⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 hostapd.eap_user

📁 hostapd源代码
💻 EAP_USER
字号:
# hostapd user database for integrated EAP authenticatorE# Each line must contain an identity, EAP method(s), and an optional password# separated with whitespace (space or tab). The identity and password must be# double quoted ("user"). Password can alternatively be stored as# NtPasswordHash (16-byte MD4 hash of the unicode presentation of the password# in unicode) if it is used for MSCHAP or MSCHAPv2 authentication. This means# that the plaintext password does not need to be included in the user file.# Password hash is stored as hash:<16-octets of hex data> without quotation# marks.# [2] flag in the end of the line can be used to mark users for tunneled phase# 2 authentication (e.g., within EAP-PEAP). In these cases, an anonymous# identity can be used in the unencrypted phase 1 and the real user identity# is transmitted only within the encrypted tunnel in phase 2. If non-anonymous# access is needed, two user entries is needed, one for phase 1 and another# with the same username for phase 2.## EAP-TLS, EAP-PEAP, EAP-TTLS, EAP-SIM, and EAP-AKA do not use password option.# EAP-MD5, EAP-MSCHAPV2, EAP-GTC, EAP-PAX, EAP-PSK, and EAP-SAKE require a# password.# EAP-PEAP and EAP-TTLS require Phase 2 configuration.## * can be used as a wildcard to match any user identity. The main purposes for# this are to set anonymous phase 1 identity for EAP-PEAP and EAP-TTLS and to# avoid having to configure every certificate for EAP-TLS authentication. The# first matching entry is selected, so * should be used as the last phase 1# user entry.## "prefix"* can be used to match the given prefix and anything after this. The# main purpose for this is to be able to avoid EAP method negotiation when the# method is using known prefix in identities (e.g., EAP-SIM and EAP-AKA). This# is only allowed for phase 1 identities.## Multiple methods can be configured to make the authenticator try them one by# one until the peer accepts one. The method names are separated with a# comma (,).## [ver=0] and [ver=1] flags after EAP type PEAP can be used to force PEAP# version based on the Phase 1 identity. Without this flag, the EAP# authenticator advertises the highest supported version and select the version# based on the first PEAP packet from the supplicant.# Phase 1 users"user"		MD5	"password""test user"	MD5	"secret""example user"	TLS"DOMAIN\user"	MSCHAPV2	"password""gtc user"	GTC	"password""pax user"	PAX	"unknown""pax.user@example.com"	PAX	0123456789abcdef0123456789abcdef"psk user"	PSK	"unknown""psk.user@example.com"	PSK	0123456789abcdef0123456789abcdef"sake.user@example.com"	SAKE	0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef"ttls"		TTLS"not anonymous"	PEAP# Default to EAP-SIM and EAP-AKA based on fixed identity prefixes"0"*		AKA,TTLS,TLS,PEAP,SIM"1"*		SIM,TTLS,TLS,PEAP,AKA"2"*		AKA,TTLS,TLS,PEAP,SIM"3"*		SIM,TTLS,TLS,PEAP,AKA"4"*		AKA,TTLS,TLS,PEAP,SIM"5"*		SIM,TTLS,TLS,PEAP,AKA# Wildcard for all other identities*		PEAP,TTLS,TLS,SIM,AKA# Phase 2 (tunnelled within EAP-PEAP or EAP-TTLS) users"t-md5"		MD5	"password"	[2]"DOMAIN\t-mschapv2"	MSCHAPV2	"password"	[2]"t-gtc"		GTC	"password"	[2]"not anonymous"	MSCHAPV2	"password"	[2]"user"		MD5,GTC,MSCHAPV2	"password"	[2]"test user"	MSCHAPV2	hash:000102030405060708090a0b0c0d0e0f	[2]

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -