edoput / netjsonconfig

Network configuration management library based on NetJSON DeviceConfiguration
http://netjsonconfig.openwisp.org/
Other
1 stars 0 forks source link

wpasupplicant section #22

Closed edoput closed 7 years ago

edoput commented 7 years ago

Keys to evaluate with defaults

The only supported encryption are WPA2-AES or None

WPA2-AES

the authentication can be either PSK or EAP and maps to personal and enterprise in our schema definitions


wpasupplicant.device.1.profile=AUTO
wpasupplicant.device.1.status=disabled

wpasupplicant.profile.1.name=AUTO
# network 1
wpasupplicant.profile.1.network.ssid # from  netjson
wpasupplicant.profile.1.network.1.key_mgmt.1.name=NONE
wpasupplicant.profile.1.network.1.priority=100
# network 2, WTF is this
wpasupplicant.profile.1.network.2.key_mgmt.1.name=NONE
wpasupplicant.profile.1.network.2.priority=2
wpasupplicant.profile.1.network.2.status=disabled

I don't really have an idea of what this is and what doest it configure.

I found most of these keys on a station configuration

edoput commented 7 years ago

Always for a station configuration with WPA2-psk

wpasupplicant.status=enabled

wpasupplicant.device.1.status=enabled
wpasupplicant.device.1.profile=AUTO
wpasupplicant.device.1.driver=madwifi # new
wpasupplicant.device.1.devname=ath0 # new

wpasupplicant.profile.1.name=AUTO
# network 1
wpasupplicant.profile.1.network.1.phase2=auth=MSCHAPV2 
wpasupplicant.profile.1.network.1.eap.1.status=disabled 
wpasupplicant.profile.1.network.1.psk=#the psk in clear text
wpasupplicant.profile.1.network.1.pairwise.1.name=CCMP
wpasupplicant.profile.1.network.1.proto.1.name=RSN
wpasupplicant.profile.1.network.1.ssid=ubnt
wpasupplicant.profile.1.network.1.priority=100
wpasupplicant.profile.1.network.1.key_mgmt.1.name=WPA-PSK
# network 2
wpasupplicant.profile.1.network.2.status=disabled
wpasupplicant.profile.1.network.2.priority=2
wpasupplicant.profile.1.network.2.key_mgmt.1.name=NONE
edoput commented 7 years ago

station configuration for WPA-eap

wpasupplicant.status=enabled

wpasupplicant.device.1.status=enabled
wpasupplicant.device.1.profile=AUTO
wpasupplicant.device.1.driver=madwifi
wpasupplicant.device.1.devname=ath0

wpasupplicant.profile.1.name=AUTO
# network 1

wpasupplicant.profile.1.network.1.phase2=auth=MSCHAPV2
wpasupplicant.profile.1.network.1.eap.1.name=TTLS
wpasupplicant.profile.1.network.1.eap.1.status=enabled
wpasupplicant.profile.1.network.1.password# the password in clear text
wpasupplicant.profile.1.network.1.identity# eap identity
wpasupplicant.profile.1.network.1.anonymous_identity# eap anonymous identity
wpasupplicant.profile.1.network.1.psk # the network password in clear text
wpasupplicant.profile.1.network.1.pairwise.1.name=CCMP
wpasupplicant.profile.1.network.1.proto.1.name=RSN
wpasupplicant.profile.1.network.1.ssid # from netjson
wpasupplicant.profile.1.network.1.priority=100
wpasupplicant.profile.1.network.1.key_mgmt.1.name=WPA-EAP

# network 2
wpasupplicant.profile.1.network.2.status=disabled
wpasupplicant.profile.1.network.2.priority=2
wpasupplicant.profile.1.network.2.key_mgmt.1.name=NONE
edoput commented 7 years ago

There is no difference between changing wireless mode from station to station ptmp

wpasupplicant.status=enabled
# device
wpasupplicant.device.1.status=enabled
wpasupplicant.device.1.profile=AUTO
wpasupplicant.device.1.driver=madwifi
wpasupplicant.device.1.devname=ath0

wpasupplicant.profile.1.name=AUTO

# network 1
wpasupplicant.profile.1.network.1.phase2=auth=MSCHAPV2
wpasupplicant.profile.1.network.1.eap.1.status=disabled
wpasupplicant.profile.1.network.1.psk
wpasupplicant.profile.1.network.1.pairwise.1.name=CCMP
wpasupplicant.profile.1.network.1.proto.1.name=RSN
wpasupplicant.profile.1.network.1.ssid=ubnt
wpasupplicant.profile.1.network.1.priority=100
wpasupplicant.profile.1.network.1.key_mgmt.1.name=WPA-PSK

# network 2
wpasupplicant.profile.1.network.2.status=disabled
wpasupplicant.profile.1.network.2.priority=2
wpasupplicant.profile.1.network.2.key_mgmt.1.name=NONE
edoput commented 7 years ago

Now the only remaining bits are configuring EAP for wpa2_enterprise