Name Last modified Size Description
Parent Directory - README.html 2018-04-04 02:57 2.3K README.md 2018-04-04 02:53 2.0K freeradius-wpe.patch 2018-04-04 02:53 18K freeradius_3_0_15_op..> 2018-04-04 02:53 5.4K
Updated patch for FreeRadius 3.0.13-3.0.15
More information about WPE can be found: http://www.willhackforsushi.com/?page_id=37
Supported and tested EAP Types/Inner Authentication Methods (others may also work):
apt-get install libssl-dev build-essential libtalloc-dev libpcre3-dev
Run the following commands:
wget ftp://ftp.freeradius.org/pub/freeradius/freeradius-server-3.0.15.tar.bz2 tar -xvf freeradius-server-3.0.15.tar.bz2 cd freeradius-server-3.0.15 wget https://raw.githubusercontent.com/aircrack-ng/aircrack-ng/master/patches/wpe/freeradius-wpe/freeradius-wpe.patch patch -Np1 -i freeradius-server-wpe.patch wget https://raw.githubusercontent.com/aircrack-ng/aircrack-ng/master/patches/wpe/freeradius-wpe/freeradius_3_0_15_openssl_1_1_tls_version_fix.diff patch -Np1 -i freeradius_3_0_15_openssl_1_1_tls_version_fix.diff ./configure make make install ldconfig
radiusd in a terminal:
radiusd -s -X
If it fails running and complains about OpenSSL being vulnerable, make sure OpenSSL is up to date. If you are using a recent distribution, most likely OpenSSL is patched, and you can safely allow it. In order to do so, edit /usr/local/etc/raddb/radiusd.conf and change
'CVE-2016-6304' (with the single quotes).
Now, connect a client. Once a username/password is entered and the certificate accepted, information regarding that session will be stored in
Note: This file won't be created until the first client connects and authenticates to the access point.
Debian testing disabled TLS 1.0 and TLS 1.1 which break FreeRADIUS-WPE. A bug has been reported to Debian to enable TLS 1.0/1.1 and FreeRADIUS is working on a solution.