Earl,
This is the /lib/netifd/hostapd.sh for 14.07 BB:
hostapd_add_rate() {
local var="$1"
local val="$(($2 / 1000))"
local sub="$((($2 / 100) % 10))"
append $var "$val" ","
[ $sub -gt 0 ] && append $var "."
}
hostapd_add_basic_rate() {
local var="$1"
local val="$(($2 / 100))"
append $var "$val" " "
}
hostapd_append_wep_key() {
local var="$1"
wep_keyidx=0
set_default key 1
case "$key" in
[1234])
for idx in 1 2 3 4; do
local zidx
zidx=$(($idx - 1))
json_get_var ckey "key${idx}"
[ -n "$ckey" ] && \
append $var
"wep_key${zidx}=$(prepare_key_wep "$ckey")" "$N$T"
done
wep_keyidx=$((key - 1))
;;
*)
append $var "wep_key0=$(prepare_key_wep "$key")" "$N$T"
;;
esac
}
hostapd_add_log_config() {
config_add_boolean \
log_80211 \
log_8021x \
log_radius \
log_wpa \
log_driver \
log_iapp \
log_mlme
config_add_int log_level
}
hostapd_common_add_device_config() {
config_add_array basic_rate
config_add_string country
config_add_boolean country_ie doth
config_add_string require_mode
hostapd_add_log_config
}
hostapd_prepare_device_config() {
local config="$1"
local driver="$2"
local base="${config%%.conf}"
local base_cfg=
json_get_vars country country_ie beacon_int doth require_mode
hostapd_set_log_options base_cfg
set_default country_ie 1
set_default doth 1
[ -n "$country" ] && {
append base_cfg "country_code=$country" "$N"
[ "$country_ie" -gt 0 ] && append base_cfg "ieee80211d=1" "$N"
[ "$hwmode" = "a" -a "$doth" -gt 0 ] && append base_cfg
"ieee80211h=1" "$N"
}
[ -n "$hwmode" ] && append base_cfg "hw_mode=$hwmode" "$N"
local brlist= br
json_get_values basic_rate_list basic_rate
for br in $basic_rate_list; do
hostapd_add_basic_rate brlist "$br"
done
case "$require_mode" in
g) brlist="60 120 240" ;;
n) append base_cfg "require_ht=1" "$N";;
ac) append base_cfg "require_vht=1" "$N";;
esac
[ -n "$brlist" ] && append base_cfg "basic_rates=$brlist" "$N"
[ -n "$beacon_int" ] && append base_cfg "beacon_int=$beacon_int" "$N"
cat > "$config" <<EOF
driver=$driver
$base_cfg
EOF
}
hostapd_common_add_bss_config() {
config_add_string 'bssid:macaddr' 'ssid:string'
config_add_boolean wds wmm hidden
config_add_int maxassoc max_inactivity
config_add_boolean disassoc_low_ack isolate short_preamble
config_add_int \
wep_rekey eap_reauth_period \
wpa_group_rekey wpa_pair_rekey wpa_master_rekey
config_add_boolean rsn_preauth auth_cache
config_add_int ieee80211w
config_add_string 'auth_server:host' 'server:host'
config_add_string auth_secret
config_add_int 'auth_port:port' 'port:port'
config_add_string acct_server
config_add_string acct_secret
config_add_int acct_port
config_add_string dae_client
config_add_string dae_secret
config_add_int dae_port
config_add_string nasid
config_add_string ownip
config_add_string iapp_interface
config_add_string eap_type ca_cert client_cert identity auth priv_key
priv_key_pwd
config_add_int dynamic_vlan vlan_naming
config_add_string vlan_tagged_interface
config_add_string 'key1:wepkey' 'key2:wepkey' 'key3:wepkey'
'key4:wepkey' 'password:wpakey'
config_add_boolean wps_pushbutton wps_label ext_registrar wps_pbc_in_m1
config_add_string wps_device_type wps_device_name wps_manufacturer
wps_pin
config_add_int ieee80211w_max_timeout ieee80211w_retry_timeout
