Blame SOURCES/hostapd.conf.5

e01d94
.\" Manpage for hostapd.conf.
e01d94
.\" Original scrape of https://www.daemon-systems.org/man/hostapd.conf.5.html
e01d94
.\" Contact linville@redhat.com to correct errors or typos.
e01d94
.TH hostapd.conf 5 "10 Feb 2021" "1.0" "hostapd.conf man page"
e01d94
.SH NAME
e01d94
hostapd.conf \- configuration file for hostapd(8) utility
e01d94
.SH DESCRIPTION
e01d94
The hostapd.conf utility is an authenticator for IEEE 802.11 networks.
e01d94
It provides full support for WPA/IEEE 802.11i and can also act as an IEEE
e01d94
802.1X Authenticator with a suitable backend Authentication Server
e01d94
(typically FreeRADIUS).
e01d94
The configuration file consists of global parameters and domain specific
e01d94
configuration:
e01d94
.P
e01d94
\(bu IEEE 802.1X-2004
e01d94
.P
e01d94
\(bu RADIUS client
e01d94
.P
e01d94
\(bu RADIUS authentication server
e01d94
.P
e01d94
\(bu WPA/IEEE 802.11i
e01d94
.SH GLOBAL PARAMETERS
e01d94
The following parameters are recognized:
e01d94
.SS interface
e01d94
Interface name.  Should be set in "hostap" mode.
e01d94
.SS debug
e01d94
Debugging mode: 0 = no, 1 = minimal, 2 = verbose, 3 = msg dumps,
e01d94
4 = excessive.
e01d94
.SS dump_file
e01d94
Dump file for state information (on SIGUSR1).
e01d94
.SS ctrl_interface
e01d94
The pathname of the directory in which hostapd(8) creates UNIX
e01d94
domain socket files for communication with frontend programs such
e01d94
as hostapd_cli(8).
e01d94
.SS ctrl_interface_group
e01d94
A group name or group ID to use in setting protection on the
e01d94
control interface file.  This can be set to allow non-root users
e01d94
to access the control interface files.  If no group is specified,
e01d94
the group ID of the control interface is not modified and will,
e01d94
typically, be the group ID of the directory in which the socket
e01d94
is created.
e01d94
.SH IEEE 802.1X-2004 PARAMETERS
e01d94
The following parameters are recognized:
e01d94
.SS ieee8021x
e01d94
Require IEEE 802.1X authorization.
e01d94
.SS eap_message
e01d94
Optional displayable message sent with EAP Request-Identity.
e01d94
.SS wep_key_len_broadcast
e01d94
Key lengths for broadcast keys.
e01d94
.SS wep_key_len_unicast
e01d94
Key lengths for unicast keys.
e01d94
.SS wep_rekey_period
e01d94
Rekeying period in seconds.
e01d94
.SS eapol_key_index_workaround
e01d94
EAPOL-Key index workaround (set bit7) for WinXP Supplicant.
e01d94
.SS eap_reauth_period
e01d94
EAP reauthentication period in seconds.  To disable
e01d94
reauthentication, use "0".
e01d94
.SH RADIUS CLIENT PARAMETERS
e01d94
The following parameters are recognized:
e01d94
.SS own_ip_addr
e01d94
The own IP address of the access point (used as NAS-IP-Address).
e01d94
.SS nas_identifier
e01d94
Optional NAS-Identifier string for RADIUS messages.
e01d94
.SS auth_server_addr, auth_server_port, auth_server_shared_secret
e01d94
RADIUS authentication server parameters.  Can be defined twice
e01d94
for secondary servers to be used if primary one does not reply to
e01d94
RADIUS packets.
e01d94
.SS acct_server_addr, acct_server_port, acct_server_shared_secret
e01d94
RADIUS accounting server parameters.  Can be defined twice for
e01d94
secondary servers to be used if primary one does not reply to
e01d94
RADIUS packets.
e01d94
.SS radius_retry_primary_interval
e01d94
Retry interval for trying to return to the primary RADIUS server
e01d94
(in seconds).
e01d94
.SS radius_acct_interim_interval
e01d94
Interim accounting update interval.  If this is set (larger than
e01d94
0) and acct_server is configured, hostapd(8) will send interim
e01d94
accounting updates every N seconds.
e01d94
.SH RADIUS AUTHENTICATION SERVER PARAMETERS
e01d94
The following parameters are recognized:
e01d94
.SS radius_server_clients
e01d94
File name of the RADIUS clients configuration for the RADIUS
e01d94
server.  If this is commented out, RADIUS server is disabled.
e01d94
.SS radius_server_auth_port
e01d94
The UDP port number for the RADIUS authentication server.
e01d94
.SS radius_server_ipv6
e01d94
Use IPv6 with RADIUS server.
e01d94
.SH WPA/IEEE 802.11i PARAMETERS
e01d94
The following parameters are recognized:
e01d94
.SS wpa
e01d94
Enable WPA.  Setting this variable configures the AP to require
e01d94
WPA (either WPA-PSK or WPA-RADIUS/EAP based on other
e01d94
configuration).
e01d94
.SS wpa_psk, wpa_passphrase
e01d94
WPA pre-shared keys for WPA-PSK.  This can be either entered as a
e01d94
256-bit secret in hex format (64 hex digits), wpa_psk, or as an
e01d94
ASCII passphrase (8..63 characters) that will be converted to
e01d94
PSK.  This conversion uses SSID so the PSK changes when ASCII
e01d94
passphrase is used and the SSID is changed.
e01d94
.SS wpa_psk_file
e01d94
Optionally, WPA PSKs can be read from a separate text file
e01d94
(containing a list of (PSK,MAC address) pairs.
e01d94
.SS wpa_key_mgmt
e01d94
Set of accepted key management algorithms (WPA-PSK, WPA-EAP, or
e01d94
both).
e01d94
.SS wpa_pairwise
e01d94
Set of accepted cipher suites (encryption algorithms) for
e01d94
pairwise keys (unicast packets).  See the example file for more
e01d94
information.
e01d94
.SS wpa_group_rekey
e01d94
Time interval for rekeying GTK (broadcast/multicast encryption
e01d94
keys) in seconds.
e01d94
.SS wpa_strict_rekey
e01d94
Rekey GTK when any STA that possesses the current GTK is leaving
e01d94
the BSS.
e01d94
.SS wpa_gmk_rekey
e01d94
Time interval for rekeying GMK (master key used internally to
e01d94
generate GTKs (in seconds).
e01d94
.SH SEE ALSO
e01d94
hostapd(8), hostapd_cli(8), /usr/share/examples/hostapd/hostapd.conf
e01d94
.SH HISTORY
e01d94
The hostapd.conf manual page and hostapd(8) functionality first appeared
e01d94
in NetBSD 4.0.
e01d94
.SH AUTHORS
e01d94
This manual page is derived from the README and hostapd.conf files in the
e01d94
hostapd distribution provided by Jouni Malinen <jkmaline@cc.hut.fi>.