The security/wpa_supplicant port
wpa_supplicant-2.9p4 – IEEE 802.1X supplicant (cvsweb github mirror)
Description
wpa_supplicant is the implementation of an IEEE 802.1X supplicant for wired (Ethernet PAE) and wireless (WPA/WPA2) authentication. Flavour: openssl (built against OpenSSL instead of LibreSSL) - supports older TLS protocols which may be needed in order to connect to some insecure networks with obsolete authentication servers (see pkg-readme).WWW: https://w1.fi/wpa_supplicant/
Readme
+----------------------------------------------------------------------- | Running ${PKGSTEM} on OpenBSD +----------------------------------------------------------------------- Note for users familiar with wpa_supplicant on other OS ======================================================= On OpenBSD, scanning and joining wireless networks is controlled by the kernel and configured by ifconfig(8) commands or /etc/hostname.if, so configuration is a little different than you may be used to. Use of wpa_supplicant on OpenBSD ================================ wpa_supplicant is used for authentication on wired networks using 802.1x and for wireless networks using WPA-Enterprise. On OpenBSD, wpa_supplicant is *not* used for the more common WPA-PSK wireless networks. These only need to be configured according to the "IEEE 802.11 (WIRELESS DEVICES)" section in ifconfig(8) and the manual page for your wireless interface - iwm(4), iwn(4), etc - i.e. by using ifconfig(8) commands or hostname.if(5) files. Configuring networks in wpa_supplicant.conf ------------------------------------------- Add your network login information to wpa_supplicant's configuration in ${SYSCONFDIR}/wpa_supplicant.conf - either uncomment and edit the supplied example or consult wpa_supplicant documentation or sample configuration from your network operator. (In the case of distributed networks like Eduroam, this would be from your home institution rather than the local network that you're connecting to). Do not enable "ap_scan" - it is not supported by the OpenBSD support code. Configuring wireless interfaces for use with WPA-Enterprise ----------------------------------------------------------- For most convenient use, the kernel can be configured to automatically join the "best" network from a preconfigured list (it calculates a score based on factors including signal strength and security options). This is done using ifconfig's "join" command - e.g. to add a network "Laakista Humppa" using WPA-Enterprise you could use # ifconfig iwm0 join "Laakista Humppa" wpa wpaakms 802.1x Or to configure from boot, add to /etc/hostname.iwm0 - as you would expect this may be combined with WPA-PSK networks: # cat /etc/hostname.iwm0 join "Laakista Humppa" wpa wpaakms 802.1x join "Perjantaina Humpassa" wpa wpakey fridayfriday join Lumpiohumppa wpa wpaprotos wpa1,wpa2 wpakey whatsecurity inet6 autoconf dhcp If you would like to avoid "join" and connect to a single network only, you would instead use "nwid", for example: # ifconfig iwm0 nwid humppa wpa wpaakms 802.1x up or to do this and also lock to a specific BSSID: # ifconfig iwm0 nwid humppa bssid 11:22:33:44:55:66 wpa wpaakms 802.1x up Starting wpa_supplicant ----------------------- After configuring as above, enable wpa_supplicant via rcctl(8) - "rcctl enable wpa_supplicant" as usual. It will attempt to auto detect the interface name and type, but if there is a problem with this it can be hardcoded instead. For a wireless network on iwm0: # rcctl set wpa_supplicant flags -c ${SYSCONFDIR}/wpa_supplicant.conf -s -D openbsd -i iwm0 For a 802.1x wired network on ix0: # rcctl set wpa_supplicant flags -c ${SYSCONFDIR}/wpa_supplicant.conf -s -D wired -i ix0 Then start as normal ("rcctl start wpa_supplicant"). wpa_supplicant should automatically authenticate when it notices that the connection is up. Networks only supporting TLSv1.1 or earlier ------------------------------------------- These obsolete and insecure TLS protocols have been removed from LibreSSL. If you must use a legacy network with an insecure authentication server which cannot be corrected, you can try installing the "openssl" flavour of the wpa_supplicant package and setting some or all of the following in wpa_supplicant.conf: network={ # allow ciphers supporting TLSv1.0 openssl_ciphers="DEFAULT@SECLEVEL=0" # permit insecure TLS renegotiation (pre-2010) phase1="allow_unsafe_renegotiation=1" ... }
Maintainer
The OpenBSD ports mailing-list
Categories
Library dependencies
Build dependencies
Files
- /etc/rc.d/wpa_supplicant
- /etc/wpa_supplicant.conf
- /usr/local/bin/eapol_test
- /usr/local/man/man5/wpa_supplicant.conf.5
- /usr/local/man/man8/eapol_test.8
- /usr/local/man/man8/wpa_background.8
- /usr/local/man/man8/wpa_cli.8
- /usr/local/man/man8/wpa_passphrase.8
- /usr/local/man/man8/wpa_supplicant.8
- /usr/local/sbin/wpa_cli
- /usr/local/sbin/wpa_passphrase
- /usr/local/sbin/wpa_supplicant
- /usr/local/share/doc/pkg-readmes/wpa_supplicant
- /usr/local/share/examples/wpa_supplicant/
- /usr/local/share/examples/wpa_supplicant/wpa_supplicant.conf
- /usr/local/share/examples/wpa_supplicant/wpa_supplicant.conf.dist