⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 wpa_supplicant.conf

📁 一个Linux下无线网卡的设置工具
💻 CONF
📖 第 1 页 / 共 2 页
字号:
# dh_file2: File path to DH/DSA parameters file (in PEM format)# subject_match2: Substring to be matched against the subject of the#	authentication server certificate.# altsubject_match2: Substring to be matched against the alternative subject#	name of the authentication server certificate.## EAP-PSK variables:# eappsk: 16-byte (128-bit, 32 hex digits) pre-shared key in hex format# nai: user NAI## EAP-FAST variables:# pac_file: File path for the PAC entries. wpa_supplicant will need to be able#	to create this file and write updates to it when PAC is being#	provisioned or refreshed. Full path to the file should be used since#	working directory may change when wpa_supplicant is run in the#	background. Alternatively, a named configuration blob can be used by#	setting this to blob://<blob name># phase1: fast_provisioning=1 option enables in-line provisioning of EAP-FAST#	credentials (PAC)## wpa_supplicant supports number of "EAP workarounds" to work around# interoperability issues with incorrectly behaving authentication servers.# These are enabled by default because some of the issues are present in large# number of authentication servers. Strict EAP conformance mode can be# configured by disabling workarounds with eap_workaround=0.# Example blocks:# Simple case: WPA-PSK, PSK as an ASCII passphrase, allow all valid ciphersnetwork={	ssid="simple"	psk="very secret passphrase"	priority=5}# Same as previous, but request SSID-specific scanning (for APs that reject# broadcast SSID)network={	ssid="second ssid"	scan_ssid=1	psk="very secret passphrase"	priority=2}# Only WPA-PSK is used. Any valid cipher combination is accepted.network={	ssid="example"	proto=WPA	key_mgmt=WPA-PSK	pairwise=CCMP TKIP	group=CCMP TKIP WEP104 WEP40	psk=06b4be19da289f475aa46a33cb793029d4ab3db7a23ee92382eb0106c72ac7bb	priority=2}# Only WPA-EAP is used. Both CCMP and TKIP is accepted. An AP that used WEP104# or WEP40 as the group cipher will not be accepted.network={	ssid="example"	proto=RSN	key_mgmt=WPA-EAP	pairwise=CCMP TKIP	group=CCMP TKIP	eap=TLS	identity="user@example.com"	ca_cert="/etc/cert/ca.pem"	client_cert="/etc/cert/user.pem"	private_key="/etc/cert/user.prv"	private_key_passwd="password"	priority=1}# EAP-PEAP/MSCHAPv2 configuration for RADIUS servers that use the new peaplabel# (e.g., Radiator)network={	ssid="example"	key_mgmt=WPA-EAP	eap=PEAP	identity="user@example.com"	password="foobar"	ca_cert="/etc/cert/ca.pem"	phase1="peaplabel=1"	phase2="auth=MSCHAPV2"	priority=10}# EAP-TTLS/EAP-MD5-Challenge configuration with anonymous identity for the# unencrypted use. Real identity is sent only within an encrypted TLS tunnel.network={	ssid="example"	key_mgmt=WPA-EAP	eap=TTLS	identity="user@example.com"	anonymous_identity="anonymous@example.com"	password="foobar"	ca_cert="/etc/cert/ca.pem"	priority=2}# EAP-TTLS/MSCHAPv2 configuration with anonymous identity for the unencrypted# use. Real identity is sent only within an encrypted TLS tunnel.network={	ssid="example"	key_mgmt=WPA-EAP	eap=TTLS	identity="user@example.com"	anonymous_identity="anonymous@example.com"	password="foobar"	ca_cert="/etc/cert/ca.pem"	phase2="auth=MSCHAPV2"}# WPA-EAP, EAP-TTLS with different CA certificate used for outer and inner# authentication.network={	ssid="example"	key_mgmt=WPA-EAP	eap=TTLS	# Phase1 / outer authentication	anonymous_identity="anonymous@example.com"	ca_cert="/etc/cert/ca.pem"	# Phase 2 / inner authentication	phase2="autheap=TLS"	ca_cert2="/etc/cert/ca2.pem"	client_cert2="/etc/cer/user.pem"	private_key2="/etc/cer/user.prv"	private_key2_passwd="password"	priority=2}# Both WPA-PSK and WPA-EAP is accepted. Only CCMP is accepted as pairwise and# group