Posts tagged ‘wicd’

Eduroam at FSU Jena with wicd / eduroam an der FSU Jena mit wicd

These are instructions to get connected with the eduroam and 802.1X networks at Jena University in Germany.

Atm I do not have the time to translate, but I will publish an e-mail that i sent to the system administrator of the URZ. Unfortunately they do not consider wicd common enough to be mentioned in their online instructions. Apparently they consider them bloated as they are.

Anmerkungen zu den templates:
Die templates müssen nach /etc/wicd/encryption/templates/ kopiert werden.

Dann müssen noch die Profile aktiviert werden (als root in einem terminal):
echo eduroam >> /etc/wicd/encryption/templates/active
echo wireless_8021x >> /etc/wicd/encryption/templates/active

Der wicd daemon muss anschliessend neu gestartet werden (im
Zweifelsfall Computer neu starten).
Unter Archlinux als root im terminal:
/etc/rc.d/wicd restart

Die Logindaten nach diesem Schema im wicd client eintragen (Das Zertifikat ist optional):
ab12cde@uni-jena.de
Geheimes.Passwort
/pfad/zum/Sicherheitszertifikat.pem

Evtl. müssen noch die Dateirechte angepasst werden.
Dazu als root ausführen:
chown root:root /etc/wicd/encryption/templates/wireless_8021x
chown root:root /etc/wicd/encryption/templates/eduroam
chmod 644 /etc/wicd/encryption/templates/wireless_8021x
chmod 644 /etc/wicd/encryption/templates/eduroam

The following is the template for eduroam. For 802.1X you will have to replace “eduroam” with 802.1X everywhere in the template. When adding the template to the list of active templates, be aware that is is case sensitive. You should save this in a file called eduroam, the modified version for 802.1X as wireless_8021x.

name = eduroam
author = panuh
version = 1
require identity *Identit”at password *Passwort
—–
ctrl_interface=/var/run/wpa_supplicant
network={
ssid=”eduroam”
key_mgmt=WPA-EAP
pairwise=CCMP TKIP
group=CCMP TKIP
eap=TTLS
phase2=”auth=PAP”
ca_cert=”/home/arch/cacert.pem”
anonymous_identity=”anonymous@uni-jena.de”
identity=”$_IDENTITY”
password=”$_PASSWORD”
}