wpa_priv(8) - phpMan

Command: man perldoc info search(apropos)  


WPA_PRIV(8)                                                                           WPA_PRIV(8)



NAME
       wpa_priv - wpa_supplicant privilege separation helper

SYNOPSIS
       wpa_priv  [ -c ctrl path ]  [ -Bdd ]  [ -P pid file ]  [ driver:ifname [driver:ifname ...]
       ]

OVERVIEW
       wpa_priv is a privilege separation helper that minimizes the size of  wpa_supplicant  code
       that needs to be run with root privileges.

       If  enabled,  privileged operations are done in the wpa_priv process while leaving rest of
       the code (e.g., EAP authentication and WPA  handshakes)  to  operate  in  an  unprivileged
       process  (wpa_supplicant) that can be run as non-root user. Privilege separation restricts
       the effects of potential software errors by containing the majority  of  the  code  in  an
       unprivileged process to avoid the possibility of a full system compromise.

       wpa_priv  needs  to  be run with network admin privileges (usually, root user). It opens a
       UNIX domain socket for each interface that is included on  the  command  line;  any  other
       interface will be off limits for wpa_supplicant in this kind of configuration. After this,
       wpa_supplicant can be run as a non-root user (e.g., all standard users on a laptop or as a
       special  non-privileged user account created just for this purpose to limit access to user
       files even further).

EXAMPLE CONFIGURATION
       The following steps are an example of how to configure wpa_priv to allow users in the wpa-
       priv group to communicate with wpa_supplicant with privilege separation:

       Create  user group (e.g., wpapriv) and assign users that should be able to use wpa_suppli-
       cant into that group.

       Create /var/run/wpa_priv directory for UNIX domain sockets and control user access by set-
       ting it accessible only for the wpapriv group:


              mkdir /var/run/wpa_priv
              chown root:wpapriv /var/run/wpa_priv
              chmod 0750 /var/run/wpa_priv



       Start  wpa_priv  as  root  (e.g., from system startup scripts) with the enabled interfaces
       configured on the command line:


              wpa_priv -B -c /var/run/wpa_priv -P /var/run/wpa_priv.pid wext:wlan0



       Run wpa_supplicant as non-root with a user that is in the wpapriv group:


              wpa_supplicant -i ath0 -c wpa_supplicant.conf



COMMAND ARGUMENTS
       -c ctrl path
              Specify the path to wpa_priv control directory (Default: /var/run/wpa_priv/).

       -B     Run as a daemon in the background.

       -P file
              Set the location of the PID file.

       driver:ifname [driver:ifname ...]
              The <driver> string dictates which of the supported wpa_supplicant driver  backends
              is  to  be  used.  To  get a list of supported driver types see wpa_supplicant help
              (e.g, wpa_supplicant -h). The driver backend supported  by  most  good  drivers  is
              wext.

              The  <ifname> string specifies which network interface is to be managed by wpa_sup-
              plicant (e.g., wlan0 or ath0).

              wpa_priv does not use the network interface before wpa_supplicant is started, so it
              is  fine  to include network interfaces that are not available at the time wpa_priv
              is started. wpa_priv can control multiple interfaces with one process,  but  it  is
              also possible to run multiple wpa_priv processes at the same time, if desired.

SEE ALSO
       wpa_supplicant(8)

LEGAL
       wpa_supplicant  is copyright (c) 2003-2016, Jouni Malinen <j AT w1.fi> and contributors.  All
       Rights Reserved.

       This program is licensed  under  the  BSD  license  (the  one  with  advertisement  clause
       removed).



                                          16 March 2021                               WPA_PRIV(8)

Generated by $Id: phpMan.php,v 4.55 2007/09/05 04:42:51 chedong Exp $ Author: Che Dong
On Apache
Under GNU General Public License
2024-04-20 05:45 @3.129.13.201 CrawledBy Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; +claudebot@anthropic.com)
Valid XHTML 1.0!Valid CSS!