Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
wiki:setting_up_wifi [2011/10/13 09:27] – bmarkus | wiki:setting_up_wifi [2024/06/20 20:17] (current) – external edit 127.0.0.1 | ||
---|---|---|---|
Line 1: | Line 1: | ||
+ | ===== A No-nonsense, | ||
+ | All you need to connect to a WiFi hotspot is wpa_supplicant, | ||
+ | Just follow 3 easy steps: | ||
- | ====== Easy Way: wicd ====== | + | * If you have access to a wired connection on your TCL machine: |
+ | * Boot your TCL machine and establish a wired connection | ||
+ | * Download the wpa_supplicant extension (on x86_64 it's called wpa_supplicant-dbus) and all its dependencies: | ||
+ | * Load the wpa_supplicant extension and its dependencies: | ||
- | If you want to set up wifi with minimum of fuss, just install wicd package | + | * If you do NOT have access |
- | See http://wicd.sourceforge.net/ for detailed information about wicd. | + | * Using a different machine, establish an internet connection then manually download the wpa_supplicant extension |
+ | * Boot your TCL machine and manually copy the downloaded files to tce/optional/ | ||
+ | * Load the wpa_supplicant extension and its dependencies: | ||
- | After installing "wicd.tcz" execute the following command | + | Now you are ready to connect to any WiFi hotspot. You can do so manually or use a shell script |
- | < | + | |
- | sudo wicd-start | + | |
- | </code> | + | |
- | Then activate the GUI interface using the application menu. | + | |
- | If you have problems getting wicd to see your wifi card, you may have driver issues. Atheros users can see this [[Network Setup - Atheros Wireless Cards]], but note that tinycore 2.0 and later ships with ath5k and ath9k open source drivers that should handle most Atheros cards. | + | ==== NOTES ==== |
+ | * For each extension, download the .tcz file (which is the actual extension), .tcz.md5.txt file, and (if it exists for that extension) the .tcz.dep file. | ||
+ | * Tiny Core Linux mirrors are listed here: http:// | ||
+ | * Take a peek at wpa_supplicant.tcz.tree or wpa_supplicant-dbus.tcz.tree (e.g., ftp:// | ||
+ | * Despite its name, wpa_supplicant-dbus.tcz does not actually require dbus to be running in order to use wireless. | ||
+ | * These instructions assume you have a wireless card whose firmware is included in the linux kernel or modules (e.g., | ||
- | **TIP**: For a system that doesn' | + | **Note**: As of Tiny Core Linux 4.x you can probably just use the wpa_gui extension from the appbrowser |
- | **WICD is not available for TC 4 !!!** | + | You should configure your network and choose File -> Save Configuration. If you want to automatically restart the WPA wireless connection after reboot, put "/ |
- | + | ||
- | ====== Another easy way: wpa_gui | + | |
Another way to set up a wireless connection is to use wpa_supplicant with it's associated GUI interface. wpa_supplicant is the IEEE 802.1X/WPA component that is used in the client stations. It implements key negotiation with a WPA Authenticator and it controls the roaming and IEEE 802.11 authentication/ | Another way to set up a wireless connection is to use wpa_supplicant with it's associated GUI interface. wpa_supplicant is the IEEE 802.1X/WPA component that is used in the client stations. It implements key negotiation with a WPA Authenticator and it controls the roaming and IEEE 802.11 authentication/ | ||
- | wpa_supplicant is designed to be a "daemon" | + | wpa_supplicant is designed to be a //daemon// program that runs in the background and acts as the backend component controlling the wireless connection. wpa_supplicant supports a text-based frontend (wpa_cli) and a GUI (wpa_gui). See http:// |
- | See http:// | + | |
Install wpa_supplicant and wpa_gui. Then configure wpa_supplicant for remote control by creating a configuration file (this has to be done only once): | Install wpa_supplicant and wpa_gui. Then configure wpa_supplicant for remote control by creating a configuration file (this has to be done only once): | ||
- | Create a configuration file "/ | + | Create a configuration file **/ |
- | < | + | < |
- | ctrl_interface=/ | + | |
ctrl_interface_group=staff | ctrl_interface_group=staff | ||
- | update_config=1 | + | update_config=1</ |
- | </ | + | |
- | After creating the configuration file start the wpa_supplicant daemon using the following command | + | It's recommended |
- | and to have wpa_supplicant start every boot, add this to /opt/ | + | |
- | < | + | |
- | wpa_supplicant -Dwext -iwlan0 -c/ | + | |
