Project

General

Profile

Actions

Bug #12998

closed

Wireless interface WPA configuration fields are always visible

Added by Steve Wheeler over 2 years ago. Updated over 2 years ago.

Status:
Resolved
Priority:
Normal
Assignee:
Viktor Gurov
Category:
Wireless
Target version:
Start date:
Due date:
% Done:

0%

Estimated time:
Plus Target Version:
22.05
Release Notes:
Default
Affected Version:
2.6.0
Affected Architecture:
All

Description

There are some logic errors when configuring a WIFI interface that hides/exposes the fields incorrectly.

When using Access Point mode the EAP client mode radius fields are exposed when the page is viewed initially. See attachment.
If you then change the WPA Key mode drop-down to EAP the 802.1x section is exposed but the client mode fields remain. Switching back to PSK correctly hides them and they remain correctly hidden when switching back to EAP.

Setting Ad-hoc mode correctly hides the EAP mode fields.

Setting infrastructure mode correctly exposes the fields and correctly hides them when choosing WPA Key mode PSK.

However setting Access Point mode leaves the EAP Client Mode fields exposed. See attachment.

Tested:

22.01-RELEASE (arm64)
built on Mon Feb 07 16:39:19 UTC 2022
FreeBSD 12.3-STABLE

Using/var/etc/hostapd_ath0_wlan0.conf:

interface=ath0_wlan0
driver=bsd
logger_syslog=-1
logger_syslog_level=0
logger_stdout=-1
logger_stdout_level=0
dump_file=/tmp/hostapd_ath0_wlan0.dump
ctrl_interface=/var/run/hostapd
ctrl_interface_group=wheel
#accept_mac_file=/tmp/hostapd_ath0_wlan0.accept
#deny_mac_file=/tmp/hostapd_ath0_wlan0.deny
#macaddr_acl=
ssid=Test2
debug=
wpa=2
wpa_key_mgmt=WPA-PSK
wpa_pairwise=CCMP
wpa_group_rekey=60
wpa_gmk_rekey=3600
wpa_strict_rekey=
wpa_passphrase=testtest

        <opt5>
            <descr><![CDATA[WIFI]]></descr>
            <if>ath0_wlan0</if>
            <wireless>
                <mode>hostap</mode>
                <standard>11ng</standard>
                <protmode>off</protmode>
                <ssid>Test2</ssid>
                <channel>3</channel>
                <authmode></authmode>
                <distance></distance>
                <regdomain>etsi</regdomain>
                <regcountry>GB</regcountry>
                <reglocation>indoor</reglocation>
                <wpa>
                    <macaddr_acl></macaddr_acl>
                    <wpa_mode>2</wpa_mode>
                    <wpa_key_mgmt>WPA-PSK</wpa_key_mgmt>
                    <wpa_pairwise>CCMP</wpa_pairwise>
                    <wpa_group_rekey>60</wpa_group_rekey>
                    <wpa_gmk_rekey>3600</wpa_gmk_rekey>
                    <passphrase>testtest</passphrase>
                    <ext_wpa_sw></ext_wpa_sw>
                    <wpa_eap_client_mode>PEAP</wpa_eap_client_mode>
                    <wpa_eap_inner_auth>MSCHAPV2</wpa_eap_inner_auth>
                    <wpa_eap_inner_id></wpa_eap_inner_id>
                    <wpa_eap_inner_password></wpa_eap_inner_password>
                    <wpa_eap_cert>5f0ba65fe4ad9</wpa_eap_cert>
                    <wpa_eap_ca>5f15754eb040a</wpa_eap_ca>
                    <enable></enable>
                </wpa>
                <auth_server_addr></auth_server_addr>
                <auth_server_port></auth_server_port>
                <auth_server_shared_secret></auth_server_shared_secret>
                <auth_server_addr2></auth_server_addr2>
                <auth_server_port2></auth_server_port2>
                <auth_server_shared_secret2></auth_server_shared_secret2>
                <wme>
                    <enable></enable>
                </wme>
                <channel_width>0</channel_width>
            </wireless>
            <spoofmac></spoofmac>
            <enable></enable>
            <ipaddr>192.168.58.1</ipaddr>
            <subnet>26</subnet>
        </opt5>

Files

Actions

Also available in: Atom PDF