happened to comment on the step to configure WIFI on Debian Lenny.
System: Debian 5 Lenny
Network card: Broadcom Corporation BCM4311
802.11b / g (rev 01)
DHCP Security: WPA2-PSK
AES kernel module:
HowToIdentifyADevice PCI
How to use WiFi
interface
HOWTO: Wireless Security - WPA1, WPA2, LEAP, etc.
Tasks:
Wireless To search our plate we can use the lspci command:
# lspci
add "contrib" in our official repository of Debian, / etc / apt / sources.list: deb
http://ftp.us.debian.org/debian lenny main contrib non-free packages
update:
aptitude update installed the driver and security wpa: # aptitude install b43-fwcutter
wpasupplicant wireless-tools (we accept to download the firmware from the Internet)
raise the module: modprobe b43
possible networks we use to scan: iwlist wlan0 scan
We can also install Wifi-Radar to make the same thing but graphically:
aptitude install wifi-radar
For this test I want to connect to a hidden network using: WPA2-PSK AES
For this we create wpa passphrase: ID password
wpa_passphrase
create the configuration file / etc / wpa_supplicant / wpa_supplicant.conf, inside is copy the file output of last command and some extra parameters, we have to look like:
ctrl_interface = / var / run / wpa_supplicant network = {
ssid = "xxxx" (here is your ssid)
scan_ssid = 1 proto = WPA2 Protocol (wpa2)
key_mgmt = WPA-PSK psk = dc6e50d4177da9db9e19c7bc33eab71d948069eb7583a03d136f35b1da24ed3b
} NOTE: The command wpa_passphrase they leave a psk =... where is the encrypted password and a # psk = password unencrypted, remember to delete the # psk = password, to leave only the encrypted version.
only remains to modify / etc / network / interfaces so that they look like this:
auto wlan0 iface wlan0 inet dhcp wpa-driver
wext
(in my case I'm using the driver that corresponds to wext my motherboard Broadcom) Restart
interfaces to directly take their ip dhcp server and ready:
/ etc / init.d / networking restart
############### ################### Extra
##################################
Example configuration file / etc / networl / interfaces
auto wlan0 iface wlan0 inet static
gateway address 192.168.168.40 dns-nameservers
192,168,168,230 192,168,168,230
netmask 255.255.255.0 wpa-driver
wext
wpa-ssid wpa
-ap-scan 2 wpa-
proto RSN wpa-pairwise CCMP wpa-group
CCMP wpa-key-mgmt WPA-PSK wpa-psk
[IMPORTANT: See "WPA-PSK key generation"]
* auto wlan0:
Your network interface (eg wlan0, eth1, rausb0, ra0, etc...)
* iface wlan0 inet static:
Self-explanatory... I am using a Static IP instead of DHCP. "iface wlan0" must correspond to your network interface (see above).
* address, netmask, [..], dns-nameservers:
Also self-explanatory... Be aware that "broadcast" needs to end with ".255" for negotiation with the router. These lines need to be according to your own (static) network settings. For DHCP see further below.
* wpa-driver:
Use "wext" only. All other drivers are outdated no longer used.
[/quote]
* wpa-ssid:
Your network's ESSID (no quotes ""). Please avoid blanks/spaces as they will created problems during key generation (see below).
* wpa-ap-scan:
"1" = Broadcast of ESSID.
"2" = Hidden broadcast of ESSID.
* wpa-proto:
"RSN" = WPA(2)
"WPA" = WPA(1)
* wpa-pairwise & wpa-group:
"CCMP" = AES cipher as part of WPA(2) standard.
"TKIP" = TKIP cipher as part of WPA(1) standard.
* wpa-key-mgmt:
"WPA-PSK" = Authentication via pre-shared key (see 'key generation' further below).
"WPA-EAP" = Authentication via enterprise authentication server.
VERY IMPORTANT ("WPA PSK Key Generation"):
Now convert your WPA ASCII password using the following command:
Quote:
wpa_passphrase
Resulting in an output like...
network={
ssid="test"
#psk="12345678"
psk=fe727aa8b64ac9b3f54c72432da14faed933ea511ecab1 5bbc6c52e7522f709a
}
in the "interfaces" files with it. Then save the file and restart your network:
Quote:
sudo /etc/init.d/networking restart
espero les sea de utilidad.
Lucas Coudures Zenz
This work is licensed under a Creative Commons License
Attribution-Noncommercial-Share Alike 2.5 Argentina
.
0 comments:
Post a Comment