSK setup, extend the minimal [configuration](/page/Configuration) by adding WPA2 parameters, including a [passphrase](/page/Passphrase) (8-63 characters) and pairwise ciphers like CCMP for [AES](/page/AES) encryption. Update the `/etc/hostapd/hostapd.conf` file as follows:
interface=ap0
driver=nl80211
ssid=WPA2AP
hw_mode=g
channel=6
wpa=2
wpa_passphrase=your_secure_passphrase
wpa_key_mgmt=WPA-PSK
wpa_pairwise=CCMP
This [configuration](/page/Configuration) enforces WPA2-Personal [authentication](/page/Authentication) with pre-shared key security.[](https://w1.fi/cgit/hostap/plain/hostapd/hostapd.conf) Launch it using the same command: `hostapd /etc/hostapd/hostapd.conf`.
To troubleshoot issues during setup, such as failure to start the AP or association problems, enable debug mode by running `hostapd -d /etc/hostapd/hostapd.conf`, which outputs verbose logs to the console for identifying errors like driver incompatibilities or channel conflicts. Additionally, ensure no conflicts with [network management](/page/Network_management) services by stopping [NetworkManager](/page/NetworkManager) if active: `systemctl stop NetworkManager`, as it may interfere with manual interface control. For persistent logging, add `logger_syslog=-1` and `logger_syslog_level=2` to the [configuration file](/page/Configuration_file) and monitor system logs via [syslog](/page/Syslog).
## Integrations and Related Software
### Relation to wpa_supplicant
hostapd and [wpa_supplicant](/page/Wpa_supplicant) are developed as complementary components within the same open-source project led by Jouni Malinen, with [wpa_supplicant](/page/Wpa_supplicant) managing client-side [Wi-Fi](/page/Wi-Fi) authentication and association, while hostapd handles server-side operations for access points, including [IEEE 802.1X](/page/IEEE_802.1X)/[WPA](/page/WPA)/EAP authenticator functions.[](https://w1.fi/)[](https://w1.fi/wpa_supplicant/devel/)
Both tools are compiled from a shared source tree in the hostap [Git](/page/Git) repository, enabling unified builds that include either or both daemons depending on [configuration](/page/Configuration) flags.[](https://w1.fi/wpa_supplicant/devel/) The [configuration](/page/Configuration) files, hostapd.conf and wpa_supplicant.conf, exhibit structural similarities, particularly in sections defining EAP methods, such as shared parameters for certificates, TLS sessions, and user databases, which facilitate consistent implementation of [authentication](/page/Authentication) protocols across client and server roles.[](https://w1.fi/cgit/hostap/plain/hostapd/hostapd.conf)
A common use case involves deploying both on a single machine for testing internal networks, where virtual wireless interfaces allow hostapd to operate as the access point and [wpa_supplicant](/page/Wpa_supplicant) as the connecting client, simulating end-to-end [Wi-Fi](/page/Wi-Fi) interactions without additional hardware.
These tools share enhancements for modern security features, including support for WPA3 protocols like [SAE](/page/SAE) ([Simultaneous Authentication of Equals](/page/Simultaneous_Authentication_of_Equals)) and Protected Management Frames (PMF) to mitigate certain attack vectors, as well as integration with the mac80211_hwsim kernel module for simulating radio environments during development and testing.[](https://w1.fi/wpa_supplicant/)[](https://lists.infradead.org/pipermail/hostap/2016-October/036430.html)
### Use in Operating Systems and Distributions
hostapd is widely packaged and utilized in major [Linux](/page/Linux) distributions for creating wireless access points. In [Ubuntu](/page/Ubuntu), it is available through the official repositories and can be installed via the `apt` [package manager](/page/Package_manager), enabling users to set up [hotspot](/page/Hotspot)s with integration to tools like [NetworkManager](/page/NetworkManager) or direct [systemd](/page/Systemd) service management.[](https://www.cyberciti.biz/faq/debian-ubuntu-linux-setting-wireless-access-point/) Similarly, [Arch Linux](/page/Arch_Linux) includes hostapd in its core repositories, where it is documented for software access point configurations, often paired with [systemd](/page/Systemd) for automated [hotspot](/page/Hotspot) startup.[](https://wiki.archlinux.org/title/Software_access_point) Gentoo provides hostapd via the Portage system, allowing customization through USE flags for features like full dynamic [VLAN](/page/VLAN) support, and it is commonly deployed with [OpenRC](/page/OpenRC) or [systemd](/page/Systemd) for persistent [Wi-Fi](/page/Wi-Fi) services.[](https://wiki.gentoo.org/wiki/Hostapd)