config_add_string macfilter 'macfile:file'
config_add_array 'maclist:list(macaddr)'
config_add_int mcast_rate
config_add_array basic_rate
}
hostapd_set_bss_options() {
local var="$1"
local phy="$2"
local vif="$3"
wireless_vif_parse_encryption
local bss_conf
local wep_rekey wpa_group_rekey wpa_pair_rekey wpa_master_rekey
json_get_vars \
wep_rekey wpa_group_rekey wpa_pair_rekey wpa_master_rekey \
maxassoc max_inactivity disassoc_low_ack isolate auth_cache \
wps_pushbutton wps_label ext_registrar wps_pbc_in_m1 \
wps_device_type wps_device_name wps_manufacturer wps_pin \
macfilter ssid wmm hidden short_preamble rsn_preauth
set_default isolate 0
set_default maxassoc 0
set_default max_inactivity 0
set_default short_preamble 1
set_default disassoc_low_ack 1
set_default hidden 0
set_default wmm 1
append bss_conf "ctrl_interface=/var/run/hostapd"
if [ "$isolate" -gt 0 ]; then
append bss_conf "ap_isolate=$isolate" "$N"
fi
if [ "$maxassoc" -gt 0 ]; then
append bss_conf "max_num_sta=$maxassoc" "$N"
fi
if [ "$max_inactivity" -gt 0 ]; then
append bss_conf "ap_max_inactivity=$max_inactivity" "$N"
fi
append bss_conf "disassoc_low_ack=$disassoc_low_ack" "$N"
append bss_conf "preamble=$short_preamble" "$N"
append bss_conf "wmm_enabled=$wmm" "$N"
append bss_conf "ignore_broadcast_ssid=$hidden" "$N"
[ "$wpa" -gt 0 ] && {
[ -n "$wpa_group_rekey" ] && append bss_conf
"wpa_group_rekey=$wpa_group_rekey" "$N"
[ -n "$wpa_pair_rekey" ] && append bss_conf
"wpa_ptk_rekey=$wpa_pair_rekey" "$N"
[ -n "$wpa_master_rekey" ] && append bss_conf
"wpa_gmk_rekey=$wpa_master_rekey" "$N"
}
case "$auth_type" in
none)
wps_possible=1
# Here we make the assumption that if we're in open mode
# with WPS enabled, we got to be in unconfigured state.
wps_not_configured=1
json_get_vars \
auth_server auth_secret auth_port \
acct_server acct_secret acct_port \
dae_client dae_secret dae_port \
nasid iapp_interface dynamic_vlan \
vlan_tagged_interface
# legacy compatibility
[ -n "$auth_server" ] || json_get_var auth_server server
[ -n "$auth_port" ] || json_get_var auth_port port
[ -n "$auth_secret" ] || json_get_var auth_secret key
set_default auth_port 1812
set_default acct_port 1813
set_default vlan_naming 1
append bss_conf "auth_server_addr=$auth_server" "$N"
append bss_conf "auth_server_port=$auth_port" "$N"
append bss_conf
"auth_server_shared_secret=$auth_secret" "$N"
append bss_conf "vlan_file=/etc/config/hostapd.vlan"
"$N"
#Mac authentication
append bss_conf "macaddr_acl=2" "$N"
[ -n "$acct_server" ] && {
append bss_conf "acct_server_addr=$acct_server"
"$N"
append bss_conf "acct_server_port=$acct_port"
"$N"
[ -n "$acct_secret" ] && \
append bss_conf
"acct_server_shared_secret=$acct_secret" "$N"
}
[ -n "$dae_client" -a -n "$dae_secret" ] && {
append bss_conf "radius_das_port=$dae_port" "$N"
append bss_conf "radius_das_client=$dae_client
$dae_secret" "$N"
}
append bss_conf "nas_identifier=$nasid" "$N"
[ -n "$dynamic_vlan" ] && {
append bss_conf "dynamic_vlan=$dynamic_vlan"
"$N"
append bss_conf "vlan_naming=$vlan_naming" "$N"
[ -n "$vlan_tagged_interface" ] && \
append bss_conf
"vlan_tagged_interface=$vlan_tagged_interface" "$N"
}
;;
psk)
json_get_vars key
if [ ${#key} -lt 8 ]; then
wireless_setup_vif_failed INVALID_WPA_PSK
