Commit Graph

221 Commits

Author SHA1 Message Date
John Crispin
c836eb5cf4 ssid: fix roaming defaults for PSK and RADIUS configurations
- Disable generate_psk by default to prevent issues with PSK roaming on VLANs
- Set message_exchange to 'ds' for SAE/WPA3 RADIUS roaming

Signed-off-by: John Crispin <john@phrozen.org>
2025-10-09 11:58:58 +02:00
Aditya-Rai-25
1c6b3095cb ssid: decouple batman tunnel from meshpoint interfaces
creating a meshpoint interface with no batman-adv tunnel being present generates
an invalid configuration.

Signed-off-by: Aditya-Rai-25 <aditya21.rai@routerarchitects.com>
2025-08-04 16:32:36 +02:00
Ian Chen
b971b73d4c Support HaLow Mesh on EAP112
set HaLow MESH interface in ssid.uc

Fixes: WIFI-14896
Signed-off-by: Ian Chen <ian77_chen@accton.com>
2025-07-24 13:28:42 +02:00
John Crispin
ac3a1c7c25 convert rssi threshold to interface options
Signed-off-by: John Crispin <john@phrozen.org>
2025-06-11 07:50:13 +02:00
John Crispin
827ccc2c59 setting probe_request_rssi incorrectly turned the SSID into a hidden one
Signed-off-by: John Crispin <john@phrozen.org>
2025-06-10 08:29:50 +02:00
Henry Haller
9710867e1a make the MTU configurable on GRE tunnels
Signed-off-by: Henry Haller <hbh@rgnets.com>
2025-05-19 06:04:41 +02:00
Ian Chen
6faaa1f655 HaLow: Extend ucentral schema & state for HaLow
1. Extend ucentral schema & state for HaLow
2. Refine "system" into "sysinfo" to avoid confliction with system trace in state.uc

Fixes: WIFI-14436
Signed-off-by: Ian Chen <ian77_chen@accton.com>
2025-05-12 07:42:01 +02:00
John Crispin
7624d43dc7 set generate_local_psk to false if roaming and multi_psk are enabled
Signed-off-by: John Crispin <john@phrozen.org>
2025-04-10 09:08:10 +02:00
Venkat Chimata
246873b15c add max-inactivity to ssid config
This option specifies the maximum time (in seconds) a client can remain idle before it gets disconnected.

It can be configured under ssids in the config.

Signed-off-by: Venkat Chimata <venkata@shasta.cloud>
2025-04-10 08:23:09 +02:00
John Crispin
601bdd6063 force generate_local_psk to false for all wpa3 protos
Signed-off-by: John Crispin <john@phrozen.org>
2025-03-26 15:16:55 +01:00
Marek Kwaczynski
a518b02075 schema, ssid: add mpsk-radius encryption
Add a new encryption type to specify MPSK AAA for 6GHz.
 mpsk-radius encryption means:
 - psk2-radius for 2.4GHz, 5GHz
 - sae for 6GHz

Signed-off-by: Marek Kwaczynski <marek@shasta.cloud>
2025-03-11 10:09:49 +01:00
John Crispin
39e380e922 enforce PMF on sae-mixed mode
Signed-off-by: John Crispin <john@phrozen.org>
2025-03-03 15:17:00 +01:00
Paul White
7ac7ed51d6 schema: configure sae on 6G when SSID is sae-mixed
When configuring an SSID for 6G + 5G and/or 2G, it's possible to use
WPA3-Transition mode which is configured in the uCentral schema using
the 'sae-mixed' value.   When this is converted into the UCI
configuration, the 6G PHY ssid entry must be configured for 'sae' while
the other band(s) stay with 'sae-mixed'

Signed-off-by: Paul White <paul@shasta.cloud>
2024-11-13 16:59:22 +01:00
Paul White
44da3d651e Add config for vendor-class and request-options
When using dynamic (dhcp) addressing for IPv4, allow the vendor-class
and list of requested options to be configured, along with specific
defaults:
    vendor-class default is "OpenLAN"
    requested options default is [ 43, 60, 224 ]

These defaults enable support for cloud discovery FQDN (224) and the
DHCP-VSI feature (43, 60)