In BSD variants, hostapd integrates seamlessly with native wireless stacks. FreeBSD offers hostapd through its ports collection, supporting the net80211 framework for [IEEE 802.11](/page/IEEE_802.11) access point management and authentication.[](https://www.freshports.org/net/hostapd/) [DragonFly BSD](/page/DragonFly_BSD) inherits similar net80211 compatibility, making hostapd available via dports (net/hostapd).[](https://www.dragonflybsd.org/release44/)
For mobile and embedded environments, [Android](/page/Android) bundles hostapd in the [Android Open Source Project](/page/AOSP) (AOSP) to support [Wi-Fi](/page/Wi-Fi) tethering and access point modes, interfacing with the framework's [HAL](/page/Hal) for vendor-specific drivers. [QNX](/page/QNX) incorporates hostapd as a utility for real-time embedded systems, providing [IEEE 802.11](/page/IEEE_802.11) AP and [RADIUS](/page/RADIUS) authentication capabilities in automotive and industrial applications.[](https://www.qnx.com/developers/docs/8.0/com.qnx.doc.neutrino.utilities/topic/h/hostapd.html)
Practical deployments highlight hostapd's versatility. LibreMesh, an OpenWrt-based framework for community mesh networks, relies on hostapd to manage access points and mesh interfaces across distributed nodes.[](https://blog.freifunk.net/2025/07/15/virtual-wifi-in-libremesh-real-virtual-mesh-midterm-project-update/) In [Raspberry Pi OS](/page/Raspberry_Pi_OS), hostapd is used to configure [IoT](/page/IOT) devices as wireless access points, often in conjunction with [dnsmasq](/page/Dnsmasq) for DHCP services in [home automation](/page/Home_automation) setups.[](https://pimylifeup.com/raspberry-pi-wireless-access-point/) Additionally, hostapd maintains compatibility with [Linux kernel](/page/Linux_kernel) modules like cfg80211, ensuring broad support for modern wireless hardware in these ecosystems. As of 2024, version 2.11 of hostapd, which includes support for [Wi-Fi](/page/Wi-Fi) Easy Connect (DPP release 3), is integrated in distributions such as [OpenWrt](/page/OpenWrt) and [Android](/page/Android).[](https://w1.fi/hostapd/files/hostapd-2.11.tar.gz)
## Security and Developments
### Supported Security Protocols
hostapd implements support for the Wi-Fi Protected Access (WPA) and [WPA2](/page/Wi-Fi_Protected_Access) protocols, enabling both Personal ([pre-shared key](/page/Pre-shared_key), PSK) and [Enterprise](/page/Enterprise) (802.1X/EAP-based) authentication modes. In Personal mode, [WPA](/page/WPA) uses the [Temporal Key Integrity Protocol](/page/Temporal_Key_Integrity_Protocol) (TKIP) for pairwise and group ciphers, providing per-packet [RC4](/page/RC4) encryption with Michael message integrity checks and replay protection. [WPA2](/page/Wi-Fi_Protected_Access), aligned with IEEE 802.11i, employs the Counter Mode Cipher Block Chaining [Message Authentication Code](/page/Message_authentication_code) Protocol (CCMP) based on [AES](/page/AES) for enhanced security, supporting pre-authentication and Pairwise Master Key [Security Association](/page/Security_association) (PMKSA) caching to optimize [roaming](/page/Roaming). Transition modes allow mixed [WPA](/page/WPA)/[WPA2](/page/Wi-Fi_Protected_Access) environments to accommodate legacy clients, while [WPA2](/page/Wi-Fi_Protected_Access)/WPA3 transitions are enabled using wpa=2 and wpa_key_mgmt including both WPA-PSK and [SAE](/page/SAE), for example.[](https://w1.fi/hostapd/)[](https://w1.fi/cgit/hostap/plain/hostapd/hostapd.conf)
WPA3 extends [security](/page/Security) with [Simultaneous Authentication of Equals](/page/Simultaneous_Authentication_of_Equals) (SAE) for Personal mode, replacing PSK to mitigate offline dictionary attacks through a dragonfly key exchange, using [elliptic curve](/page/Elliptic_curve) Diffie-Hellman groups specified in `sae_groups`. For open networks, Enhanced Open mode integrates Opportunistic [Wireless](/page/Wireless) [Encryption](/page/Encryption) (OWE), providing per-client pairwise [encryption](/page/Encryption) without [authentication](/page/Authentication) via Diffie-Hellman [key](/page/Key) [derivation](/page/Derivation), enabled through `owe_groups` and transition SSID parameters to facilitate [migration](/page/Migration) from legacy open networks. WPA3-Enterprise supports a 192-bit [security](/page/Security) suite (Suite B) for high-assurance environments, incorporating stronger ciphers like GCMP-256 and requiring Management Frame Protection, activated via `wpa_key_mgmt=WPA-EAP-SUITE-B-192`. These features ensure [forward secrecy](/page/Forward_secrecy) and protection against downgrade attacks when `transition_disable` bits are set appropriately.[](https://w1.fi/hostapd/)[](https://w1.fi/cgit/hostap/plain/hostapd/hostapd.conf)
