You are not logged in.
Pages: 1
Hi everyone,
Im trying to connect to the wifi of my school, but he is a little special,
First, it work with an email account, each account has his own password,
Furthermore, the certificate is not valid,
If i understand well the way we configure the wpa_supplicant configuration file, it has to look like this :
network={
ssid="WiFi@YNOV
identity="frederic.lauzin@ynov.com"
passwork="accountPwd"
priority=1
}
But actually, this configuration dont work,
Here is the output of the iw scan of WiFi@YNOV :
BSS 94:b4:0f:f4:fe:80(on wlp4s0)
TSF: 1188507771 usec (0d, 00:19:48)
freq: 2462
beacon interval: 100 TUs
capability: ESS Privacy ShortPreamble ShortSlotTime (0x0431)
signal: -54.00 dBm
last seen: 160 ms ago
Information elements from Probe Response frame:
SSID: WiFi@YNOV
Supported rates: 1.0* 2.0* 5.5 11.0 18.0 24.0 36.0 54.0
DS Parameter set: channel 11
ERP: <no flags>
RSN: * Version: 1
* Group cipher: CCMP
* Pairwise ciphers: CCMP
* Authentication suites: IEEE 802.1X
* Capabilities: 4-PTKSA-RC 4-GTKSA-RC (0x0028)
Extended supported rates: 6.0 9.0 12.0 48.0
BSS Load:
* station count: 22
* channel utilisation: 93/255
* available admission capacity: 21875 [*32us]
HT capabilities:
Capabilities: 0x112d
RX LDPC
HT20
SM Power Save disabled
RX HT20 SGI
RX STBC 1-stream
Max AMSDU length: 3839 bytes
DSSS/CCK HT40
Maximum RX AMPDU length 65535 bytes (exponent: 0x003)
Minimum RX AMPDU time spacing: 4 usec (0x05)
HT RX MCS rate indexes supported: 0-23
HT TX MCS rate indexes are undefined
HT operation:
* primary channel: 11
* secondary channel offset: no secondary
* STA channel width: 20 MHz
* RIFS: 1
* HT protection: nonmember
* non-GF present: 1
* OBSS non-GF present: 1
* dual beacon: 0
* dual CTS protection: 0
* STBC beacon: 0
* L-SIG TXOP Prot: 0
* PCO active: 0
* PCO phase: 0
Overlapping BSS scan params:
* passive dwell: 20 TUs
* active dwell: 10 TUs
* channel width trigger scan interval: 300 s
* scan passive total per channel: 200 TUs
* scan active total per channel: 20 TUs
* BSS width channel transition delay factor: 5
* OBSS Scan Activity Threshold: 0.25 %
Extended capabilities: HT Information Exchange Supported, Extended Channel Switching, BSS Transition, 6
WMM: * Parameter version 1
* u-APSD
* BE: CW 15-1023, AIFSN 3
* BK: CW 15-1023, AIFSN 7
* VI: CW 7-15, AIFSN 2, TXOP 3008 usec
* VO: CW 3-7, AIFSN 2, TXOP 1504 usec
Im not the only one facing this trouble in my school, but im alone with an archlinux ^^,
Is there a way to avoid the certificate ?
Have a good day !
Last edited by Hackedia (2016-10-20 13:53:48)
Offline
passwork="accountPwd"
This is a typo, it should be password. Or did that just happen while copy-typing it here?
But actually, this configuration dont work,
How does it not work? What is the output of wpa_supplicant when using that config?
Im not the only one facing this trouble in my school, but im alone with an archlinux ^^,
Yes, but are there other people using Linux? The distribution usually doesn't matter for stuff like that. Perhaps the school's IT department may give you the necessary information/documentation for Linux.
Is there a way to avoid the certificate ?
Better, install their certificate (again, ask the school's IT guys).
Assuming they've set up their network with RADIUS, here is an example config for my university:
ctrl_interface=/run/wpa_supplicant
network={
ssid="UniversityAP"
key_mgmt=WPA-EAP
proto=WPA2
eap=TTLS
identity="ayekat@university.com"
password="ayekatspassword"
anonymous_identity="anonymous@university.com"
phase2="auth=MSCHAPV2"
ca_cert="/etc/ssl/certs/some_CA.pem"
subject_match="CN=radius.university.com"
priority=8
}
Offline
Hi Ayekat,
Thanks for your answer !
I type it by myself here, the real file is correctly typed ^^
What is the output of wpa_supplicant when using that config?
Edit : I just saw your comment in the other post (Didnt noticed i posted 2 topics, connection really low here...),
The output look normal :
Successfully initialized wpa_supplicant
Could not read interface p2p-dev-wlp4s0 flags: No such device
In fact i dont understand all the attributes (such as eap, phase2, proto..)
And i dont know how to fill them, where i can find this informations (is it noticed in the iw scan ?)
edit : in fact there is no certificate at all... x)
Have a good day !
Last edited by Hackedia (2016-10-20 14:18:53)
Offline
The output look normal :
Successfully initialized wpa_supplicant Could not read interface p2p-dev-wlp4s0 flags: No such device
That doesn't look normal to me. According to that output, you are trying to launch wpa_supplicant on the network interface `p2p-dev-wlp4s0`, which does not exist. What's the output of this?
ip link
Offline
I used to get similar “p2p” device errors until I put:
p2p_disabled=1
into the conf file. That disables the Wi-Fi Direct support (which I don't need).
Offline
Hi guys !
I dont have any trouble to connect to a classic wifi with just an ssid and a psk, but here the radius of my school is weird, he dont have any certificate, and i dont know his CN
Here is my actual WPA configuration :
network={
ssid="WiFi@YNOV"
key_mgmt=WPA-EAP
proto=WPA2
eap=TTLS
identity="frederic.lauzin@ynov.com"
password="MyPwd"
priority=1
}
I'll send a mail to the support and be back here, thanks for your helps guys !
Last edited by Hackedia (2016-10-27 07:42:04)
Offline
Pages: 1