return 1
elif [ ${#key} -eq 64 ]; then
append bss_conf "wpa_psk=$key" "$N"
else
append bss_conf "wpa_passphrase=$key" "$N"
json_get_vars \
auth_server auth_secret auth_port \
acct_server acct_secret acct_port \
dae_client dae_secret dae_port \
nasid iapp_interface dynamic_vlan \
vlan_tagged_interface
# legacy compatibility
[ -n "$auth_server" ] || json_get_var auth_server server
[ -n "$auth_port" ] || json_get_var auth_port port
[ -n "$auth_secret" ] || json_get_var auth_secret key
set_default auth_port 1812
set_default acct_port 1813
set_default vlan_naming 1
append bss_conf "auth_server_addr=$auth_server" "$N"
append bss_conf "auth_server_port=$auth_port" "$N"
append bss_conf
"auth_server_shared_secret=$auth_secret" "$N"
append bss_conf "vlan_file=/etc/config/hostapd.vlan"
"$N"
#Mac authentication
append bss_conf "macaddr_acl=2" "$N"
[ -n "$acct_server" ] && {
append bss_conf "acct_server_addr=$acct_server"
"$N"
append bss_conf "acct_server_port=$acct_port"
"$N"
[ -n "$acct_secret" ] && \
append bss_conf
"acct_server_shared_secret=$acct_secret" "$N"
}
[ -n "$dae_client" -a -n "$dae_secret" ] && {
append bss_conf "radius_das_port=$dae_port" "$N"
append bss_conf "radius_das_client=$dae_client
$dae_secret" "$N"
}
append bss_conf "nas_identifier=$nasid" "$N"
[ -n "$dynamic_vlan" ] && {
append bss_conf "dynamic_vlan=$dynamic_vlan"
"$N"
append bss_conf "vlan_naming=$vlan_naming" "$N"
[ -n "$vlan_tagged_interface" ] && \
append bss_conf
"vlan_tagged_interface=$vlan_tagged_interface" "$N"
}
fi
wps_possible=1
;;
eap)
json_get_vars \
auth_server auth_secret auth_port \
acct_server acct_secret acct_port \
dae_client dae_secret dae_port \
nasid iapp_interface ownip \
eap_reauth_period dynamic_vlan \
vlan_tagged_interface
# legacy compatibility
[ -n "$auth_server" ] || json_get_var auth_server server
[ -n "$auth_port" ] || json_get_var auth_port port
[ -n "$auth_secret" ] || json_get_var auth_secret key
set_default auth_port 1812
set_default acct_port 1813
set_default dae_port 3799
set_default vlan_naming 1
append bss_conf "auth_server_addr=$auth_server" "$N"
append bss_conf "auth_server_port=$auth_port" "$N"
append bss_conf
"auth_server_shared_secret=$auth_secret" "$N"
append bss_conf "vlan_file=/etc/config/hostapd.vlan"
"$N"
[ -n "$acct_server" ] && {
append bss_conf "acct_server_addr=$acct_server"
"$N"
append bss_conf "acct_server_port=$acct_port"
"$N"
[ -n "$acct_secret" ] && \
append bss_conf
"acct_server_shared_secret=$acct_secret" "$N"
}
[ -n "$eap_reauth_period" ] && append bss_conf
"eap_reauth_period=$eap_reauth_period" "$N"
[ -n "$dae_client" -a -n "$dae_secret" ] && {
append bss_conf "radius_das_port=$dae_port" "$N"
append bss_conf "radius_das_client=$dae_client
$dae_secret" "$N"
}
append bss_conf "nas_identifier=$nasid" "$N"
[ -n "$ownip" ] && append bss_conf "own_ip_addr=$ownip"
"$N"
append bss_conf "eapol_key_index_workaround=1" "$N"
append bss_conf "ieee8021x=1" "$N"
append bss_conf "wpa_key_mgmt=WPA-EAP" "$N"
[ -n "$dynamic_vlan" ] && {
append bss_conf "dynamic_vlan=$dynamic_vlan"
"$N"
append bss_conf "vlan_naming=$vlan_naming" "$N"
[ -n "$vlan_tagged_interface" ] && \
append bss_conf
"vlan_tagged_interface=$vlan_tagged_interface" "$N"
}
;;
wep)
local wep_keyidx=0
json_get_vars key
hostapd_append_wep_key bss_conf
append bss_conf "wep_default_key=$wep_keyidx" "$N"
[ -n "$wep_rekey" ] && append bss_conf
"wep_rekey_period=$wep_rekey" "$N"
;;
esac
local auth_algs=$((($auth_mode_shared << 1) | $auth_mode_open))
append bss_conf "auth_algs=${auth_algs:-1}" "$N"
append bss_conf "wpa=$wpa" "$N"
[ -n "$wpa_pairwise" ] && append bss_conf "wpa_pairwise=$wpa_pairwise"
"$N"
set_default wps_pushbutton 0
set_default wps_label 0
set_default wps_pbc_in_m1 0
config_methods=
[ "$wps_pushbutton" -gt 0 ] && append config_methods push_button
[ "$wps_label" -gt 0 ] && append config_methods label
[ -n "$wps_possible" -a -n "$config_methods" ] && {
set_default ext_registrar 0
set_default wps_device_type "6-0050F204-1"
set_default wps_device_name "OpenWrt AP"
set_default wps_manufacturer "openwrt.org"
wps_state=2
[ -n "$wps_configured" ] && wps_state=1
[ "$ext_registrar" -gt 0 -a -n "$network_bridge" ] && append
bss_conf "upnp_iface=$network_bridge" "$N"
append bss_conf "eap_server=1" "$N"
[ -n "$wps_pin" ] && append bss_conf "ap_pin=$wps_pin" "$N"
append bss_conf "wps_state=$wps_state" "$N"
append bss_conf "ap_setup_locked=0" "$N"
append bss_conf "device_type=$wps_device_type" "$N"
append bss_conf "device_name=$wps_device_name" "$N"
append bss_conf "manufacturer=$wps_manufacturer" "$N"
append bss_conf "config_methods=$config_methods" "$N"
[ "$wps_pbc_in_m1" -gt 0 ] && append bss_conf
"pbc_in_m1=$wps_pbc_in_m1" "$N"
}
append bss_conf "ssid=$ssid" "$N"
[ -n "$network_bridge" ] && append bss_conf "bridge=$network_bridge"
"$N"
[ -n "$iapp_interface" ] && {
iapp_interface="$(uci_get_state network "$iapp_interface"
ifname "$iapp_interface")"
[ -n "$iapp_interface" ] && append bss_conf
"iapp_interface=$iapp_interface" "$N"
}
if [ "$wpa" -ge "2" ]; then
if [ -n "$network_bridge" -a "$rsn_preauth" = 1 ]; then
set_default auth_cache 1
append bss_conf "rsn_preauth=1" "$N"
append bss_conf
"rsn_preauth_interfaces=$network_bridge" "$N"
else
set_default auth_cache 1
append bss_conf "rsn_preauth=1" "$N"
append bss_conf
"rsn_preauth_interfaces=$network_bridge" "$N"
fi
append bss_conf "okc=$auth_cache" "$N"
[ "$auth_cache" = 0 ] && append bss_conf
"disable_pmksa_caching=1" "$N"
# RSN -> allow management frame protection
json_get_var ieee80211w ieee80211w
case "$ieee80211w" in
[012])
json_get_vars ieee80211w_max_timeout
ieee80211w_retry_timeout
append bss_conf "ieee80211w=$ieee80211w" "$N"
[ "$ieee80211w" -gt "0" ] && {
[ -n "$ieee80211w_max_timeout" ] && \
append bss_conf
"assoc_sa_query_max_timeout=$ieee80211w_max_timeout" "$N"
[ -n "$ieee80211w_retry_timeout" ] && \
append bss_conf
"assoc_sa_query_retry_timeout=$ieee80211w_retry_timeout" "$N"
}
;;
esac
fi
_macfile="/var/run/hostapd-$ifname.maclist"
case "$macfilter" in
allow)
append bss_conf "macaddr_acl=1" "$N"
append bss_conf "accept_mac_file=$_macfile" "$N"
;;
deny)
append bss_conf "macaddr_acl=0" "$N"
append bss_conf "deny_mac_file=$_macfile" "$N"
;;
*)
_macfile=""
;;
esac
[ -n "$_macfile" ] && {
json_get_vars macfile
json_get_values maclist maclist
rm -f "$_macfile"
(
for mac in $maclist; do
echo "$mac"
done
[ -n "$macfile" -a -f "$macfile" ] && cat "$macfile"
) > "$_macfile"
}
append "$var" "$bss_conf" "$N"