As an IEEE 802.1X authenticator, hostapd integrates an internal EAP server supporting methods such as EAP-TLS for certificate-based mutual [authentication](/page/Authentication), EAP-TTLS and EAP-PEAP for tunneled credential exchange with inner methods like MSCHAPv2 or [PAP](/page/PAP), and EAP-SIM/EAP-AKA for SIM-based mobile [authentication](/page/Authentication). Configuration involves enabling `ieee8021x=1` and specifying EAP user databases via `eap_user_file`, with TLS support requiring certificate paths like `ca_cert` and `server_cert`. For external [authentication](/page/Authentication), hostapd acts as a [RADIUS](/page/RADIUS) client, forwarding EAP messages to servers defined by `auth_server_addr` and shared secrets, enabling scalable enterprise deployments.[](https://w1.fi/hostapd/)[](https://w1.fi/cgit/hostap/plain/hostapd/hostapd.conf)[](https://w1.fi/cgit/hostap/plain/hostapd/eap_testing.txt)
Additional security features include Management Frame Protection (MFP, IEEE 802.11w), which safeguards against [forgery](/page/Forgery) of disassociation and deauthentication frames using AES-128-CMAC, configurable as optional (`ieee80211w=1`) or required (`ieee80211w=2`) with `group_mgmt_cipher`. Client blacklisting occurs dynamically for stations exceeding authentication failure thresholds or violating policies, managed internally or via [RADIUS](/page/RADIUS) attributes. Session timeouts enforce reauthentication at intervals set by `eap_reauth_period` (default 3600 seconds) or inactivity limits via `ap_max_inactivity`, ensuring periodic key refresh and access revocation.[](https://w1.fi/cgit/hostap/plain/hostapd/hostapd.conf)[](https://w1.fi/hostapd/)
### Recent Updates and Vulnerabilities
In July 2024, the hostapd project released version 2.11, introducing preliminary support for [IEEE 802.11be](/page/IEEE_802.11be) (Wi-Fi 7) features, including enhancements to extremely high throughput (EHT) capabilities that enable better compatibility with modern hardware such as Intel's BE200 and MediaTek's MT792x chipsets through underlying [Linux kernel](/page/Linux_kernel) drivers like iwlwifi and mt76.[](https://lists.infradead.org/pipermail/hostap/2024-July/042847.html) This update also included various fixes for IEEE 802.11ax ([Wi-Fi 6](/page/Wi-Fi_6)) operations, improving stability for high-density environments and [multi-user MIMO](/page/Multi-user_MIMO) configurations. Additionally, Android's integration of hostapd has advanced Wi-Fi 7 support, with version 2.11 patches aligning with Android's multi-link operation (MLO) features to facilitate seamless device provisioning and enhanced throughput on compatible platforms.[](https://source.android.com/docs/core/connect/wifi-7)
Security vulnerabilities have prompted several critical patches in recent years. In March 2025, [Ubuntu](/page/Ubuntu) issued USN-7317-1, addressing side-channel attacks in hostapd and [wpa_supplicant](/page/Wpa_supplicant) arising from cache access patterns that could expose sensitive information, including private cryptographic keys, over the network.[](https://ubuntu.com/security/notices/USN-7317-1) Additionally, in March 2025, CVE-2025-24912 was disclosed, where hostapd fails to properly process crafted [RADIUS](/page/RADIUS) packets, enabling a man-in-the-middle attacker to cause authentication failures and denial of service. Patches have been provided for affected distributions.[](https://nvd.nist.gov/vuln/detail/CVE-2025-24912) Earlier, in 2024, hostapd fixed issues related to [Simultaneous Authentication of Equals](/page/Simultaneous_Authentication_of_Equals) (SAE) denial-of-service (DoS) risks through stricter validation of rejected groups in SAE Hash-to-Element (H2E) exchanges and improved downgrade protection during group key handshakes, mitigating potential attacks that could disrupt [authentication](/page/Authentication).[](https://w1.fi/security/) These fixes were detailed in advisories 2024-1 and 2024-2 from the project maintainers, emphasizing [RADIUS](/page/RADIUS) protocol forgery prevention and SAE enhancements to bolster WPA3 robustness.[](https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt)
