Quote from: adamrc on August 09, 2024, 11:54:38 pmQuote from: effex on August 09, 2024, 11:28:24 pmMine is still not working with the code above. The openatt.sh script seems to work just fine, however, something is not working with wpa_supplicant. I tried manually executing the script in early and it gets to “daemonize” and gives me a permission denied. Any way to further debug it?No need for the openatt.sh script using my method above. Just ensure certs are in the folders specified in the file.On the identity piece, is that the RG modem's former MAC address like the same as the opnaatt.sh script or are you saying my WAN mac address on my opnsense box?
Quote from: effex on August 09, 2024, 11:28:24 pmMine is still not working with the code above. The openatt.sh script seems to work just fine, however, something is not working with wpa_supplicant. I tried manually executing the script in early and it gets to “daemonize” and gives me a permission denied. Any way to further debug it?No need for the openatt.sh script using my method above. Just ensure certs are in the folders specified in the file.
Mine is still not working with the code above. The openatt.sh script seems to work just fine, however, something is not working with wpa_supplicant. I tried manually executing the script in early and it gets to “daemonize” and gives me a permission denied. Any way to further debug it?
,Franco
Congrats on finally implementing the vlan 0 patches for wpa_supplicant. Why did it take so long? Pfsense had it back in june of 2023.
I'm back up and running as well. I scrapped everything and went to the 8311 Discord channel for bypassing and got the proper info. Here are the files and contents that I used. Netgraph is no longer used/needed anymore./usr/local/etc/rc.syshook.d/early/04-wpa (make sure to chmod +x this file)Code: [Select]#!/bin/shenv OPENSSL_CONF=/conf/wpa/openssl.conf /usr/local/sbin/wpa_supplicant -Dwired -i igb0 -B -C /var/run/wpa_supplicant -c /conf/wpa/wpa_supplicant.conf/conf/wpa/openssl.confCode: [Select]openssl_conf = openssl_init[openssl_init]ssl_conf = ssl_sect[ssl_sect]system_default = system_default_sect[system_default_sect]Options = UnsafeLegacyRenegotiationMinProtocol = TLSv1CipherString = DEFAULT@SECLEVEL=0/conf/wpa/wpa_supplicant.confCode: [Select]# Generated by 802.1x Credential Extraction Tool# Copyright (c) 2018-2019 devicelocksmith.com# Version: 1.04 windows 386# # Change file names to absolute pathsctrl_interface=DIR=/var/run/wpa_supplicantopenssl_ciphers=DEFAULT@SECLEVEL=0eapol_version=2ap_scan=0fast_reauth=1network={ ca_cert="/conf/wpa/ca.pem" client_cert="/conf/wpa/client.pem" eap=TLS eapol_flags=0 identity="REDACTED" # Internet (ONT) interface MAC address must match this value key_mgmt=IEEE8021X phase1="allow_canned_success=1" private_key="/conf/wpa/private.pem"}
#!/bin/shenv OPENSSL_CONF=/conf/wpa/openssl.conf /usr/local/sbin/wpa_supplicant -Dwired -i igb0 -B -C /var/run/wpa_supplicant -c /conf/wpa/wpa_supplicant.conf
openssl_conf = openssl_init[openssl_init]ssl_conf = ssl_sect[ssl_sect]system_default = system_default_sect[system_default_sect]Options = UnsafeLegacyRenegotiationMinProtocol = TLSv1CipherString = DEFAULT@SECLEVEL=0
# Generated by 802.1x Credential Extraction Tool# Copyright (c) 2018-2019 devicelocksmith.com# Version: 1.04 windows 386# # Change file names to absolute pathsctrl_interface=DIR=/var/run/wpa_supplicantopenssl_ciphers=DEFAULT@SECLEVEL=0eapol_version=2ap_scan=0fast_reauth=1network={ ca_cert="/conf/wpa/ca.pem" client_cert="/conf/wpa/client.pem" eap=TLS eapol_flags=0 identity="REDACTED" # Internet (ONT) interface MAC address must match this value key_mgmt=IEEE8021X phase1="allow_canned_success=1" private_key="/conf/wpa/private.pem"}
#!/bin/sh/sbin/ifconfig igb0 link FF:FF:FF:FF:FF:FFenv OPENSSL_CONF=/conf/wpa/openssl.conf /usr/local/sbin/wpa_supplicant -Dwired -i igb0 -B -C /var/run/wpa_supplicant -c /conf/wpa/wpa_supplicant.conf
For those seeing this. I was able to solve my problem. I had to make sure that the interface was enabled before I could run the WPA supplicant code.I went to the 8311 discord and found the code posted here by Adamrc. There is a line omitted in the /usr/local/etc/rc.syshook.d/early/04-wpa file.Code: [Select]#!/bin/sh/sbin/ifconfig igb0 link FF:FF:FF:FF:FF:FFenv OPENSSL_CONF=/conf/wpa/openssl.conf /usr/local/sbin/wpa_supplicant -Dwired -i igb0 -B -C /var/run/wpa_supplicant -c /conf/wpa/wpa_supplicant.confWhere igb0 is the interface, and FF:FF:FF:FF:FF:FF is the Gateway MAC
iface enp1s0 inet manualiface enp1s0.0 inet manualauto vmbr1iface vmbr1 inet manual bridge-ports enp1s0.0 bridge-stp off bridge-fd 0 post-up echo 8 > /sys/class/net/vmbr1/bridge/group_fwd_mask
net0: virtio=<BGW210 MAC address>,bridge=vmbr1,queues=8
# Change file names to absolute pathsctrl_interface=DIR=/var/run/wpa_supplicantopenssl_ciphers=DEFAULT@SECLEVEL=0eapol_version=2ap_scan=0fast_reauth=1network={ ca_cert="/conf/wpa/CA.pem" client_cert="/conf/wpa/Client.pem" eap=TLS eapol_flags=0 identity="<BGW210 MAC address>" # Internet (ONT) interface MAC address must match this value key_mgmt=IEEE8021X phase1="allow_canned_success=1" private_key="/conf/wpa/PrivateKey.pem"}
#!/bin/sh/sbin/ifconfig vtnet0 link <BGW210 MAC address>env OPENSSL_CONF=/conf/wpa/openssl.conf /usr/local/sbin/wpa_supplicant -Dwired -i vtnet0 -B -C /var/run/wpa_supplicant -c /conf/wpa/wpa_supplicant.conf -t -dd