Index of /wpe/freeradius-wpe

Icon  Name                    Last modified      Size  Description
[PARENTDIR] Parent Directory - [TXT] README.html 2018-04-04 02:57 2.3K [   ] 2018-04-04 02:53 2.0K [   ] freeradius-wpe.patch 2018-04-04 02:53 18K [   ] freeradius_3_0_15_op..> 2018-04-04 02:53 5.4K

FreeRadius Wireless Pawn Edition

Updated patch for FreeRadius 3.0.13-3.0.15

More information about WPE can be found:

Supported and tested EAP Types/Inner Authentication Methods (others may also work):



apt-get install libssl-dev build-essential libtalloc-dev libpcre3-dev


Run the following commands:

tar -xvf freeradius-server-3.0.15.tar.bz2
cd freeradius-server-3.0.15
patch -Np1 -i freeradius-server-wpe.patch
patch -Np1 -i freeradius_3_0_15_openssl_1_1_tls_version_fix.diff
make install


Start radiusd in a terminal:

radiusd -s -X

If it fails running and complains about OpenSSL being vulnerable, make sure OpenSSL is up to date. If you are using a recent distribution, most likely OpenSSL is patched, and you can safely allow it. In order to do so, edit /usr/local/etc/raddb/radiusd.conf and change allow_vulnerable_openssl from no to 'CVE-2016-6304' (with the single quotes).

Now, connect a client. Once a username/password is entered and the certificate accepted, information regarding that session will be stored in /usr/local/var/log/radius/freeradius-server-wpe.log.

Note: This file won't be created until the first client connects and authenticates to the access point.


Debian testing disabled TLS 1.0 and TLS 1.1 which break FreeRADIUS-WPE. A bug has been reported to Debian to enable TLS 1.0/1.1 and FreeRADIUS is working on a solution.