Community contributions have focused on expanding hostapd's capabilities for emerging standards. Updates to the [Linux](/page/Linux) kernel's [wireless](/page/Wireless) [documentation](/page/Documentation) in 2024-2025 have incorporated guidance on hostapd's [integration](/page/Integration) with cfg80211 for advanced features, ensuring better [interoperability](/page/Interoperability) with diverse [hardware](/page/Hardware).[](https://wireless.docs.kernel.org/en/latest/en/users/documentation/hostapd.html) Ongoing patches and contributions have strengthened support for 6 GHz operations under IEEE 802.11ax, including improved channel availability confirmation (CAC) and automatic channel selection (ACS) for [Wi-Fi](/page/Wi-Fi) 6E deployments, addressing [regulatory compliance](/page/Regulatory_compliance) and performance in unlicensed spectrum bands.
Looking ahead, hostapd's development emphasizes enhanced Device Provisioning Protocol (DPP) features for secure onboarding, with version 2.11 adding support for DPP Release 3, which allows dynamic configurator parameters during [bootstrapping](/page/Bootstrapping) to simplify [IoT](/page/IOT) device integration without manual credential entry. In community forks like LibreMesh, extensions to hostapd enable advanced [mesh networking](/page/Mesh_networking) protocols, such as virtual Wi-Fi interfaces for simulated environments and improved 802.11s peering with SAE authentication, supporting scalable deployments in OpenWrt-based community networks as demonstrated in 2025 [Google Summer of Code](/page/Google_Summer_of_Code) projects.[](https://blog.freifunk.net/2025/07/15/virtual-wifi-in-libremesh-real-virtual-mesh-midterm-project-update/)[](https://github.com/libremesh/lime-packages)
This [configuration](/page/Configuration) enforces WPA2-Personal [authentication](/page/Authentication) with pre-shared key security.[](https://w1.fi/cgit/hostap/plain/hostapd/hostapd.conf) Launch it using the same command: `hostapd /etc/hostapd/hostapd.conf`.
To troubleshoot issues during setup, such as failure to start the AP or association problems, enable debug mode by running `hostapd -d /etc/hostapd/hostapd.conf`, which outputs verbose logs to the console for identifying errors like driver incompatibilities or channel conflicts. Additionally, ensure no conflicts with [network management](/page/Network_management) services by stopping [NetworkManager](/page/NetworkManager) if active: `systemctl stop NetworkManager`, as it may interfere with manual interface control. For persistent logging, add `logger_syslog=-1` and `logger_syslog_level=2` to the [configuration file](/page/Configuration_file) and monitor system logs via [syslog](/page/Syslog).
## Integrations and Related Software
### Relation to wpa_supplicant
hostapd and [wpa_supplicant](/page/Wpa_supplicant) are developed as complementary components within the same open-source project led by Jouni Malinen, with [wpa_supplicant](/page/Wpa_supplicant) managing client-side [Wi-Fi](/page/Wi-Fi) authentication and association, while hostapd handles server-side operations for access points, including [IEEE 802.1X](/page/IEEE_802.1X)/[WPA](/page/WPA)/EAP authenticator functions.[](https://w1.fi/)[](https://w1.fi/wpa_supplicant/devel/)
Both tools are compiled from a shared source tree in the hostap [Git](/page/Git) repository, enabling unified builds that include either or both daemons depending on [configuration](/page/Configuration) flags.[](https://w1.fi/wpa_supplicant/devel/) The [configuration](/page/Configuration) files, hostapd.conf and wpa_supplicant.conf, exhibit structural similarities, particularly in sections defining EAP methods, such as shared parameters for certificates, TLS sessions, and user databases, which facilitate consistent implementation of [authentication](/page/Authentication) protocols across client and server roles.[](https://w1.fi/cgit/hostap/plain/hostapd/hostapd.conf)
A common use case involves deploying both on a single machine for testing internal networks, where virtual wireless interfaces allow hostapd to operate as the access point and [wpa_supplicant](/page/Wpa_supplicant) as the connecting client, simulating end-to-end [Wi-Fi](/page/Wi-Fi) interactions without additional hardware.
