# Don't worry, all of the info in here is fake, modified from my original that I actually use every day. ;) # allow frontend (e.g., wpa_cli) to be used by all users in 'wheel' group ctrl_interface=/var/run/wpa_supplicant ctrl_interface_group=root #ctrl_interface_group=wheel # # home network; allow all valid ciphers #ap_scan=1 # ap_scn of 2 is best for hidden SSIDs ap_scan=2 network={ ssid="wlan1" key_mgmt=WPA-PSK #scan_ssid=1 psk=2d92e9ac0933efa9eeba340fac5061b0a99e5dc9bafe2fc9f5e6 proto=WPA pairwise=TKIP group=TKIP } # network={ ssid="wlan2" key_mgmt=WPA-PSK scan_ssid=1 psk=5d96149d830aef9c8d43951de6a1070b225cf70e91ef166a41d220 proto=WPA pairwise=TKIP group=TKIP } network={ ssid="corp" scan_ssid=1 key_mgmt=WPA-EAP eap=PEAP #identity="jpavlov" #password="xxxxxxxx" identity="jpavlov@ldmi.com" password="xxxxxxxx" #identity="bbob" #password="xxxxxxxx" pairwise=TKIP phase1="peaplabel=0" group=TKIP proto=WPA } # # work network; use EAP-TLS with WPA; allow only CCMP and TKIP ciphers #network={ # ssid="jpTestG" # scan_ssid=0 # key_mgmt=WPA-EAP # #pairwise=CCMP TKIP # pairwise=TKIP # #group=CCMP TKIP # group=TKIP # eap=PEAP # #eap=TLS # #auth_alg=OPEN # identity="user1" # #password="9dea9384715f4d3169aa59026d96c0102dae0f4ff14c6" # password="supersecret" # phase1="peaplabel=1" # phase2="auth=MSCHAPV2" # #ca_cert="/etc/cert/ca.pem" # #client_cert="/etc/cert/user.pem" # #private_key="/etc/cert/user.prv" # #private_key_passwd="password" #}