Wi-Fi Protected Access
#navi(contents-page-name): No such page: LinuxCONTENTS
REFERENCES
MIB | description |
---|---|
DOT11_RSN_ENABLED | WPA enable or disable |
DOT11_RSN_CONFIG_MULTICAST_CIPHER | WEP40,TKIP,CCMP(AES),WEP104 |
DOT11_RSN_CONFIG_UNICAST_CIPHER | WEP40,TKIP,CCMP(AES),WEP104 |
DOT11_RSN_CONFIG_AUTH_SUITE | WPA(802.1x),WPA(PreSharedKey),WPA-none(11Adhoc) |
DOT11_PMK_TSC | |
DOT11_GMK1_TSC | |
DOT11_GMK2_TSC |
OID_AUTH_MODE | OID_WEP_STATUS | ENABLED | UNICAST_CIPHER | MULTICAST_CIPHER | AUTH_SUITE |
---|---|---|---|---|---|
Open/Shared | Encyption1Enabled | WPA disable | |||
WPAPSK | TEncyption2Enabled | WPA enable | TKIP | TKIP | WPA(PreSharedKey) |
WPAPSK | TEncyption2Enabled | WPA enable | TKIP | WEP40 | WPA(PreSharedKey) |
WPAPSK | TEncyption3Enabled | WPA enable | CCMP(AES) | CCMP(AES) | WPA(PreSharedKey) |
WPAPSK | TEncyption3Enabled | WPA enable | CCMP(AES) | TKIP | WPA(PreSharedKey) |
WPAPSK | TEncyption3Enabled | WPA enable | CCMP(AES) | WEP40 | WPA(PreSharedKey) |
WPA | TEncyption2Enabled | WPA enable | TKIP | TKIP | WPA(802.1x) |
WPA | TEncyption2Enabled | WPA enable | TKIP | WEP40 | WPA(802.1x) |
WPA | TEncyption3Enabled | WPA enable | CCMP(AES) | CCMP(AES) | WPA(802.1x) |
WPA | TEncyption3Enabled | WPA enable | CCMP(AES) | TKIP | WPA(802.1x) |
WPA | TEncyption3Enabled | WPA enable | CCMP(AES) | WEP40 | WPA(802.1x) |
Firmware | 2.2.0c |
SSID | tacoma |
Channel | 1 |
WPA-PSK(AES) | aesaesaes |
Firmware | 3.0.5c |
SSID | ioAirportAp13 |
Channnel | 13 |
WPA-PSK(TKIP) | hidemaru4000en |
FreeBSD ガ━━ΣΣ(゚Д゚;)━━ン
# portinstall security/wpa_supplicant/ [Updating the pkgdb <format:bdb1_btree> in /var/db/pkg ... - 204 packages found (-0 +0) done] ** Port marked as IGNORE: security/wpa_supplicant: is not supported on FreeBSD < 6.0
Debian
# apt-get install wpasupplicant
# cat /etc/default/wpasupplicant ENABLED=1 OPTIONS="-Dmadwifi -iath0 -c/etc/wpa_supplicant.conf -dd -w"
# cat /etc/wpa_supplicant.conf ctrl_interface=/var/run/wpa_supplicant ctrl_interface_group=0 ap_scan=1 network={ ssid="ioAirportAp13" psk="hidemaru4000en" priority=1 } network={ ssid="tacoma" psk="aesaesaes" priority=2 }
# /etc/init.d/wpasupplicant start Starting wpasupplicant: Initializing interface 'ath0' conf '/etc/wpa_supplicant.conf' driver 'madwifi' Configuration file '/etc/wpa_supplicant.conf' -> '/etc/wpa_supplicant.conf' Reading configuration file '/etc/wpa_supplicant.conf' ctrl_interface='/var/run/wpa_supplicant' ctrl_interface_group=0 ap_scan=1 Line: 4 - start of a new network block ssid - hexdump_ascii(len=13): 69 6f 41 69 72 70 6f 72 74 41 70 31 33 ioAirportAp13 PSK (ASCII passphrase) - hexdump_ascii(len=14): [REMOVED] priority=5 (0x5) PSK (from passphrase) - hexdump(len=32): [REMOVED] Priority group 5 id=0 ssid='ioAirportAp13' Daemonize.. done.
