Wi-Fi: Difference between revisions

From Alpine Linux
m (updated package name)
(+ additional line "scan_ssid=1" in the file wpa_supplicant.conf)
(40 intermediate revisions by 14 users not shown)
Line 1: Line 1:
This document describes how to set up a wireless network connection with WPA encryption.
This document describes how to set up a wireless network connection with WPA encryption.


First make sure your wireless drivers are loded properly. (if you are using a Broadcom chipset, see note at the end of this post.)
== Install necessary drivers and software  ==


Install wireless-tools and wpa_supplicant.
First make sure your wireless drivers are loaded properly. (if you are using a '''Broadcom chipset''', see the [[#Broadcom_Wi-Fi_Chipset_Users|section at the bottom of this post]].)
 
Install {{Pkg|wireless-tools}} and {{Pkg|wpa_supplicant}}.
{{Cmd|apk add wireless-tools wpa_supplicant}}
{{Cmd|apk add wireless-tools wpa_supplicant}}


Bring the link up so we can look for wireless networks.
== Manual Configuration  ==
 
List your available network interfaces. If you don't see any wireless interfaces (e.g. {{Path|wlan0}}), you probably need to load and/or install extra drivers/firmware.
{{Cmd|ip link}}
 
Bring the desired interface up.
{{Cmd|ip link set wlan0 up}}
{{Cmd|ip link set wlan0 up}}


Find a network to connect to. Look for the ESSID. In this example we will use the ESSID "MyNet"
{{Note|If this errors with <code>ioctl 0x8914 failed: No error information</code>, that's <code>busybox ip</code>'s way of saying your wireless radio is rfkill'd. See [https://wiki.archlinux.org/index.php/Wireless_network_configuration#Rfkill_caveat here] for information on how to unblock your wireless radio; the base installation should have <code>busybox rfkill</code> available.}}
 
 
Use the interface to scan for wireless access points. Make sure the ESSID you want to connect to appears here.
{{Cmd|iwlist wlan0 scanning}}
{{Cmd|iwlist wlan0 scanning}}


Lets set the ESSID.
Associate the interface with desired ESSID.
{{Cmd|iwconfig wlan0 essid MyNet}}
{{Cmd|iwconfig wlan0 essid ExampleWifi}}
 
Sanity check: the interface should be configured with {{Path|ESSID:"ExampleWifi"}}.
{{Cmd|iwconfig wlan0}}
 
Create a wpa_supplicant configuration stanza for the wireless access point.
{{Cmd|wpa_passphrase 'ExampleWifi' 'ExampleWifiPassword' > /etc/wpa_supplicant/wpa_supplicant.conf}}
''(Access point not broadcasting its SSID requires additional line <code>scan_ssid=1</code> in the file <code>wpa_supplicant.conf</code>)''
 
 
Start wpa_supplicant in the foreground to make sure the connection succeeds.
{{Cmd|wpa_supplicant -i wlan0 -c /etc/wpa_supplicant/wpa_supplicant.conf}}
 
If all is well, run it as a daemon in the background by setting the {{Path|-B}} option.
{{Cmd|wpa_supplicant -B -i wlan0 -c /etc/wpa_supplicant/wpa_supplicant.conf}}
 
Configure the interface with an IP address.
{{Cmd|udhcpc -i wlan0}}
 
Sanity check: the interface should have an {{Path|inet}} address.
{{Cmd|ip addr show wlan0}}
 
== Automatic Configuration on System Boot  ==
 
Add a stanza for the desired interface (e.g. {{Path|wlan0}}) to {{Path|/etc/network/interfaces}}:
 
<pre>
auto wlan0
iface wlan0 inet dhcp
</pre>
 
Make sure {{Path|/etc/wpa_supplicant/wpa_supplicant.conf}} is the correct configuration for the wireless access point you want to connect to.
 
Bring the interface down.
 
{{Cmd|ifconfig wlan0 down}}
 
Manually start wpa_supplicant.
 
{{Cmd|/etc/init.d/wpa_supplicant start}}
 
If all is well (confirm with the sanity checks in [[#Manual_Configuration|Manual Configuration]]), configure wpa_supplicant to start automatically on boot.
 
{{Cmd|rc-update add wpa_supplicant boot}}
 
 
=== Launching udhcpc through wpa_cli actions ===
 
With the above configuration, udhcpc will only run once at boot.
If the Wifi isn't available then, or the network changes in between, it needs to be notified.
This is done through the wpa_cli action script in /etc/wpa_supplicant/wpa_cli.sh
 
{{Cmd|rc-update add wpa_cli boot}}
 
== Broadcom Wi-Fi Chipset Users  ==
 
The Broadcom chipset is quite popular among older computers. You will need to compile the firmware manually for this chipset as it is not included.
 
You can check if you have a Broadcom chipset by using dmesg:
 
{{Cmd|dmesg {{!}} grep Broadcom}}
 
First install the SDK an Git:
{{Cmd|apk add alpine-sdk git}}
 
Then git clone aports from git.alpinelinux.org.
 
 
{{Cmd|git clone git://git.alpinelinux.org/aports}}
 
Change your directory to '''aports/non-free/b43-firmware''', then build it.
 
