One step further for #OpenHarbors with my #tc hackery/prototype. The client/supplicant seems to now receive the #EAPoL from the remote, bridged AP fine and replies to it. Next need to get the reply back to the remote AP.
Initially wasn't sure if I could get EAPoL injected like this. But as long as the MAC address is the same as the original authenticator then it seems to work. Did a bit of skb marking via tc to drop and allow the correct frames.
Initially wasn't sure if I could get EAPoL injected like this. But as long as the MAC address is the same as the original authenticator then it seems to work. Did a bit of skb marking via tc to drop and allow the correct frames.

Amber (@