return 0
}
hostapd_set_log_options() {
local var="$1"
local log_level log_80211 log_8021x log_radius log_wpa log_driver
log_iapp log_mlme
json_get_vars log_level log_80211 log_8021x log_radius log_wpa
log_driver log_iapp log_mlme
set_default log_level 1
set_default log_80211 1
set_default log_8021x 1
set_default log_radius 1
set_default log_wpa 1
set_default log_driver 1
set_default log_iapp 1
set_default log_mlme 1
local log_mask=$(( \
($log_80211 << 0) | \
($log_8021x << 1) | \
($log_radius << 2) | \
($log_wpa << 3) | \
($log_driver << 4) | \
($log_iapp << 5) | \
($log_mlme << 6) \
))
append "$var" "logger_syslog=$log_mask" "$N"
append "$var" "logger_syslog_level=$log_level" "$N"
append "$var" "logger_stdout=$log_mask" "$N"
append "$var" "logger_stdout_level=$log_level" "$N"
return 0
}
_wpa_supplicant_common() {
local ifname="$1"
_rpath="/var/run/wpa_supplicant"
_config="${_rpath}-$ifname.conf"
}
wpa_supplicant_teardown_interface() {
_wpa_supplicant_common "$1"
rm -rf "$_rpath/$1" "$_config"
}
wpa_supplicant_prepare_interface() {
local ifname="$1"
_w_driver="$2"
_wpa_supplicant_common "$1"
json_get_vars mode wds
[ -n "$network_bridge" ] && {
fail=
case "$mode" in
adhoc)
fail=1
;;
sta)
[ "$wds" = 1 ] || fail=1
;;
esac
[ -n "$fail" ] && {
wireless_setup_vif_failed BRIDGE_NOT_ALLOWED
return 1
}
}
local ap_scan=
_w_mode="$mode"
_w_modestr=
[[ "$mode" = adhoc ]] && {
ap_scan="ap_scan=2"
_w_modestr="mode=1"
}
wpa_supplicant_teardown_interface "$ifname"
cat > "$_config" <<EOF
$ap_scan
EOF
return 0
}
wpa_supplicant_add_network() {
local ifname="$1"
_wpa_supplicant_common "$1"
wireless_vif_parse_encryption
json_get_vars \
ssid bssid key \
basic_rate mcast_rate \
ieee80211w
local key_mgmt='NONE'
local enc_str=
local network_data=
local T=" "
local wpa_key_mgmt="WPA-PSK"
local scan_ssid="1"
local freq
[[ "$_w_mode" = "adhoc" ]] && {
append network_data "mode=1" "$N$T"
[ -n "$channel" ] && {
freq="$(get_freq "$phy" "$channel")"
append network_data "fixed_freq=1" "$N$T"
append network_data "frequency=$freq" "$N$T"
}
scan_ssid=0
[ "$_w_driver" = "nl80211" ] || wpa_key_mgmt="WPA-NONE"
}
[[ "$_w_mode" = adhoc ]] && append network_data "$_w_modestr" "$N$T"
case "$auth_type" in
none) ;;
wep)
local wep_keyidx=0
hostapd_append_wep_key network_data
append network_data "wep_tx_keyidx=$wep_keyidx" "$N$T"
;;
psk)
local passphrase
key_mgmt="$wpa_key_mgmt"
if [ ${#key} -eq 64 ]; then
passphrase="psk=${key}"
else
passphrase="psk=\"${key}\""
fi
append network_data "$passphrase" "$N$T"
;;
eap)
key_mgmt='WPA-EAP'
json_get_vars eap_type identity ca_cert
[ -n "$ca_cert" ] && append network_data
"ca_cert=\"$ca_cert\"" "$N$T"
[ -n "$identity" ] && append network_data
"identity=\"$identity\"" "$N$T"
case "$eap_type" in
tls)
json_get_vars client_cert priv_key
priv_key_pwd
append network_data
"client_cert=\"$client_cert\"" "$N$T"
append network_data
"private_key=\"$priv_key\"" "$N$T"
append network_data
"private_key_passwd=\"$priv_key_pwd\"" "$N$T"
;;
peap|ttls)
json_get_vars auth password
set_default auth MSCHAPV2
append network_data "phase2=\"$auth\""
"$N$T"
append network_data
"password=\"$password\"" "$N$T"
;;
esac
append network_data "eap=$(echo $eap_type | tr 'a-z'
'A-Z')" "$N$T"