- | </ | + | |
- | Afterwards, all you need to do to connect to various networks is to run wpa_gui from the menu. | + | After creating the configuration file start the wpa_supplicant daemon using the following command and to have wpa_supplicant start every boot, add this to / |
- | ====== More Advanced Setup: using wireless tools ====== | + | < |
- | Prerequisites: | + | Replace wlan0 with the name of your wireless |
- | 1. You have a working tinycore system | + | |
- | 2. Your wireless | + | |
- | 3. You want to connect to an open access point, WEP or WPA-PSK secured AP (you do care about security don't you?) | + | |
- | ===== Initial Preparation ===== | + | Afterwards, all you need to do to connect to various networks is to run wpa_gui from the menu. |
- | 1. boot tinycore and install the needed | + | ===== More Advanced Setup : Using wireless tools ===== |
- | * wireless_tools.tcz -- gives you iwconfig and other tools | + | |
- | * wireless-`uname -r`-tinycore.tcz -- in-kernel wifi drivers | + | |
- | * wpa-supplicant.tcz (which depends on openssl-0.9.8.tcz) -- wpa_supplicant tool for negotiating secured access points | + | |
- | If you will be installing to a system that depends on wifi access you may find it easier to pre-download these files and copy them to your tinycore tce directory so that they are installed at boot time (or use tce-load to install them after boot). | + | |
- | 2. Check whether you can see your wireless hardware. in the console run: | + | === Prerequisites === |
+ | - You have a working tinycore system with some support for persistence (ie: A tce directory and either a backup/ | ||
+ | - Your wireless hardware | ||
+ | - You want to connect to an open access point, WEP or WPA-PSK secured AP (you do care about security don't you?) | ||
- | ^iwconfig^ | + | === Initial Preparation === |
- | you should see a list of interfaces with some status info. your wireless | + | 1. Boot tinycore and install the needed |
+ | | wireless_tools.tcz | gives you iwconfig and other tools | | ||
+ | | wireless-`uname -r`-tinycore.tcz | in-kernel wifi drivers | | ||
+ | | wpa-supplicant.tcz | wpa_supplicant tool for negotiating secured access points | | ||
- | If you don't see a connection, | + | If you will be installing to a system that depends on wifi access |
- | |^modprobe -l | grep ath^| | + | |
- | you should | + | 2. Check whether |
- | verify they are loaded using: | + | You should see a list of interfaces with some status info. your wireless interface may show up as wlan0 (but maybe ath0 or eth0?). You need to remember the name of this interface as it will be used later |
- | |^lsmod | grep ath^| | + | |
- | you can use modprobe | + | If you don't see a connection, you may need to load or install |
+ | **modprobe -l < | ||
+ | you should see the ath9k.ko.gz and ath5k.ko.gz device driver files | ||
- | ===== Connecting to an open access point ===== | + | Verify they are loaded using: |
+ | **lsmod < | ||
- | 1. To connect to a particular access point, all you need to do is type in the console | + | You can use modprobe to temporarily load and unload drivers as needed. For instructions on setting up alternative Atheros drivers, see Network Setup - Atheros Wireless Cards |
- | ^iwconfig *interface* essid *network-id*^ | + | |
- | to search for access points, use the command | + | === Connecting to an open access point === |
- | ^iwlist scanning^ | + | - To connect to a particular access point, all you need to do is type in the console: **iwconfig *interface* essid *network-id* ** to search for access points, use the command: **iwlist scanning** to connect to the nearest access point, just use: **iwconfig *interface* essid any** |
- | + | | |
- | to connect to the nearest access point, just use: | + | |
- | ^iwconfig *interface* essid any^ | + | |
- | + | ||
- | 2. To finalize the connection (getting IP address etc), go to control panel, open the netcardconfig tool. switch eth0 to the name of your interface (e.g. wlan0). Change | + | |
- | + | ||
- | Alternately, | + | |
- | ^udhcpc -i *interface*^ | + | |
- | + | ||
- | 3. At this point you should have a working network connection. If it doesn' | + | |
- | + | ||
- | 4. If you don't want to have to run step 1 and 2 every time you boot, you can add the command to your / | + | |
- | + | ||
- | ===== Connecting to a WPA-PSK secured access point ===== | + | |
+ | === Connecting to a WPA-PSK secured access point === | ||
