MonkWho / pfatt

Enable true bridge mode for AT&T U-Verse and pfSense (this is a fork of an original repository https://github.com/aus/pfatt. Since it is not available anymore, I'll do my best to maintain a copy for people that still need a bypass)
438 stars 170 forks source link

Refreshed supplicant mode #44

Closed grevelle closed 3 years ago

grevelle commented 3 years ago

I took the current master and refreshed the supplicant branch version. I updated pfatt.sh.

maxfield-allison commented 3 years ago

I might be nit picking here but could you clean up the PR and recommit. Looks good from what I reviewed so far.

grevelle commented 3 years ago

Given that the latest version of pfsense broke this program, I’ll wait until pfsense is patched and then verify that everything works again and touch it up.

From: Maxfield Allison @.> Sent: Tuesday, March 9, 2021 7:45 AM To: MonkWho/pfatt @.> Cc: Greg Revelle @.>; Author @.> Subject: Re: [MonkWho/pfatt] Refreshed supplicant mode (#44)

I might be nit picking here but could you clean up the PR and recommit. Looks good from what I reviewed so far.

— You are receiving this because you authored the thread. Reply to this email directly, view it on GitHubhttps://github.com/MonkWho/pfatt/pull/44#issuecomment-793917419, or unsubscribehttps://github.com/notifications/unsubscribe-auth/AHRNGQOP3AWD3M3ZMVTKAY3TCYJ4TANCNFSM4V3CL5QA.

grevelle commented 3 years ago

I made a few edits – it works with the new wpa_supplicant file.

From: Maxfield Allison @.> Sent: Tuesday, March 9, 2021 7:45 AM To: MonkWho/pfatt @.> Cc: Greg Revelle @.>; Author @.> Subject: Re: [MonkWho/pfatt] Refreshed supplicant mode (#44)

I might be nit picking here but could you clean up the PR and recommit. Looks good from what I reviewed so far.

— You are receiving this because you authored the thread. Reply to this email directly, view it on GitHubhttps://github.com/MonkWho/pfatt/pull/44#issuecomment-793917419, or unsubscribehttps://github.com/notifications/unsubscribe-auth/AHRNGQOP3AWD3M3ZMVTKAY3TCYJ4TANCNFSM4V3CL5QA.