;;
esac
case "$wpa" in
1)
append network_data "proto=WPA" "$N$T"
;;
2)
append network_data "proto=RSN" "$N$T"
;;
esac
case "$ieee80211w" in
[012])
[ "$wpa" -ge 2 ] && append network_data
"ieee80211w=$ieee80211w" "$N$T"
;;
esac
local beacon_int brates mrate
[ -n "$bssid" ] && append network_data "bssid=$bssid" "$N$T"
[ -n "$beacon_int" ] && append network_data "beacon_int=$beacon_int"
"$N$T"
[ -n "$basic_rate" ] && {
local br rate_list=
for br in $basic_rate; do
hostapd_add_rate rate_list "$br"
done
[ -n "$rate_list" ] && append network_data "rates=$rate_list"
"$N$T"
}
[ -n "$mcast_rate" ] && {
local mc_rate=
hostapd_add_rate mc_rate "$mcast_rate"
append network_data "mcast_rate=$mc_rate" "$N$T"
}
local ht_str
[ -n "$ht" ] && append network_data "htmode=$ht" "$N$T"
cat >> "$_config" <<EOF
network={
scan_ssid=$scan_ssid
ssid="$ssid"
key_mgmt=$key_mgmt
$network_data
}
EOF
return 0
}
wpa_supplicant_run() {
local ifname="$1"; shift
_wpa_supplicant_common "$ifname"
/usr/sbin/wpa_supplicant -B \
${network_bridge:+-b $network_bridge} \
-P "/var/run/wpa_supplicant-${ifname}.pid" \
-D ${_w_driver:-wext} \
-i "$ifname" \
-c "$_config" \
-C "$_rpath" \
"$@"
ret="$?"
wireless_add_process "$(cat "/var/run/wpa_supplicant-${ifname}.pid")"
/usr/sbin/wpa_supplicant 1
[ "$ret" != 0 ] && wireless_setup_vif_failed WPA_SUPPLICANT_FAILED
return $ret
}
hostapd_common_cleanup() {
killall hostapd wpa_supplicant meshd-nl80211
}
/etc/config/wireless
config wifi-device 'radio0'
option type 'mac80211'
option path 'pci0000:00/0000:00:00.0'
option htmode 'HT20'
option hwmode '11ng'
list ht_capab 'SHORT-GI-40'
list ht_capab 'TX-STBC'
list ht_capab 'RX-STBC1'
list ht_capab 'DSSS_CCK-40'
option txpower '27'
option country 'US'
config wifi-iface
option device 'radio0'
option mode 'ap'
option ssid 'Test'
option network 'lan'
option encryption ’none'
option auth_server ‘172.X.X.X'
option auth_port '1812'
option auth_secret 'secret'
option acct_server ‘172.X.X.X'
option acct_port '1812'
option acct_secret 'secret'
option dynamic_vlan '2'
option vlan_file '/etc/config/hostapd.vlan'
option vlan_tagged_interface 'eth0'
option dae_secret 'secret'
option dae_client ‘172.X.X.X'
option macfilter '2'
option dae_port '3799'
option nasid ‘Ubiquiti’
You will need the wpad package and hostapd
Thanks,
Ludovic Zammit
[email protected] <mailto:[email protected]> :: +1.514.447.4918 (x145) ::
www.inverse.ca <http://www.inverse.ca/>
Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu <http://www.sogo.nu/>)
and PacketFence (http://packetfence.org <http://packetfence.org/>)
> Le 2015-05-20 à 11:46, Earl Robinson <[email protected]> a écrit :
>
> Thanks Chris,
>
> I tried with the current stable release ,14.07 (barrier breaker), a few weeks
> ago and I was having problems with getting drivers for 5ghz wifi working. I'm
> assuming the driver situation with 12.09 (attitude adjustment) is even worse
> since that release is 18 months older.
>
> I've got a spare 2.4ghz router I can try with 14.07. There seems to be a lot
> of changes to the code for dynamic vlans between 14.07 and trunk (16.?) so I
> was hoping there's some config magic that hasn't made it to the docs yet that
> will resolve the issues I've had.
