PKCS#12 証明書から認証局証明書 (cacert.pm)、クライアント証明書 (cert.pem)、プライベートキー (key.pem)を取り出す。PKCS#12 証明書のパスワードが必要。
$ openssl pkcs12 -in example.p12 -out cacert.pem -cacerts -nokeys Enter Import Password: MAC verified OK $ openssl pkcs12 -in example.p12 -out cert.pem -clcerts -nokeys Enter Import Password: MAC verified OK $ openssl pkcs12 -in example.p12 -out key.pem -nocerts Enter Import Password: MAC verified OK Enter PEM pass phrase: Verifying - Enter PEM pass phrase:
/etc/wpa_supplicant.confを作成。
# cat /etc/wpa_supplicant.conf
network={
ssid="XXX"
scan_ssid=1
key_mgmt=WPA-EAP
pairwise=CCMP TKIP
group=CCMP TKIP
eap=TLS
identity="XXXXXXXXXX"
ca_cert="/XXXXXXX/cacert.pem"
client_cert="/XXXXXXX/cert.pem"
private_key="/XXXXXXX/key.pem"
private_key_passwd="XXXXXXXXXXXXXXXXXXX"
}
wpa_supplicant を起動して、接続状態の確認とIPアドレスの取得。
# wpa_supplicant -B -D wext -i wlan0 -c /etc/wpa_supplicant.conf
# iwconfig
lo no wireless extensions.
wlan0 IEEE 802.11bg ESSID:"XXX"
Mode:Managed Frequency:2.437 GHz Access Point: XXXXXXXXXXXXXXXXX
Bit Rate=54 Mb/s Tx-Power=20 dBm
Retry long limit:7 RTS thr:off Fragment thr:off
Encryption key:off
Power Management:off
Link Quality=39/70 Signal level=-71 dBm
Rx invalid nwid:0 Rx invalid crypt:0 Rx invalid frag:0
Tx excessive retries:0 Invalid misc:3 Missed beacon:0
eth0 no wireless extensions.
# dhclient wlan0
よさそうなら起動時に設定を反映させる。
# cat /etc/network/interfaces
# This file describes the network interfaces available on your system
# and how to activate them. For more information, see interfaces(5).
# The loopback network interface
auto lo
iface lo inet loopback
# The primary network interface
allow-hotplug eth0
#iface eth0 inet dhcp
iface eth0 inet static
address 192.168.20.1
netmask 255.255.255.0
auto wlan0
iface wlan0 inet dhcp
pre-up wpa_supplicant -B -D wext -i wlan0 -c /etc/wpa_supplicant.conf
post-down killall -q wpa_supplicant