Fixes: WIFI-14271
Signed-off-by: Paul White <paul@shasta.cloud>
2024-11-11 07:50:06 +01:00
John Crispin
a21635b230 always request option 43 and 224 when doing DHCP
Signed-off-by: John Crispin <john@phrozen.org>
2024-11-06 11:51:02 +01:00
John Crispin
a0f26ac881 disable OKC when MPSK is enabled
Signed-off-by: John Crispin <john@phrozen.org>
2024-10-01 15:49:57 +02:00
John Crispin
684a1aab59 firewall: upon up NAT'ed port 53 for ipv6
Signed-off-by: John Crispin <john@phrozen.org>
2024-09-23 14:50:24 +02:00
John Crispin
79f8158096 wrap up psk2-radius / enhanced MPSK
Signed-off-by: John Crispin <john@phrozen.org>
2024-09-09 15:02:36 +02:00
Jonas Gorski
06745bcc42 handle multi-band phys for encryption check
Do not validate encryption against bands supported by the phy, but
against the band in use by getting the cross-section of ssid bands and
phy bands.

Fixes no default wireless configuration being generated if the phy is
both 5G and 6G capable, as all 6G encryption constraints are applied
even if the radio isn't configured for the 6G band.

Signed-off-by: Jonas Gorski <jonas.gorski@bisdn.de>
2024-09-02 15:55:00 +02:00
Jonas Gorski
c113cac7ba fix 80211w value for "none" encryption
We treated ssid.encryption.proto = "none" in validate_encryption() as no
encryption, we should do the same in match_ieee80211w().

Signed-off-by: Jonas Gorski <jonas.gorski@bisdn.de>
2024-09-02 15:54:14 +02:00
John Crispin
39aed21ed9 captive: allow loading the web-root from an external http server
Signed-off-by: John Crispin <john@phrozen.org>
2024-08-05 10:29:31 +02:00
John Crispin
37e38951a5 add multi-psk2-radius
Signed-off-by: John Crispin <john@phrozen.org>
2024-08-05 10:29:31 +02:00
John Crispin
bf512cd20d fix wifi assoc with main PSK in MPSK scenarios
Signed-off-by: John Crispin <john@phrozen.org>
2024-07-24 06:49:13 +02:00
John Crispin
f4924dcb46 roaming: add support for 256 bit AES keys
Signed-off-by: John Crispin <john@phrozen.org>
2024-07-24 06:21:43 +02:00
Venkat Chimata
2b144865e3 Fixing issues with section names in network config
In ethernet.uc, the section names are the same as that of interface names with . replaced by _
However name and ifname should still be the name with the . (dot). Fixed it.
Interface with _ in the name does n't exist

In ieee8021x.uc , auth and aut_vlan should be updated on the already created section in the network
and not on a new section. Otherwise a redundant device section would be created which is not correct.

Signed-off-by: Venkat Chimata <venkata@shasta.cloud>
2024-07-12 11:42:13 +02:00
joydeepbenison
409e444044 Fix strict-forwarding for Yuncore_fap655
Fixes WIFI-13641 : strict-forwarding for yuncore_fap655 and
other similar devices where the wan_port is on the switch.
Update the correct wan_port in /etc/config/event as part of the
configuration update.

Signed-off-by: joydeepbenison <joydeep.ghosh@benisontech.com>
2024-05-27 11:56:03 +02:00
John Crispin
79e1a9d873 explicitly set owe_transition_ssid in OWE transition mode
Signed-off-by: John Crispin <john@phrozen.org>
2024-05-14 10:15:30 +02:00
John Crispin
73c3d5d04e fix roaming auto mode
Signed-off-by: John Crispin <john@phrozen.org>
2024-05-09 10:02:42 +02:00
John Crispin
bda8143f9e captive: /tmp/ucentral/ was not being created correctly
Signed-off-by: John Crispin <john@phrozen.org>
2024-04-30 11:32:53 +02:00
Arif Alam
e3d9064378 captive: fix custom webroot config
Fixes WIFI-13441

Signed-off-by: Arif Alam <arif.alam@netexperience.com>
2024-02-28 07:34:22 +01:00
John Crispin
fda6ded45a fix tracking of upstream swconfig vlans
Signed-off-by: John Crispin <john@phrozen.org>
2024-02-08 05:49:25 +01:00
John Crispin
3093a565c4 track upstream vlans created by swconfig
Signed-off-by: John Crispin <john@phrozen.org>
2024-01-19 08:44:03 +01:00
Paul White
605ed2fcef bridge-vlan: add wan port only behind swconfig
Configure only the switch port for the WAN port instead of all Ethernet
ports.  When adding a dynamic VLAN, it should be added to the WAN port
as tagged only, and not the LAN ports.