>
> I'll followup on this list on how my testing goes.
>
> -earl
>
> On Tue, May 19, 2015 at 1:33 PM, Chris Abel <[email protected]
> <mailto:[email protected]>> wrote:
> Make sure to use OpenWRT 12.09 Attitude Adjustment.
>
> On Tue, May 19, 2015 at 1:26 PM, Earl Robinson <[email protected]
> <mailto:[email protected]>> wrote:
> Hey Ludovic,
>
> I'm running on a TP-Link Archer C7 v2 and a TP-Link TL-WDR4300 v1. I have
> hostapd and hostapd-common installed. If I try to install wpad i get the
> error:
> root@OpenWRT:~# opkg install wpad
> Installing wpad (2015-03-25-1) to root...
> Downloading
> http://downloads.openwrt.org/snapshots/trunk/ar71xx/generic/packages/base/wpad_2015-03-25-1_ar71xx.ipk
>
> <http://downloads.openwrt.org/snapshots/trunk/ar71xx/generic/packages/base/wpad_2015-03-25-1_ar71xx.ipk>.
> Collected errors:
> * check_data_file_clashes: Package wpad wants to install file
> /usr/sbin/hostapd
> But that file is already provided by package * hostapd
> * opkg_install_cmd: Cannot install package wpad.
>
> -earl
>
> On Tue, May 19, 2015 at 10:53 AM, Ludovic Zammit <[email protected]
> <mailto:[email protected]>> wrote:
> Hello Earl,
>
> With which equipment you are using the OpenWRT ?
>
> The radius part is handle by Hostapd and wpad so make sure that these two
> packages are installed ( hostap-common + wpad ).
>
> Thanks,
> Ludovic Zammit
> [email protected] <mailto:[email protected]> :: +1.514.447.4918
> <tel:%2B1.514.447.4918> (x145) :: www.inverse.ca <http://www.inverse.ca/>
> Inverse inc. :: Leaders behind SOGo (http://www.sogo.nu
> <http://www.sogo.nu/>) and PacketFence (http://packetfence.org
> <http://packetfence.org/>)
>
>
>
>
>
>> Le 2015-05-18 à 16:18, Earl Robinson <[email protected]
>> <mailto:[email protected]>> a écrit :
>>
>> I've been working to get PacketFence (v5.0.1) working with OpenWRT (devel
>> v15 r46557).
>>
>> My end goal is to have PacketFence controlling the OpenWRT AP in VLAN mode,
>> using dynamic VLAN assignment. I've followed the PF Device configuration
>> guide and the administration guide, the new ZEN out-of-band quick guide.
>> I've used various docs to sett up the OpenWRT AP including this one:
>> http://wiki.openwrt.org/doc/howto/wireless.security.8021x
>> <http://wiki.openwrt.org/doc/howto/wireless.security.8021x>
>>
>> I've been able to get a cisco 3560 switch working great. When I connect a
>> device, the cisco switch automatically send a RADIUS auth request to the pf
>> server using the device mac address (mab). And when I auth to the pf server
>> via the web, my VLAN is reassigned properly.
>>
>> With the same client devices, I can connect to an open SSID on the AP, but
>> then get no RADIUS traffic (dynamic VLANs and nab doesn't work with an open
>> SSID?). So I have to set the SSID to WPA2, and then I get an 802.1x auth
>> prompt on the client, which generates a RADIUS request back to pf.
>>
>> There's a thread on the openwrt list from 2013-2014:
>> https://forum.openwrt.org/viewtopic.php?id=44968
>> <https://forum.openwrt.org/viewtopic.php?id=44968>
>> which seems to show Fabrice was able to implement what I want with earlier
>> versions of OpenWRT, but with heavy mods. The current devel version is
>> supposed to work without any special mods.
>>
>> Has anybody been able to get this working recently, and if so have any
>> guidance? At this point I believe my problem lies on the OpenWRT side, but I
>> figure somebody on this list is likely to know the fix.
>>
>> Thanks,
>> Earl
>> ------------------------------------------------------------------------------
>> One dashboard for servers and applications across Physical-Virtual-Cloud
>> Widest out-of-the-box monitoring support with 50+ applications
>> Performance metrics, stats and reports that give you Actionable Insights
>> Deep dive visibility with transaction tracing using APM Insight.
