hostapd runs, but no control of network
Tim Boneko
tim
Mon Aug 22 07:17:04 PDT 2005
I wonder whether i?ve got a problem of configuration or understanding...
I compiled hostapd v. 0.4.4 with all necessary options (and a few more,
most of all use of prism54 card and internal radius server).
I started it. Output looked fine, including the line "Deauthenticating
all stations". (No error messages in the output btw.)
Still all clients have a working connnection, hostapd doesn?t keep
anybody from connnecting. So i changed the config from internal radius
to a freeradius server i just installed. I configured the clients.conf
file and seem to have hostapd running with my freeradius server, but
still anybody can connect without password.
Logs of freeradius look good to a freeradius newbie like me:
/var/log/freeradius/radius.log:
Mon Aug 22 15:36:29 2005 : Info: Ready to process requests.
Mon Aug 22 15:36:36 2005 : Info: rlm_radutmp: NAS localhost restarted
(Accounting-On packet seen)
/var/log/freeradius/radacct/detail-20050822:
Mon Aug 22 15:36:36 2005
Acct-Status-Type = Accounting-On
Acct-Authentic = RADIUS
NAS-IP-Address = 127.0.0.1
Called-Station-Id = "00-04-E2-80-EE-03:thalheim"
Acct-Terminate-Cause = NAS-Reboot
Client-IP-Address = 127.0.0.1
Acct-Unique-Session-Id = "60762dd8d4469af9"
Timestamp = 1124717796
...thalheim is my domain, before that is the prism54 MAC address...
Can anybody shed some light on me? What am i missing? Does the internal
hostapd radius server really authenticate anyone with any passwd? Or
could i uninstall freeradius again? Would be nice since this becomes a
bit oversized with freeradius.
Below is my hostapd.conf, just in case anybody finds the BIG MISTAKE (tm)
Thx,
timbo
/etc/hostapd/hostapd.conf: (version using freeradius, tried lots of
variations without freeradius)
interface=eth1
driver=prism54
logger_syslog=8
logger_syslog_level=1
logger_stdout=-8
logger_stdout_level=1
debug=2
dump_file=/tmp/hostapd.dump
#ctrl_interface=/var/run/hostapd
#ctrl_interface_group=wheel
#ctrl_interface_group=0
ssid=thalheim
macaddr_acl=0
accept_mac_file=/etc/hostapd/hostapd.accept
deny_mac_file=/etc/hostapd/hostapd.deny
auth_algs=3
#assoc_ap_addr=00:12:34:56:78:9a
ieee8021x=1
eap_message=hello\0networkid=netw,nasid=foo,portid=0,NAIRealms=thalheim
#wep_key_len_broadcast=5
#wep_key_len_unicast=5
#wep_rekey_period=300
eapol_key_index_workaround=0
#eap_reauth_period=3600
eap_server=0
#eap_user_file=/etc/hostapd/hostapd.eap_user
#ca_cert=/etc/ssl/certs/cacert.pem
#server_cert=/etc/ssl/certs/kiste-cert.pem
#private_key=/etc/ssl/private/kiste-key.pem
#private_key_passwd=
#check_crl=0
#eap_sim_db=/etc/hostapd/hostapd.sim_db
#iapp_interface=eth0
own_ip_addr=127.0.0.1
#nas_identifier=ap.example.com
auth_server_addr=127.0.0.1
auth_server_port=1812
auth_server_shared_secret=password
acct_server_addr=127.0.0.1
acct_server_port=1813
acct_server_shared_secret=passwd
#radius_acct_interim_interval=600
#radius_server_clients=/etc/hostapd/hostapd.radius_clients
#radius_server_auth_port=1812
#radius_server_ipv6=1
wpa=0
wpa_passphrase=weirdpassphrase
#wpa_psk_file=/etc/hostapd.wpa_psk
wpa_key_mgmt=WPA-PSK WPA-EAP
wpa_pairwise=TKIP CCMP
#wpa_group_rekey=600
#wpa_strict_rekey=1
#wpa_gmk_rekey=86400
rsn_preauth=0
#rsn_preauth_interfaces=eth0
More information about the Hostap
mailing list