These tools share enhancements for modern security features, including support for WPA3 protocols like [SAE](/page/SAE) ([Simultaneous Authentication of Equals](/page/Simultaneous_Authentication_of_Equals)) and Protected Management Frames (PMF) to mitigate certain attack vectors, as well as integration with the mac80211_hwsim kernel module for simulating radio environments during development and testing.[](https://w1.fi/wpa_supplicant/)[](https://lists.infradead.org/pipermail/hostap/2016-October/036430.html)
### Use in Operating Systems and Distributions
hostapd is widely packaged and utilized in major [Linux](/page/Linux) distributions for creating wireless access points. In [Ubuntu](/page/Ubuntu), it is available through the official repositories and can be installed via the `apt` [package manager](/page/Package_manager), enabling users to set up [hotspot](/page/Hotspot)s with integration to tools like [NetworkManager](/page/NetworkManager) or direct [systemd](/page/Systemd) service management.[](https://www.cyberciti.biz/faq/debian-ubuntu-linux-setting-wireless-access-point/) Similarly, [Arch Linux](/page/Arch_Linux) includes hostapd in its core repositories, where it is documented for software access point configurations, often paired with [systemd](/page/Systemd) for automated [hotspot](/page/Hotspot) startup.[](https://wiki.archlinux.org/title/Software_access_point) Gentoo provides hostapd via the Portage system, allowing customization through USE flags for features like full dynamic [VLAN](/page/VLAN) support, and it is commonly deployed with [OpenRC](/page/OpenRC) or [systemd](/page/Systemd) for persistent [Wi-Fi](/page/Wi-Fi) services.[](https://wiki.gentoo.org/wiki/Hostapd)
In BSD variants, hostapd integrates seamlessly with native wireless stacks. FreeBSD offers hostapd through its ports collection, supporting the net80211 framework for [IEEE 802.11](/page/IEEE_802.11) access point management and authentication.[](https://www.freshports.org/net/hostapd/) [DragonFly BSD](/page/DragonFly_BSD) inherits similar net80211 compatibility, making hostapd available via dports (net/hostapd).[](https://www.dragonflybsd.org/release44/)
For mobile and embedded environments, [Android](/page/Android) bundles hostapd in the [Android Open Source Project](/page/AOSP) (AOSP) to support [Wi-Fi](/page/Wi-Fi) tethering and access point modes, interfacing with the framework's [HAL](/page/Hal) for vendor-specific drivers. [QNX](/page/QNX) incorporates hostapd as a utility for real-time embedded systems, providing [IEEE 802.11](/page/IEEE_802.11) AP and [RADIUS](/page/RADIUS) authentication capabilities in automotive and industrial applications.[](https://www.qnx.com/developers/docs/8.0/com.qnx.doc.neutrino.utilities/topic/h/hostapd.html)
Practical deployments highlight hostapd's versatility. LibreMesh, an OpenWrt-based framework for community mesh networks, relies on hostapd to manage access points and mesh interfaces across distributed nodes.[](https://blog.freifunk.net/2025/07/15/virtual-wifi-in-libremesh-real-virtual-mesh-midterm-project-update/) In [Raspberry Pi OS](/page/Raspberry_Pi_OS), hostapd is used to configure [IoT](/page/IOT) devices as wireless access points, often in conjunction with [dnsmasq](/page/Dnsmasq) for DHCP services in [home automation](/page/Home_automation) setups.[](https://pimylifeup.com/raspberry-pi-wireless-access-point/) Additionally, hostapd maintains compatibility with [Linux kernel](/page/Linux_kernel) modules like cfg80211, ensuring broad support for modern wireless hardware in these ecosystems. As of 2024, version 2.11 of hostapd, which includes support for [Wi-Fi](/page/Wi-Fi) Easy Connect (DPP release 3), is integrated in distributions such as [OpenWrt](/page/OpenWrt) and [Android](/page/Android).[](https://w1.fi/hostapd/files/hostapd-2.11.tar.gz)
