From d59354e52a8a7fbdd6bb0a020f50600d64c799a9 Mon Sep 17 00:00:00 2001 From: Christian Poessinger Date: Tue, 29 Dec 2020 11:34:40 +0100 Subject: ethernet: T1466: add EAPoL support --- data/templates/ethernet/wpa_supplicant.conf.tmpl | 72 ++++++++++++++++++++++++ 1 file changed, 72 insertions(+) create mode 100644 data/templates/ethernet/wpa_supplicant.conf.tmpl (limited to 'data/templates') diff --git a/data/templates/ethernet/wpa_supplicant.conf.tmpl b/data/templates/ethernet/wpa_supplicant.conf.tmpl new file mode 100644 index 000000000..fe518ad45 --- /dev/null +++ b/data/templates/ethernet/wpa_supplicant.conf.tmpl @@ -0,0 +1,72 @@ +### Autogenerated by interfaces-ethernet.py ### + +# see full documentation: +# https://w1.fi/cgit/hostap/plain/wpa_supplicant/wpa_supplicant.conf + +# For UNIX domain sockets (default on Linux and BSD): This is a directory that +# will be created for UNIX domain sockets for listening to requests from +# external programs (CLI/GUI, etc.) for status information and configuration. +# The socket file will be named based on the interface name, so multiple +# wpa_supplicant processes can be run at the same time if more than one +# interface is used. +# /var/run/wpa_supplicant is the recommended directory for sockets and by +# default, wpa_cli will use it when trying to connect with wpa_supplicant. +ctrl_interface=/run/wpa_supplicant + +# IEEE 802.1X/EAPOL version +# wpa_supplicant is implemented based on IEEE Std 802.1X-2004 which defines +# EAPOL version 2. However, there are many APs that do not handle the new +# version number correctly (they seem to drop the frames completely). In order +# to make wpa_supplicant interoperate with these APs, the version number is set +# to 1 by default. This configuration value can be used to set it to the new +# version (2). +# Note: When using MACsec, eapol_version shall be set to 3, which is +# defined in IEEE Std 802.1X-2010. +eapol_version=2 + +# No need to scan for access points in EAPoL mode +ap_scan=0 + +# EAP fast re-authentication +fast_reauth=1 + +network={ +{% if eapol is defined and eapol is not none %} +{% if eapol.ca_cert_file is defined and eapol.ca_cert_file is not none %} + ca_cert="{{ eapol.ca_cert_file }}" +{% endif %} + client_cert="{{ eapol.cert_file }}" + private_key="{{ eapol.key_file }}" +{% endif %} + + # list of accepted authenticated key management protocols + key_mgmt=IEEE8021X + eap=TLS + +{% if mac is defined and mac is not none %} + identity="{{ mac }}" +{% else %} + identity="{{ hw_id }}" +{% endif %} + + # eapol_flags: IEEE 802.1X/EAPOL options (bit field) + # Dynamic WEP key required for non-WPA mode + # bit0 (1): require dynamically generated unicast WEP key + # bit1 (2): require dynamically generated broadcast WEP key + # (3) = require both keys; default) + # Note: When using wired authentication (including MACsec drivers), + # eapol_flags must be set to 0 for the authentication to be completed + # successfully. + eapol_flags=0 + + # For wired IEEE 802.1X authentication, "allow_canned_success=1" can be + # used to configure a mode that allows EAP-Success (and EAP-Failure) without + # going through authentication step. Some switches use such sequence when + # forcing the port to be authorized/unauthorized or as a fallback option if + # the authentication server is unreachable. By default, wpa_supplicant + # discards such frames to protect against potential attacks by rogue + # devices, but this option can be used to disable that protection for cases + # where the server/authenticator does not need to be authenticated. + phase1="allow_canned_success=1" +} + -- cgit v1.2.3