hostapd: Settings for DAE/CoA server
authorFelix Fietkau <nbd@openwrt.org>
Tue, 6 Aug 2013 18:55:30 +0000 (18:55 +0000)
committerFelix Fietkau <nbd@openwrt.org>
Tue, 6 Aug 2013 18:55:30 +0000 (18:55 +0000)
commit388917caf95296a1e2a2a0dedeb8c83ed231326c
tree3b84f740e50e8dc6c38b1c11300e99fcafa2ff87
parent485af0c163b39d6b35484528f39a1fcae669d44b
hostapd: Settings for DAE/CoA server

hostapd supports "Dynamic Authorization Extensions", making it possible
to forcibly disconnect a user by sending it a RADIUS "Disconnect-Request"
packet.

I've added three new variables to enable setting of the
"radius_das_client" and "radius_das_port" variables in the hostapd
configuration, which enable these extensions.

* dae_client - IP of the client that can send disconnect requests
* dae_secret - shared secret for DAE packets

These are combined into the "radius_das_client" option in hostapd.conf
To enable the server, both dae_client and dae_secret must be set.

* dae_port - optional, default value is 3799 as specified in RFC 5176

Signed-off-by: Martijn van de Streek <martijn@vandestreek.net>
git-svn-id: svn://svn.openwrt.org/openwrt/trunk@37734 3c298f89-4303-0410-b956-a3cf2f4a3e73
package/network/services/hostapd/files/hostapd.sh