# iwconfig ath0 ath0 IEEE 802.11g ESSID:"ioAirportAp13" Mode:Managed Frequency:2.472 GHz Access Point: 00:A0:B0:6A:09:00 Bit Rate:36 Mb/s Tx-Power:50 dBm Sensitivity=0/3 Retry:off RTS thr:off Fragment thr:off Encryption key:41E0-9CF8-AF33-EDF7-00DD-4CC4-3C9D-2277 Security mode:restricted Power Management:off Link Quality=46/94 Signal level=-49 dBm Noise level=-95 dBm Rx invalid nwid:0 Rx invalid crypt:0 Rx invalid frag:0 Tx excessive retries:0 Invalid misc:0 Missed beacon:0
# dhclient ath0 Internet Software Consortium DHCP Client 2.0pl5 Copyright 1995, 1996, 1997, 1998, 1999 The Internet Software Consortium. All rights reserved. Please contribute if you find this software useful. For info, please visit http://www.isc.org/dhcp-contrib.html sit0: unknown hardware address type 776 eth1: unknown hardware address type 24 sit0: unknown hardware address type 776 eth1: unknown hardware address type 24 Listening on LPF/ath0/00:a0:b0:4c:5b:b8 Sending on LPF/ath0/00:a0:b0:4c:5b:b8 Sending on Socket/fallback/fallback-net DHCPDISCOVER on ath0 to 255.255.255.255 port 67 interval 7 DHCPOFFER from 192.168.104.1 DHCPREQUEST on ath0 to 255.255.255.255 port 67 DHCPACK from 192.168.104.1 bound to 192.168.104.3 -- renewal in 43200 seconds.
# ifconfig ath0 ath0 Link encap:Ethernet HWaddr 00:A0:B0:4C:5B:B8 inet addr:192.168.104.3 Bcast:192.168.104.255 Mask:255.255.255.0 inet6 addr: fe80::2a0:b0ff:fe4c:5bb8/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:319 errors:24 dropped:0 overruns:0 frame:24 TX packets:40 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:199 RX bytes:98324 (96.0 KiB) TX bytes:5139 (5.0 KiB) Interrupt:10 Memory:dfc3f000-dfc4f000
# ping 192.168.104.1 PING 192.168.104.1 (192.168.104.1) 56(84) bytes of data. 64 bytes from 192.168.104.1: icmp_seq=1 ttl=127 time=0.627 ms
radiusd -X
rad_recv: Access-Request packet from host 192.168.100.1:1202, id=204, length=142 User-Name = "hasebe" NAS-IP-Address = 192.168.123.1 NAS-Port = 0 Called-Station-Id = "00-A0-B0-46-85-E2" Calling-Station-Id = "00-A0-B0-4C-5B-B8" NAS-Identifier = "tacoma" Framed-MTU = 1380 NAS-Port-Type = Wireless-802.11 EAP-Message = 0x020500060d00 State = 0xa400d73454b06110b20bb42ad551e5d4 Message-Authenticator = 0xf25aa2cbda033033b6f726c1486e395f Processing the authorize section of radiusd.conf modcall: entering group authorize for request 17 modcall[authorize]: module "preprocess" returns ok for request 17 modcall[authorize]: module "chap" returns noop for request 17 modcall[authorize]: module "mschap" returns noop for request 17 rlm_realm: No '@' in User-Name = "hasebe", looking up realm NULL rlm_realm: No such realm "NULL" modcall[authorize]: module "suffix" returns noop for request 17 rlm_eap: EAP packet type response id 5 length 6 rlm_eap: No EAP Start, assuming it's an on-going EAP conversation modcall[authorize]: module "eap" returns updated for request 17 users: Matched entry DEFAULT at line 153 modcall[authorize]: module "files" returns ok for request 17 modcall: group authorize returns updated for request 17 rad_check_password: Found Auth-Type EAP auth: type "EAP" Processing the authenticate section of radiusd.conf modcall: entering group authenticate for request 17 rlm_eap: Request found, released from the list rlm_eap: EAP/tls rlm_eap: processing type tls rlm_eap_tls: Authenticate rlm_eap_tls: processing TLS rlm_eap_tls: Received EAP-TLS ACK message rlm_eap_tls: ack handshake is finished eaptls_verify returned 3 eaptls_process returned 3 rlm_eap: Freeing handler modcall[authenticate]: module "eap" returns ok for request 17 modcall: group authenticate returns ok for request 17 Sending Access-Accept of id 204 to 192.168.100.1:1202 MS-MPPE-Recv-Key = 0x3002dbe723b42c89fe8794040232857a811157e23e7d4775bd4d6f3a8068243c MS-MPPE-Send-Key = 0x8c3358754b17c94c6e8be4d3c6c46562a353030f304506410030f01c63c883fe EAP-Message = 0x03050004 Message-Authenticator = 0x00000000000000000000000000000000 User-Name = "hasebe" Finished request 17