cipher.network={	ssid="example"	bssid=00:11:22:33:44:55	proto=WPA RSN	key_mgmt=WPA-PSK WPA-EAP	pairwise=CCMP	group=CCMP	psk=06b4be19da289f475aa46a33cb793029d4ab3db7a23ee92382eb0106c72ac7bb}# Special characters in SSID, so use hex string. Default to WPA-PSK, WPA-EAP# and all valid ciphers.network={	ssid=00010203	psk=000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f}# EAP-SIM with a GSM SIM or USIMnetwork={	ssid="eap-sim-test"	key_mgmt=WPA-EAP	eap=SIM	pin="1234"	pcsc=""}# EAP-PSKnetwork={	ssid="eap-psk-test"	key_mgmt=WPA-EAP	eap=PSK	identity="eap_psk_user"	eappsk=06b4be19da289f475aa46a33cb793029	nai="eap_psk_user@example.com"}# IEEE 802.1X/EAPOL with dynamically generated WEP keys (i.e., no WPA) using# EAP-TLS for authentication and key generation; require both unicast and# broadcast WEP keys.network={	ssid="1x-test"	key_mgmt=IEEE8021X	eap=TLS	identity="user@example.com"	ca_cert="/etc/cert/ca.pem"	client_cert="/etc/cert/user.pem"	private_key="/etc/cert/user.prv"	private_key_passwd="password"	eapol_flags=3}# LEAP with dynamic WEP keysnetwork={	ssid="leap-example"	key_mgmt=IEEE8021X	eap=LEAP	identity="user"	password="foobar"}# EAP-FAST with WPA (WPA or WPA2)network={	ssid="eap-fast-test"	key_mgmt=WPA-EAP	eap=FAST	anonymous_identity="FAST-000102030405"	identity="username"	password="password"	phase1="fast_provisioning=1"	pac_file="/etc/wpa_supplicant.eap-fast-pac"}network={	ssid="eap-fast-test"	key_mgmt=WPA-EAP	eap=FAST	anonymous_identity="FAST-000102030405"	identity="username"	password="password"	phase1="fast_provisioning=1"	pac_file="blob://eap-fast-pac"}# Plaintext connection (no WPA, no IEEE 802.1X)network={	ssid="plaintext-test"	key_mgmt=NONE}# Shared WEP key connection (no WPA, no IEEE 802.1X)network={	ssid="static-wep-test"	key_mgmt=NONE	wep_key0="abcde"	wep_key1=0102030405	wep_key2="1234567890123"	wep_tx_keyidx=0	priority=5}# Shared WEP key connection (no WPA, no IEEE 802.1X) using Shared Key# IEEE 802.11 authenticationnetwork={	ssid="static-wep-test2"	key_mgmt=NONE	wep_key0="abcde"	wep_key1=0102030405	wep_key2="1234567890123"	wep_tx_keyidx=0	priority=5	auth_alg=SHARED}# IBSS/ad-hoc network with WPA-None/TKIP.network={	ssid="test adhoc"	mode=1	proto=WPA	key_mgmt=WPA-NONE	pairwise=NONE	group=TKIP	psk="secret passphrase"}# Catch all example that allows more or less all configuration modesnetwork={	ssid="example"	scan_ssid=1	key_mgmt=WPA-EAP WPA-PSK IEEE8021X NONE	pairwise=CCMP TKIP	group=CCMP TKIP WEP104 WEP40	psk="very secret passphrase"	eap=TTLS PEAP TLS	identity="user@example.com"	password="foobar"	ca_cert="/etc/cert/ca.pem"	client_cert="/etc/cert/user.pem"	private_key="/etc/cert/user.prv"	private_key_passwd="password"	phase1="peaplabel=0"}# Example of EAP-TLS with smartcard (openssl engine)network={	ssid="example"	key_mgmt=WPA-EAP	eap=TLS	proto=RSN	pairwise=CCMP TKIP	group=CCMP TKIP	identity="user@example.com"	ca_cert="/etc/cert/ca.pem"	client_cert="/etc/cert/user.pem"	engine=1	# The engine configured here must be available. Look at	# OpenSSL engine support in the global section.	# The key available through the engine must be the private key	# matching the client certificate configured above.	# use the opensc engine	#engine_id="opensc"	#key_id="45"	# use the pkcs11 engine	engine_id="pkcs11"	key_id="id_45"	# Optional PIN configuration; this can be left out and PIN will be	# asked through the control interface	pin="1234"}# Example configuration showing how to use an inlined blob as a CA certificate# data instead of using external filenetwork={	ssid="example"	key_mgmt=WPA-EAP	eap=TTLS	identity="user@example.com"	anonymous_identity="anonymous@example.com"	password="foobar"	ca_cert="blob://exampleblob"	priority=20}blob-base64-exampleblob={SGVsbG8gV29ybGQhCg==}

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -