Project

General

Profile

(View Message) » wpa_supplicant.mycon.conf

nona, 2023-01-03 03:16 PM

 
1
# This is /etc/wpa_supplicant/wpa_supplicant.mycon.conf .
2
#
3
# Copyright 2022 nona
4
# License: Gnu Public License version 3 (GPLv3)
5
#
6
# Change the password (and SSID) as needed
7
# Use like this:
8
#   chmod 600 /etc/wpa_supplicant/wpa_supplicant.mycon.conf
9
#   wpa_supplicant -Dwired -B -ieth0 -c/etc/wpa_supplicant/wpa_supplicant.mycon.conf
10
#   dhcpcd -i eth0
11
#
12
# To terminate the connection
13
#   wpa_cli terminate
14
#   dhcpcd -k
15
#
16
# Tested on Parabola GNU/Linux
17
#   dhcpcd 9.4.1
18
#   wpa_supplicant v2.10
19
#   linux-libre 5.18.12-gnu
20
#
21
# Alternatively, if using OpenRC, rename this file to- or
22
# create a symlink to this file from
23
# /etc/wpa_supplicant/wpa_supplicant.conf (see
24
# /etc/init.d/wpa_supplicant.conf), then
25
#   rc-service dhcpcd start
26
#
27
# (dhcpcd loads wpa_supplicant)
28

    
29
# https://wiki.archlinux.org/title/Wpa_supplicant
30
# Giving configuration update rights to wpa_cli
31
ctrl_interface=/run/wpa_supplicant
32
# enable users without root access  to connect to wireless networks and use wpa_clix
33
ctrl_interface_group=wheel
34
# store changes made with wpa_cli
35
update_config=1
36

    
37
# https://bbs.archlinux.org/viewtopic.php?id=188783
38
# https://wiki.archlinux.org/title/Wpa_supplicant#802.1x/radius
39
# Wired Ethernet drivers
40
ap_scan=0
41
# # Wireless
42
# ap_scan=1
43

    
44
network={
45
    key_mgmt=IEEE8021X
46
    eap=PEAP
47
    # The name does not really matter
48
#   ssid="network name"
49
    # This is the one recommended by my current provider
50
    ca_cert="/etc/ssl/certs/USERTrust_RSA_Certification_Authority.pem"
51
    # Quotes should remain
52
    identity="my username"
53
    password="mycomplicated password"
54
    # Does not work
55
    # To get psk, run:
56
    #   wpa_passphrase campusroam <passphrase>
57
	# psk=79ca4b0df794ca14a824a5254199b914c17cab47ddcdd3d4b3532fcd23bac2bd
58

    
59
    # # You can omit this (MSCHAPv2 is the default)
60
    # phase2="autheap=MSCHAPV2"
61
}
62

    
63
# wpa_cli
64
# > status
65
# bssid=<your bssid>
66
# freq=0
67
# ssid=<your ssid>
68
# id=0
69
# mode=station
70
# pairwise_cipher=NONE
71
# group_cipher=NONE
72
# key_mgmt=IEEE 802.1X (no WPA)
73
# wpa_state=COMPLETED
74
# address=<your MAC>
75
# Supplicant PAE state=AUTHENTICATED
76
# suppPortStatus=Authorized
77
# EAP state=SUCCESS
78
# selectedMethod=25 (EAP-PEAP)
79
# eap_tls_version=TLSv1.2
80
# EAP TLS cipher=AES256-GCM-SHA384
81
# tls_session_reused=0
82
# EAP-PEAPv0 Phase2 method=MSCHAPV2
83
# eap_session_id=<something very long>
84
# uuid=<an UUID>
(1-1/2)