When LAN ports were included in the interface config, it resulted in
their switch ports also being added to event.swconfig.ports as well as
duplicating the CPU port for each LAN port.   This also caused the
swconfig command to fail.

Config before the fix:
    config config 'config'
        list wan_port 'eth0.1'
        option swconfig 'switch1'
        list swconfig_ports '5t'
        list swconfig_ports '6t'
        list swconfig_ports '2t'
        list swconfig_ports '6t'
        list swconfig_ports '3t'
        list swconfig_ports '6t'
        list swconfig_ports '4t'
        list swconfig_ports '6t'

Config after the fix:
    config config 'config'
        list wan_port 'eth0.1'
        option swconfig 'switch1'
        list swconfig_ports '5t'
        list swconfig_ports '6t'

Signed-off-by: Paul White <paul@shasta.cloud>
2024-01-19 08:41:51 +01:00
John Crispin
ecc742a373 allow sending multiple DNS servers to dhcp clients
Signed-off-by: John Crispin <john@phrozen.org>
2024-01-12 10:03:53 +01:00
John Crispin
70bd716d4d move switch-vlan generation to brige-vlan
Signed-off-by: John Crispin <john@phrozen.org>
2024-01-12 10:03:53 +01:00
John Crispin
ab52fb543a fix udevstats config on swconfig devices
Signed-off-by: John Crispin <john@phrozen.org>
2023-12-14 16:13:05 +01:00
John Crispin
9338ea9cef bridge-vlan: track wan ports behind swconfig
Signed-off-by: John Crispin <john@phrozen.org>
2023-12-12 15:22:58 +01:00
John Crispin
75222fea70 udevstats: fix UCI generation for swconfig ports
Signed-off-by: John Crispin <john@phrozen.org>
2023-12-01 09:39:37 +01:00
John Crispin
f8608f6b21 enable bridge port isolation for wifi devices
Signed-off-by: John Crispin <john@phrozen.org>
2023-11-22 10:50:21 +01:00
John Crispin
29d6715225 make it possible to set vlan_awareness for STA interfaces
Signed-off-by: John Crispin <john@phrozen.org>
2023-11-15 11:17:55 +01:00
John Crispin
b6da9151ab make interface.isolate-hosts imply bridge port and ap isolation
Signed-off-by: John Crispin <john@phrozen.org>
2023-11-14 12:25:32 +01:00
John Crispin
7615f04015 allow preventing downstream interfaces from reaching rfc1918 subnets
Signed-off-by: John Crispin <john@phrozen.org>
2023-11-07 14:00:29 +01:00
John Crispin
eff094d067 ipv4/dhcp - allow setting a DNS server that clients shall use
Signed-off-by: John Crispin <john@phrozen.org>
2023-11-07 10:26:24 +01:00
John Crispin
9d2312a510 ieee8021x: rework render code
Signed-off-by: John Crispin <john@phrozen.org>
2023-11-03 08:44:53 +01:00
John Crispin
a473a2d454 fix CS1/UP1 WMM mapping
Signed-off-by: John Crispin <john@phrozen.org>
2023-10-23 10:07:10 +02:00
John Crispin
0aaefffac4 fix generation of udevstats config
Signed-off-by: John Crispin <john@phrozen.org>
2023-10-04 12:20:31 +02:00
John Crispin
19c5923382 enable dynamic-auth on psk* networks
Signed-off-by: John Crispin <john@phrozen.org>
2023-10-02 15:02:19 +02:00
John Crispin
70be51edd4 add admin-ui support
Signed-off-by: John Crispin <john@phrozen.org>
2023-09-28 14:52:40 +02:00
John Crispin
e9529eab9c allow AAA mac-filtering on PSK* APs
Signed-off-by: John Crispin <john@phrozen.org>
2023-09-19 10:01:15 +02:00
John Crispin
a4c8a1368a increase reassociation_deadline to 3s when using multi-psk
Signed-off-by: John Crispin <john@phrozen.org>
2023-09-06 16:10:45 +02:00