>> http://ad.doubleclick.net/ddm/clk/290420510;117567292;y_______________________________________________
>>
>> <http://ad.doubleclick.net/ddm/clk/290420510;117567292;y_______________________________________________>
>> PacketFence-users mailing list
>> [email protected]
>> <mailto:[email protected]>
>> https://lists.sourceforge.net/lists/listinfo/packetfence-users
>> <https://lists.sourceforge.net/lists/listinfo/packetfence-users>
>
>
> ------------------------------------------------------------------------------
> One dashboard for servers and applications across Physical-Virtual-Cloud
> Widest out-of-the-box monitoring support with 50+ applications
> Performance metrics, stats and reports that give you Actionable Insights
> Deep dive visibility with transaction tracing using APM Insight.
> http://ad.doubleclick.net/ddm/clk/290420510;117567292;y
> <http://ad.doubleclick.net/ddm/clk/290420510;117567292;y>
> _______________________________________________
> PacketFence-users mailing list
> [email protected]
> <mailto:[email protected]>
> https://lists.sourceforge.net/lists/listinfo/packetfence-users
> <https://lists.sourceforge.net/lists/listinfo/packetfence-users>
>
>
>
> ------------------------------------------------------------------------------
> One dashboard for servers and applications across Physical-Virtual-Cloud
> Widest out-of-the-box monitoring support with 50+ applications
> Performance metrics, stats and reports that give you Actionable Insights
> Deep dive visibility with transaction tracing using APM Insight.
> http://ad.doubleclick.net/ddm/clk/290420510;117567292;y
> <http://ad.doubleclick.net/ddm/clk/290420510;117567292;y>
> _______________________________________________
> PacketFence-users mailing list
> [email protected]
> <mailto:[email protected]>
> https://lists.sourceforge.net/lists/listinfo/packetfence-users
> <https://lists.sourceforge.net/lists/listinfo/packetfence-users>
>
>
>
>
> --
> Chris Abel
> Systems and Network Administrator
> Wildwood Programs
> 2995 Curry Road Extension
> Schenectady, NY 12303
> 518-836-2341 <tel:518-836-2341>
>
> IMPORTANT NOTICE: This message and any attachments are solely for the
> intended recipient and may contain confidential information, which is, or may
> be, legally privileged or otherwise protected by law from further disclosure.
> If you are not the intended recipient, any disclosure, copying, use, or
> distribution of the information included in this email and any attachments is
> prohibited. If you have received this communication in error, please notify
> the sender by reply email and immediately and permanently delete this email
> and any attachments.
> ------------------------------------------------------------------------------
> One dashboard for servers and applications across Physical-Virtual-Cloud
> Widest out-of-the-box monitoring support with 50+ applications
> Performance metrics, stats and reports that give you Actionable Insights
> Deep dive visibility with transaction tracing using APM Insight.
> http://ad.doubleclick.net/ddm/clk/290420510;117567292;y
> <http://ad.doubleclick.net/ddm/clk/290420510;117567292;y>
> _______________________________________________
> PacketFence-users mailing list
> [email protected]
> <mailto:[email protected]>
> https://lists.sourceforge.net/lists/listinfo/packetfence-users
> <https://lists.sourceforge.net/lists/listinfo/packetfence-users>
>
>
> ------------------------------------------------------------------------------
> One dashboard for servers and applications across Physical-Virtual-Cloud
> Widest out-of-the-box monitoring support with 50+ applications
> Performance metrics, stats and reports that give you Actionable Insights
> Deep dive visibility with transaction tracing using APM Insight.
> http://ad.doubleclick.net/ddm/clk/290420510;117567292;y_______________________________________________
> PacketFence-users mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/packetfence-users
------------------------------------------------------------------------------
One dashboard for servers and applications across Physical-Virtual-Cloud
Widest out-of-the-box monitoring support with 50+ applications
Performance metrics, stats and reports that give you Actionable Insights
Deep dive visibility with transaction tracing using APM Insight.
http://ad.doubleclick.net/ddm/clk/290420510;117567292;y
_______________________________________________
PacketFence-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/packetfence-users