Before you start, you need to look up your access point id (ssid) and passphrase (a string). | Before you start, you need to look up your access point id (ssid) and passphrase (a string). | ||
- | + | * At the command line, run **< | |
- | 1. At the command line, run | + | * Now create a file in your favorite editor replacing the ssid and psk values below with result from step 1: **ctrl_interface=/ |
- | ^wpa_passphrase *essid* *passphrase*^ | + | < |
- | + | ||
- | For example: | + | |
- | ^ | + | |
- | ~$ wpa_passphrase mynetwork mypassphrase | + | |
network={ | network={ | ||
- | ssid="mynetwork" | + | |
- | # | + | proto=WPA |
- | psk=f242925f83787084d58101d5eb52485989e2a553983bfe6fc5b8d27fdfa063bd | + | key_mgmt=WPA-PSK |
- | } | + | pairwise=TKIP |
- | ^ | + | group=TKIP |
- | + | psk=f242925f83787084d58101d5eb52485989e2a553983bfe6fc5b8d27fdfa063bd | |
- | 2. Now create a file in your favorite editor replacing the ssid and psk values below with result from step 1: | + | }</code> |
- | + | ||
- | ^ | + | |
- | ctrl_interface=/ | + | |
- | + | ||
- | network={ | + | |
- | ssid=mynetwork | + | |
- | | + | |
- | key_mgmt=WPA-PSK | + | |
- | pairwise=TKIP | + | |
- | group=TKIP | + | |
- | psk=f242925f83787084d58101d5eb52485989e2a553983bfe6fc5b8d27fdfa063bd | + | |
- | } | + | |
- | ^ | + | |
- | + | ||
- | Note that this assumes a fairly conventional WPA-PSK setup. If you need to use other security (e.g. WEP) or are connecting to a more sophisticated network you may have to tweak this file. See the wpa_supplicant manual for more info. (What if you connect to more than one WPA-PSK network -- can add as many network sections to the conf file as needed) | + | |
- | + | ||
- | save it as /opt/ | + | |
- | + | ||
- | 3. to connect to the access point, run in the console: | + | |
- | ^wpa_supplicant -i*interface* -c/ | + | |
- | + | ||
- | (what diagnostics can be run here to verify the connection? iwconfig etc) | + | |
- | + | ||
- | 4. now to finalize the connection (getting IP address etc), go to control panel, open the netcardconfig tool. switch eth0 to the name of your interface (e.g. wlan0). Change "use DHCP Broadcast?" | + | |
- | + | ||
- | Alternately, | + | |
- | ^udhcpc -i *interface*^ | + | |
- | + | ||
- | 5. At this point you should have a working network connection. If it doesn' | + | |
- | + | ||
- | 6. If you don't want to have to run step 3 and 4 every time you boot, you can add the wpa_supplicant command in line 3 to your / | + | |
- | + | ||
- | ===== Simple scripts to auto connect to specific networks ===== | + | |
- | + | ||
- | ==== Connect to non-secured access point. ==== | + | |
- | + | ||
- | Script that displays local Access Points to connect to. Only works with unsecured APs. | + | |
- | + | ||
- | http:// | + | |
- | ==== Connect to either non-secure or WEP protected access point ==== | + | Note: This assumes a fairly conventional WPA-PSK setup. If you need to use other security (e.g. WEP) or are connecting to a more sophisticated network you may have to tweak this file. See the wpa_supplicant manual for more info. (What if you connect to more than one WPA-PSK network? You can add as many network sections to the conf file as needed.) |
+ | save it as / | ||
- | NOTE requires editing of shell script | + | * to connect to the access point, run in the console: **wpa_supplicant -i*interface* -c/ |
+ | * now to finalize the connection (getting IP address etc), go to control panel, open the netcardconfig tool. switch eth0 to the name of your interface (e.g. wlan0). Change //Use DHCP Broadcast?// | ||
- | NOTE to set your WEP key using a plain text string (i.e.: not HEX) then put an s: in front of the key. | + | Alternately, |
- | ^iwconfig wlan0 key s: | + | * At this point you should have a working network connection. If it doesn' |
+ | * If you don't want to have to run step 3 and 4 every time you boot, you can add the wpa_supplicant command in line 3 to your / | ||
- | < | + | === Simple scripts to auto connect to specific networks === |
+ | Connect to non-secured access point. (Script that displays local Access Points to connect to. Only works with unsecured APs.) | ||
+ | * [[http:// | ||
+ | < | ||
+ | #!/bin/sh | ||
- Example usage: | - Example usage: | ||
- | - | ||
Line 176: | Line 129: | ||
echo SID ${essid} | echo SID ${essid} | ||
if [[ -n " | if [[ -n " | ||
- | then | + | then |
echo WEPKEY $wepkey | echo WEPKEY $wepkey | ||
fi | fi | ||
Line 197: | Line 150: | ||
pkill udhcpc | pkill udhcpc | ||
udhcpc -H box -b -i ${wlan} | udhcpc -H box -b -i ${wlan} | ||
+ | </ | ||
- | |||
- | </ | ||