## Security and Developments
### Supported Security Protocols
hostapd implements support for the Wi-Fi Protected Access (WPA) and [WPA2](/page/Wi-Fi_Protected_Access) protocols, enabling both Personal ([pre-shared key](/page/Pre-shared_key), PSK) and [Enterprise](/page/Enterprise) (802.1X/EAP-based) authentication modes. In Personal mode, [WPA](/page/WPA) uses the [Temporal Key Integrity Protocol](/page/Temporal_Key_Integrity_Protocol) (TKIP) for pairwise and group ciphers, providing per-packet [RC4](/page/RC4) encryption with Michael message integrity checks and replay protection. [WPA2](/page/Wi-Fi_Protected_Access), aligned with IEEE 802.11i, employs the Counter Mode Cipher Block Chaining [Message Authentication Code](/page/Message_authentication_code) Protocol (CCMP) based on [AES](/page/AES) for enhanced security, supporting pre-authentication and Pairwise Master Key [Security Association](/page/Security_association) (PMKSA) caching to optimize [roaming](/page/Roaming). Transition modes allow mixed [WPA](/page/WPA)/[WPA2](/page/Wi-Fi_Protected_Access) environments to accommodate legacy clients, while [WPA2](/page/Wi-Fi_Protected_Access)/WPA3 transitions are enabled using wpa=2 and wpa_key_mgmt including both WPA-PSK and [SAE](/page/SAE), for example.[](https://w1.fi/hostapd/)[](https://w1.fi/cgit/hostap/plain/hostapd/hostapd.conf)
WPA3 extends [security](/page/Security) with [Simultaneous Authentication of Equals](/page/Simultaneous_Authentication_of_Equals) (SAE) for Personal mode, replacing PSK to mitigate offline dictionary attacks through a dragonfly key exchange, using [elliptic curve](/page/Elliptic_curve) Diffie-Hellman groups specified in `sae_groups`. For open networks, Enhanced Open mode integrates Opportunistic [Wireless](/page/Wireless) [Encryption](/page/Encryption) (OWE), providing per-client pairwise [encryption](/page/Encryption) without [authentication](/page/Authentication) via Diffie-Hellman [key](/page/Key) [derivation](/page/Derivation), enabled through `owe_groups` and transition SSID parameters to facilitate [migration](/page/Migration) from legacy open networks. WPA3-Enterprise supports a 192-bit [security](/page/Security) suite (Suite B) for high-assurance environments, incorporating stronger ciphers like GCMP-256 and requiring Management Frame Protection, activated via `wpa_key_mgmt=WPA-EAP-SUITE-B-192`. These features ensure [forward secrecy](/page/Forward_secrecy) and protection against downgrade attacks when `transition_disable` bits are set appropriately.[](https://w1.fi/hostapd/)[](https://w1.fi/cgit/hostap/plain/hostapd/hostapd.conf)
As an IEEE 802.1X authenticator, hostapd integrates an internal EAP server supporting methods such as EAP-TLS for certificate-based mutual [authentication](/page/Authentication), EAP-TTLS and EAP-PEAP for tunneled credential exchange with inner methods like MSCHAPv2 or [PAP](/page/PAP), and EAP-SIM/EAP-AKA for SIM-based mobile [authentication](/page/Authentication). Configuration involves enabling `ieee8021x=1` and specifying EAP user databases via `eap_user_file`, with TLS support requiring certificate paths like `ca_cert` and `server_cert`. For external [authentication](/page/Authentication), hostapd acts as a [RADIUS](/page/RADIUS) client, forwarding EAP messages to servers defined by `auth_server_addr` and shared secrets, enabling scalable enterprise deployments.[](https://w1.fi/hostapd/)[](https://w1.fi/cgit/hostap/plain/hostapd/hostapd.conf)[](https://w1.fi/cgit/hostap/plain/hostapd/eap_testing.txt)
Additional security features include Management Frame Protection (MFP, IEEE 802.11w), which safeguards against [forgery](/page/Forgery) of disassociation and deauthentication frames using AES-128-CMAC, configurable as optional (`ieee80211w=1`) or required (`ieee80211w=2`) with `group_mgmt_cipher`. Client blacklisting occurs dynamically for stations exceeding authentication failure thresholds or violating policies, managed internally or via [RADIUS](/page/RADIUS) attributes. Session timeouts enforce reauthentication at intervals set by `eap_reauth_period` (default 3600 seconds) or inactivity limits via `ap_max_inactivity`, ensuring periodic key refresh and access revocation.[](https://w1.fi/cgit/hostap/plain/hostapd/hostapd.conf)[](https://w1.fi/hostapd/)
