Hello everybody,

WBX told me to test WPA encryption using hostapd on Netgear WGT634U which has a 
Atheros WLAN chipset.

I used freewrt 1.0.3
After configuring hostapd everythig worked out of the box.
here is my configuration file.

To make WPA with TKIP - PSK working only a very few configuration options are
neccessary.

Please check if this is also working on your Netgear
WPA2 also needs to be tested.

Regards 
Michael Schwab

hostapd config:

interface=ath0

# In case of madwifi driver, an additional configuration parameter, bridge,
# must be used to notify hostapd if the interface is included in a bridge. This
# parameter is not used with Host AP driver.
#bridge=br0

# Driver interface type (hostap/wired/madwifi; default: hostap)
driver=madwifi

# hostapd event logger configuration
#
# Two output method: syslog and stdout (only usable if not forking to
# background).
#
# Module bitfield (ORed bitfield of modules that will be logged; -1 = all
# modules):
# bit 0 (1) = IEEE 802.11
# bit 1 (2) = IEEE 802.1X
# bit 2 (4) = RADIUS
# bit 3 (8) = WPA
# bit 4 (16) = driver interface
# bit 5 (32) = IAPP
#
# Levels (minimum value for logged events):
#  0 = verbose debugging
#  1 = debugging
#  2 = informational messages
#  3 = notification
#  4 = warning
#
logger_syslog=-1
logger_syslog_level=2
logger_stdout=-1
logger_stdout_level=2

# Debugging: 0 = no, 1 = minimal, 2 = verbose, 3 = msg dumps, 4 = excessive
debug=0

# Dump file for state information (on SIGUSR1)
dump_file=/tmp/hostapd.dump

##### IEEE 802.11 related configuration #######################################
                                                                           
# SSID to be used in IEEE 802.11 management frames                       
ssid=wpa-test 

# EAPOL-Key index workaround (set bit7) for WinXP Supplicant (needed only if   
# only broadcast keys are used)                                                
eapol_key_index_workaround=0          

##### WPA/IEEE 802.11i configuration ########################################## 
                                                
                                                                                
                                                
# Enable WPA. Setting this variable configures the AP to require WPA (either    
                                                
# WPA-PSK or WPA-RADIUS/EAP based on other configuration). For WPA-PSK, either  
                                                
# wpa_psk or wpa_passphrase must be set and wpa_key_mgmt must include WPA-PSK.  
                                                
# For WPA-RADIUS/EAP, ieee8021x must be set (but without dynamic WEP keys),     
                                                
# RADIUS authentication server must be configured, and WPA-EAP must be included 
                                                
# in wpa_key_mgmt.                                                              
                                                
# This field is a bit field that can be used to enable WPA (IEEE 802.11i/D3.0)  
                                                
# and/or WPA2 (full IEEE 802.11i/RSN):                                          
                                                
# bit0 = WPA                                                                    
                                                
# bit1 = IEEE 802.11i/RSN (WPA2) (dot11RSNAEnabled)                             
                                                
wpa=1                                                                           
                                                
                                                                                
                                                
# WPA pre-shared keys for WPA-PSK. This can be either entered as a 256-bit      
                                                
# secret in hex format (64 hex digits), wpa_psk, or as an ASCII passphrase      
                                                
# (8..63 characters) that will be converted to PSK. This conversion uses SSID   
                                                
# so the PSK changes when ASCII passphrase is used and the SSID is changed.     
                                                
# wpa_psk (dot11RSNAConfigPSKValue)                                             
                                                
# wpa_passphrase (dot11RSNAConfigPSKPassPhrase)                                 
                                                
#wpa_psk=0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef       
                                                
wpa_passphrase=geheim12345                                                      
                                                
                                                                                
                                                
# Optionally, WPA PSKs can be read from a separate text file (containing list   
                                                
# of (PSK,MAC address) pairs. This allows more than one PSK to be configured.   
                                                
# Use absolute path name to make sure that the files can be read on SIGHUP      
                                                
# configuration reloads.                                                        
                                                
#wpa_psk_file=/etc/hostapd.wpa_psk                                              
                                                
                                                                                
                                                
# Set of accepted key management algorithms (WPA-PSK, WPA-EAP, or both). The    
                                                
# entries are separated with a space.                                           
                                                
# (dot11RSNAConfigAuthenticationSuitesTable)                                    
                                                
#wpa_key_mgmt=WPA-PSK WPA-EAP                                                   
                                                
wpa_key_mgmt=WPA-PSK                                                            
                                                
                                                                                
                                                
                                                                                
                                                
# Set of accepted cipher suites (encryption algorithms) for pairwise keys       
                                                
# (unicast packets). This is a space separated list of algorithms:              
                                                
# CCMP = AES in Counter mode with CBC-MAC [RFC 3610, IEEE 802.11i/D7.0]         
                                                
# TKIP = Temporal Key Integrity Protocol [IEEE 802.11i/D7.0]                    
                                                
# Group cipher suite (encryption algorithm for broadcast and multicast frames)  
                                                
# is automatically selected based on this configuration. If only CCMP is        
                                                
# allowed as the pairwise cipher, group cipher will also be CCMP. Otherwise,    
                                                
# TKIP will be used as the group cipher.                                        
                                                
# (dot11RSNAConfigPairwiseCiphersTable)                                         
                                                
#wpa_pairwise=TKIP CCMP                                                         
                                                
wpa_pairwise=TKIP
_______________________________________________
freewrt-developers mailing list
[email protected]
https://www.freewrt.org/lists/listinfo/freewrt-developers

Reply via email to