Skip to content
Snippets Groups Projects
Commit cd77a1f7 authored by AK's avatar AK
Browse files

Add new file

parent 902c00e3
No related branches found
No related tags found
2 merge requests!50Changes from !47 with fixed merge conflicts,!47Add network WiFi settings
== Android ==
=== App ===
You can use our Android App to configure the correct WiFi settings on your Android device. Download it here:
* From Google Playstore: https://play.google.com/store/apps/details?id=nl.eventinfra.wifisetup
* Source-code: https://github.com/EventInfra/wifisetup
* APK download: https://eventinfra.org/Camp2023/app-release.apk
=== Manually ===
If you don't want to use the app, download the [https://letsencrypt.org/certs/isrgrootx1.pem ISRG Root X1], and [https://support.google.com/pixelphone/answer/2844832 install it] into your device's '''Wi-Fi certificate''' store, giving it any name you like. Then connect to the '''Camp2023''' network using the following information:
{|padding
| EAP method || TTLS ''(not TLS)''
|-
| style="padding-right: 1em" | Phase 2 authentication || PAP
|-
| CA certificate || ''(whatever name you gave the ISRG Root X1)''
|-
| Domain || radius.c3noc.net
|-
| Identity || mch
|-
| Password || mch
|}
It's fine to leave '''Online Certificate status''' as "Do not validate", and leave the '''Anonymous identity''' blank.
== Linux, etc. ==
=== Network Manager ===
You can use the following config file:
Please note that some versions of NM are buggy and will only work with 802.1X using MSCHAPv2, or not at all. If that affects you, it may be easiest to use wpa_supplicant.
/etc/NetworkManager/system-connections/Camp2023:
Hint: chmod 600 this file to make the connection work.
<pre>[connection]
id=Camp2023
uuid=c80101e2-7b99-4511-846b-2388eb86a5ad
type=wifi
permissions=
secondaries=
[wifi]
mac-address=42:23:42:23:42:23 <- !! Please change this !!
mac-address-blacklist=
mode=infrastructure
seen-bssids=
ssid=Camp2023
[wifi-security]
auth-alg=open
group=
key-mgmt=wpa-eap
pairwise=
proto=
[802-1x]
altsubject-matches=DNS:radius.c3noc.net
ca-cert=/etc/ssl/certs/ISRG_Root_X1.pem
eap=ttls;
identity=mch
password=mch
phase2-altsubject-matches=
phase2-auth=pap
[ipv4]
dns-search=
method=auto
[ipv6]
dns-search=
method=auto</pre>
=== WiCD ===
You need an additional crypto setting for WiCD. Put this file into /etc/wicd/encryption/templates/eap-ttls (debian systems, might be different with other *nix flavours):
<pre>
name = EAP-TTLS Camp2023
author = Felicitus
require identity *Identity password *password
-----
ctrl_interface=/var/run/wpa_supplicant
network={
ssid="Camp2023"
scan_ssid=$_SCAN
identity="mch"
password="mch"
proto=WPA2
key_mgmt=WPA-EAP
group=CCMP
pairwise=CCMP
eap=TTLS
ca_cert="/etc/ssl/certs/ISRG_Root_X1.pem"
altsubject_match="DNS:radius.c3noc.net"
anonymous_identity="$_ANONYMOUS_IDENTITY"
phase2="auth=PAP"
#priority=2
}
</pre>
Edit /etc/wicd/encryption/templates/active to include the eap-ttls config template. Restart the WiCD daemon, choose the proper encryption (EAP-TTLS Camp2023) and enter a random username/password.
=== Jolla/connman ===
/var/lib/connman/Camp2023wifi.config :
<pre>
[service_Camp2023]
Type=wifi
Name=Camp2023-legacy
EAP=ttls
Phase2=PAP
Identity=mch
Passphrase=mch
</pre>
=== wpa_supplicant ===
This is the default option on Raspberry Pi OS. Edit /etc/wpa_supplicant/wpa_supplicant.conf and add the network:
network={
ssid="Camp2023"
key_mgmt=WPA-EAP
eap=TTLS
identity="mch"
password="mch"
# ca path on debian 7.x and raspberry pi OS, modify accordingly
ca_cert="/etc/ssl/certs/ISRG_Root_X1.pem"
altsubject_match="DNS:radius.c3noc.net"
phase2="auth=PAP"
}
</pre>
=== Interfaces ===
As an alternative, you can specify the wpa_supplicant config options directly in /etc/network/interfaces:
<pre>
iface wlan0 inet dhcp
wpa-ssid Camp2023
wpa-identity mch
wpa-password mch
wpa-proto WPA2
wpa-key_mgmt WPA-EAP
wpa-group CCMP
wpa-pairwise CCMP
wpa-eap TTLS
wpa-phase2 "auth=PAP"
wpa-ca_cert "/etc/ssl/certs/ISRG_Root_X1.pem"
wpa-altsubject_match DNS:radius.c3noc.net
</pre>
=== Netctl ===
<pre>Description='Camp2023 secure WPA2 802.1X config'
Interface=wls1
Connection=wireless
Security=wpa-configsection
IP=dhcp
ESSID=Camp2023
WPAConfigSection=(
'ssid="Camp2023"'
'proto=RSN WPA'
'key_mgmt=WPA-EAP'
'eap=TTLS'
'identity="mch"'
'password="mch"'
'ca_cert="/etc/ssl/certs/ISRG_Root_X1.pem"'
'altsubject_match="DNS:radius.c3noc.net"'
'phase2="auth=PAP"'
)</pre>
=== IWD ===
<pre>[Security]
EAP-Method=PEAP
EAP-Identity=anonymous@Camp2023
EAP-PEAP-CACert=/etc/ssl/certs/ISRG_Root_X1.pem
EAP-PEAP-ServerDomainMask=radius.c3noc.net
EAP-PEAP-Phase2-Method=MSCHAPV2
EAP-PEAP-Phase2-Identity=mch
EAP-PEAP-Phase2-Password=mch
[Settings]
AutoConnect=true</pre>
=== NixOS ===
<pre>
networking.wireless.networks."Camp2023".auth = ''
key_mgmt=WPA-EAP
eap=TTLS
identity="mch"
password="mch"
ca_cert="${builtins.fetchurl {
url = "https://letsencrypt.org/certs/isrgrootx1.pem";
sha256 = "sha256:1la36n2f31j9s03v847ig6ny9lr875q3g7smnq33dcsmf2i5gd92";
}}"
altsubject_match="DNS:radius.c3noc.net"
phase2="auth=PAP"
'';
</pre>
== Apple MacOS/iOS ==
You can use one of these profiles for the correct WiFi-settings for Apple MacOS / iOS:
* [https://eventinfra.org/Camp2023/Camp2023.mobileconfig Camp2023] (2.4GHz+5GHz, mch user)
== Windows ==
Import one of these profiles for the correct WiFi-settings for Windows:
* [https://eventinfra.org/Camp2023/Camp2023.xml Camp2023] (2.4GHz+5GHz)
To import and connect follow these steps:
# Open a command prompt and execute: netsh wlan add profile filename=Camp2023.xml
# Connect to the Camp2023 network; use "mch/mch" as the username/password when prompted. Alternatively, use "outboundonly/outboundonly" as the username/password to enable inbound traffic firewalling.
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment