Specifications
64
65
When Advanced →
EAP Anonymous Identity
Anonymous identity string for EAP (to be used as the unencrypted identity with EAP types that
support different tunnelled identity, e.g., EAP-TTLS).
EAP Phase 1 String
Phase1 (outer authentication, i.e., TLS tunnel) parameters (string with eld-value pairs, e.g.,
“peapver=0”). ‘peap_outer_success=0’ can be used to terminate PEAP authentication on tunneled
EAP-Success. This is required with some RADIUS servers that implement draft-josefsson-pppext-
eap-tls-eap-05.txt (e.g., Lucent NavisRadius v4.4.0 with PEAP in “IETF Draft 5” mode
url : http://www.watersprings.org/pub/id/draft-josefsson-pppext-eap-tls-eap-05.txt).
‘include_tls_length=1’ can be used to force pa_supplicant to include LS Message Length eld in all
TLS messages even if they are not fragmented.
‘sim_min_num_chal=3’ can be used to congure EAP-SIM to require three challenges (by default,
it accepts 2 or 3). ‘result_ind=1’ can be used to enable EAP-SIM and EAP-AKA to use protected
result indication.
crypto_binding’ option can be used to control PEAPv0 cryptobinding behavior:
0 = Do not use cryptobinding.
1 = Use cryptobinding if server supports it (default).
2 = Require cryptobinding.
EAP Phase 2 String
Phase2 (inner authentication with TLS tunnel) parameters (string with eld-value pairs, e.g.,
“auth=MSCHAPV2” for EAP-PEAP or “autheap=MSCHAPV2 autheap=MD5” for EAP-TTLS).
The following certicate/private key elds are used in inner Phase2 authentication when using
EAP-TTLS or EAP-PEAP.
ca-cert2-lename:
client-cert2-lename: Client certicate le name.
priv-key2-lename: Path to client private key le name.
priv-key2-password: Password for private key le name.
dh-parm2-lename: DH/DSA parameters le name (in PEM format).
subject_match2: Substring to be matched against the subject of the authentication server certicate.
altsubject_match2: Substring to be matched against the alternative subject name of the authentication
server certicate.
File path to CA certicate le. This le can have one or more trusted CA certicates.
If ca-cert2-lename is not included the server certicate will not be veried.
This is insecure and a trusted CA certicate should always be congured.
EAP Subject Match String
Substring to be matched against the subject of the authentication server certicate. If this string
is set, the server certicate is only accepted if it contains this string in the subject.
The subject string is in following format:
/C=US/ST=CA/L=San Francisco/CN=Test AS/emailAddress=as@example.com
EAP Alternate Subject Match/Match2 String
Semicolon separated string of entries to be matched against the alternative subject name
of the authentication server certicate. If this string is set, the server certicate is only
accepted if it contains one of the entries in an alternative subject name extension.
altSubjectName string is in
TYPE:VALUE format.
Example:
EMAIL:server@example.com
Example:
DNS:server.example.com;
DNS:server2.example.com Following types are supported:
EMAIL, DNS, URI
CA Certicate 2 File Name
The CA certicate 2 le name. (PEM/DER) This le can have one or more trusted CA
certicates. A trusted CA certicate should always be congured when using EAP-TLS,
TTLS, or PEAP.
Client Certicate/Certicate2 File Name
The client certicate/certicate2 le name. (PEM/DER)
Private Key File Name
The client private key le name. (PEM/DER/PFX) When PKCS#12/PFX les are used the client-
cert-lename should not be used.
Private Key File Password
The password for the private key le.
Private Key 2 File Name
The password for the private key le.
Private Key File 2 Password
The client private key 2 le name. (PEM/DER/PFX) When PKCS#12/PFX les are
used the client-cert2-lename should not be used.