{{Tip|You can't be root and must be a user of the group abuild (use groupadd f.e. '''addgroup $(whoami) abuild''')}}
{{Tip|If this is your first time building a package you will need to generate a key for use in signing packages (use '''abuild-keygen -a -i''')}}
 
{{Cmd|abuild -r}}
 
Install the generated packge file (it will be in ~/packages/) - make sure to pass '''--allow-untrusted'''


We need to create a shared key for wpa_supplicant.
{{Cmd|apk add --allow-untrusted ~/packages/...pkg}}
{{Cmd|wpa_passphrase MyNet > wpa.conf}}
It will wait for the password from stdin. Enter the password and enter. Now you will have a wpa.conf file with the preshared key.


start wpa_supplicant with the generated config
Now we need fwcutter, which is executed from the firmware package:
{{Cmd|wpa_supplicant -Dwext -iwlan0 -c ./wpa.conf}}


From another console, start dhcpcd
{{Cmd|apk add b43-fwcutter b43-firmware}}
{{Cmd|dhcpcd wlan0}}


You should get an IP address.
Now you need to use modprobe so the device will show up:


You then want to make the connection process automatic on boot-up.  Open /etc/network/interfaces and add the following stanza:
{{Cmd|modprobe b43}}
auto wlan0
iface wlan0 inet dhcp


You will also need to set wpa_supplicant to start automatically on boot.
To automate this on startup add it to /etc/modules:
rc-update add wpa_supplicant default


Next, create /etc/wpa_supplicant (permissions of 755 w/ root:root are fine), and move wpa.conf into that folder.  Then rename wpa.conf to wpa_supplicant.conf.
{{Cmd|echo b43 >> /etc/modules}}


Reboot and check that you are associated with the access point:
Now continue with the normal instructions.
iwconfig wlan0
and check that you got a DHCP lease:
ifconfig wlan0 | grep addr


<b>NOTE FOR BROADCOM WIFI CHIPSET USERS:<br />
[[Category:Networking]]
You will need to compile the firmware manually for your chipset.  Git clone aports from git.alpinelinux.org, switch to the aports/non-free/b43-firmware folder, then run abuild -r.  Install the generated apk file.  Run fwcutter, and you should be good to go.

Revision as of 11:59, 9 September 2019

This document describes how to set up a wireless network connection with WPA encryption.

Install necessary drivers and software

First make sure your wireless drivers are loaded properly. (if you are using a Broadcom chipset, see the section at the bottom of this post.)

Install wireless-tools and wpa_supplicant.

apk add wireless-tools wpa_supplicant

Manual Configuration

List your available network interfaces. If you don't see any wireless interfaces (e.g. wlan0), you probably need to load and/or install extra drivers/firmware.

ip link

Bring the desired interface up.

ip link set wlan0 up

Note: If this errors with ioctl 0x8914 failed: No error information, that's busybox ip's way of saying your wireless radio is rfkill'd. See here for information on how to unblock your wireless radio; the base installation should have busybox rfkill available.


Use the interface to scan for wireless access points. Make sure the ESSID you want to connect to appears here.

iwlist wlan0 scanning

Associate the interface with desired ESSID.

iwconfig wlan0 essid ExampleWifi

Sanity check: the interface should be configured with ESSID:"ExampleWifi".

iwconfig wlan0

Create a wpa_supplicant configuration stanza for the wireless access point.

wpa_passphrase 'ExampleWifi' 'ExampleWifiPassword' > /etc/wpa_supplicant/wpa_supplicant.conf

(Access point not broadcasting its SSID requires additional line scan_ssid=1 in the file wpa_supplicant.conf)


Start wpa_supplicant in the foreground to make sure the connection succeeds.

wpa_supplicant -i wlan0 -c /etc/wpa_supplicant/wpa_supplicant.conf

If all is well, run it as a daemon in the background by setting the -B option.

wpa_supplicant -B -i wlan0 -c /etc/wpa_supplicant/wpa_supplicant.conf

Configure the interface with an IP address.

udhcpc -i wlan0

Sanity check: the interface should have an inet address.

ip addr show wlan0

Automatic Configuration on System Boot

Add a stanza for the desired interface (e.g. wlan0) to /etc/network/interfaces:

auto wlan0
iface wlan0 inet dhcp

Make sure /etc/wpa_supplicant/wpa_supplicant.conf is the correct configuration for the wireless access point you want to connect to.

Bring the interface down.

ifconfig wlan0 down

Manually start wpa_supplicant.

/etc/init.d/wpa_supplicant start

If all is well (confirm with the sanity checks in Manual Configuration), configure wpa_supplicant to start automatically on boot.

rc-update add wpa_supplicant boot


Launching udhcpc through wpa_cli actions

With the above configuration, udhcpc will only run once at boot. If the Wifi isn't available then, or the network changes in between, it needs to be notified. This is done through the wpa_cli action script in /etc/wpa_supplicant/wpa_cli.sh

rc-update add wpa_cli boot

Broadcom Wi-Fi Chipset Users

The Broadcom chipset is quite popular among older computers. You will need to compile the firmware manually for this chipset as it is not included.

You can check if you have a Broadcom chipset by using dmesg:

dmesg | grep Broadcom

First install the SDK an Git:

apk add alpine-sdk git

Then git clone aports from git.alpinelinux.org.


git clone git://git.alpinelinux.org/aports

Change your directory to aports/non-free/b43-firmware, then build it.

Tip: You can't be root and must be a user of the group abuild (use groupadd f.e. addgroup $(whoami) abuild)
Tip: If this is your first time building a package you will need to generate a key for use in signing packages (use abuild-keygen -a -i)

abuild -r

Install the generated packge file (it will be in ~/packages/) - make sure to pass --allow-untrusted

apk add --allow-untrusted ~/packages/...pkg

Now we need fwcutter, which is executed from the firmware package:

apk add b43-fwcutter b43-firmware

Now you need to use modprobe so the device will show up:

modprobe b43

To automate this on startup add it to /etc/modules:

echo b43 >> /etc/modules

Now continue with the normal instructions.