### Recent Updates and Vulnerabilities
In July 2024, the hostapd project released version 2.11, introducing preliminary support for [IEEE 802.11be](/page/IEEE_802.11be) (Wi-Fi 7) features, including enhancements to extremely high throughput (EHT) capabilities that enable better compatibility with modern hardware such as Intel's BE200 and MediaTek's MT792x chipsets through underlying [Linux kernel](/page/Linux_kernel) drivers like iwlwifi and mt76.[](https://lists.infradead.org/pipermail/hostap/2024-July/042847.html) This update also included various fixes for IEEE 802.11ax ([Wi-Fi 6](/page/Wi-Fi_6)) operations, improving stability for high-density environments and [multi-user MIMO](/page/Multi-user_MIMO) configurations. Additionally, Android's integration of hostapd has advanced Wi-Fi 7 support, with version 2.11 patches aligning with Android's multi-link operation (MLO) features to facilitate seamless device provisioning and enhanced throughput on compatible platforms.[](https://source.android.com/docs/core/connect/wifi-7)
Security vulnerabilities have prompted several critical patches in recent years. In March 2025, [Ubuntu](/page/Ubuntu) issued USN-7317-1, addressing side-channel attacks in hostapd and [wpa_supplicant](/page/Wpa_supplicant) arising from cache access patterns that could expose sensitive information, including private cryptographic keys, over the network.[](https://ubuntu.com/security/notices/USN-7317-1) Additionally, in March 2025, CVE-2025-24912 was disclosed, where hostapd fails to properly process crafted [RADIUS](/page/RADIUS) packets, enabling a man-in-the-middle attacker to cause authentication failures and denial of service. Patches have been provided for affected distributions.[](https://nvd.nist.gov/vuln/detail/CVE-2025-24912) Earlier, in 2024, hostapd fixed issues related to [Simultaneous Authentication of Equals](/page/Simultaneous_Authentication_of_Equals) (SAE) denial-of-service (DoS) risks through stricter validation of rejected groups in SAE Hash-to-Element (H2E) exchanges and improved downgrade protection during group key handshakes, mitigating potential attacks that could disrupt [authentication](/page/Authentication).[](https://w1.fi/security/) These fixes were detailed in advisories 2024-1 and 2024-2 from the project maintainers, emphasizing [RADIUS](/page/RADIUS) protocol forgery prevention and SAE enhancements to bolster WPA3 robustness.[](https://w1.fi/security/2024-1/hostapd-and-radius-protocol-forgery-attacks.txt)
Community contributions have focused on expanding hostapd's capabilities for emerging standards. Updates to the [Linux](/page/Linux) kernel's [wireless](/page/Wireless) [documentation](/page/Documentation) in 2024-2025 have incorporated guidance on hostapd's [integration](/page/Integration) with cfg80211 for advanced features, ensuring better [interoperability](/page/Interoperability) with diverse [hardware](/page/Hardware).[](https://wireless.docs.kernel.org/en/latest/en/users/documentation/hostapd.html) Ongoing patches and contributions have strengthened support for 6 GHz operations under IEEE 802.11ax, including improved channel availability confirmation (CAC) and automatic channel selection (ACS) for [Wi-Fi](/page/Wi-Fi) 6E deployments, addressing [regulatory compliance](/page/Regulatory_compliance) and performance in unlicensed spectrum bands.
Looking ahead, hostapd's development emphasizes enhanced Device Provisioning Protocol (DPP) features for secure onboarding, with version 2.11 adding support for DPP Release 3, which allows dynamic configurator parameters during [bootstrapping](/page/Bootstrapping) to simplify [IoT](/page/IOT) device integration without manual credential entry. In community forks like LibreMesh, extensions to hostapd enable advanced [mesh networking](/page/Mesh_networking) protocols, such as virtual Wi-Fi interfaces for simulated environments and improved 802.11s peering with SAE authentication, supporting scalable deployments in OpenWrt-based community networks as demonstrated in 2025 [Google Summer of Code](/page/Google_Summer_of_Code) projects.[](https://blog.freifunk.net/2025/07/15/virtual-wifi-in-libremesh-real-virtual-mesh-midterm-project-update/)[](https://github.com/libremesh/lime-packages)