Securely storing EAP passwords

Oleks oleks at oleks.info
Mon Jan 8 08:16:12 PST 2018


Hi,

I am an avid fan of wpa_supplicant!

I am maintaining a somewhat used configuration for Eduroam at
https://github.com/oleks/eduroam-wpa_supplicant, where I use PEAP for
authentication.

I was wondering why MD4 is (seeemingly) the only available hashing
mechanism for the `password` field? Is this a relic of EAP or PEAP?

If MD4 _is_ the only option, then why doesn't `wpa_supplicant.conf`
support subshells so that the password (or hash) may be retrieved via
another program (e.g., `pass`)?

Are there merely some features of `wpa_supplicant.conf` that I haven't
discovered yet?

-- 
Oleks
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <http://lists.infradead.org/pipermail/hostap/attachments/20180108/4ae95e8c/attachment.sig>


More information about the Hostap mailing list