NOTE: a reboot is required to switch between access point and client modes.
List wireless access pints:
# iwlist scan
Write a wpa_supplicant.conf
configuration file to the FAT partition:
# rw
$ wpa_passphrase <ssid> [passphrase] > /opt/redpitaya/wpa_supplicant.conf
Restart wpa supplicant:
# systemctl restart [email protected]
Write a hostapd.conf
configuration file to the FAT partition,
and remove the wpa_supplicant.conf
client configuration file if exists:
# rw
$ nano /opt/redpitaya/hostapd.conf
$ rm /opt/redpitaya/wpa_supplicant.conf
Restart access point service:
# systemctl restart [email protected]
The current network configuration is using systemd-networkd
as the base.
Almost all network configuration details are done by the bash script network.sh
during the creation of the Debian/Ubuntu SD card image. The script installs networking
related packages and copies network configuration files from the Git repository.
The decision to focus on systemd-networkd
is arbitrary, while at the same time
focusing at a single approach centered around systemd
should minimize the efforts needed to maintain it.
Most of the WiFi configuration complexity comes from two sources:
- mixing WiFi drivers based on new mac80211 API, and the old deprecated wext API, this also requires some duplication of user space tools
- support for switching between WiFi access point and client mode
systemd
provides [predictable network interface names] using UDEV
rules.
In our case the kernel names the USB WiFi adapter wlan0
, then UDEV
rule /lib/udev/rules.d/73-special-net-names.rules
renames it into wlxMAC
using the following rule:
# Use MAC based names for network interfaces which are directly or indirectly
# on USB and have an universally administered (stable) MAC address (second bit
# is 0).
ACTION=="add", SUBSYSTEM=="net", SUBSYSTEMS=="usb", NAME=="", ATTR{address}=="?[014589cd]:*", IMPORT{builtin}="net_id", NAME="$env{ID_NET_NAME_MAC}"
For a simple generic WiFi configuration it is preferred to have the same
interface name regardless of the used adapter. This is achieved by overriding
UDEV
rules with a modified rule file. The overriding is done by placing the
modified rule file into directory /etc/udev/rules.d/73-special-net-names.rules
.
Since the remaining rules in the file are not relevant on Red Pitaya, it is also
possible to deactivate the rule by creating a override file which links to /dev/null
.
ln -s /dev/null /etc/udev/rules.d/73-special-net-names.rules
For user space tools to be able to distinguish between adapters using old and new drivers,
adapeter interfaces using the rtl8192cu
are renamed into wlan0wext
while adapter
interfaces using other drivers keep the default name wlan0
. This is achieved using
systemd.link file
/etc/systemd/network/10-wireless.link.
The wired interface eth0
configuration file /etc/systemd/network/wired.network
configures it to use DHCP.
In previous releases, where a different DHCP client was used,
it was possible to define a fixed lease, which would provide a fallback address
if DHCP fails. Using the systemd
integrated DHCP client this is not possible,
instead a fixed address can be set, or Link Local addressing zeroconf can be
used (described later).
A static IP address can be chosen by modifying the configuration file. It is also possible to have both a DHCP provided and a static address at the same time, but this can not appropriate to be set as the release default since it can cause IP address collisions. A fixed IP address can be configured by adding the next lines to systemd.network files.
[Network]
Address=192.168.0.15/24
Gateway=192.168.0.1
DNS=8.8.8.8 8.8.4.4
The wireless interface wlan0
configuration file is /etc/systemd/network/wireless.network
.
To support two modes this file must be linked to either the client mode configuration
/etc/systemd/network/wireless.network.client
or the access point configuration
/etc/systemd/network/wireless.network.ap
.
Switching between the two option is implemented
by /etc/systemd/system/wireless-mode-ap.service
and /etc/systemd/system/wireless-mode-client.service
which must be run early at boot before most other network related services are run.
If no wireless configuration file is available, then a third service
/etc/systemd/system/[email protected]
will link wirless.network
to client mode, and it will power up the adapter if so iwlist
will work.
The choice of the interface is driven by the availability of access point
/opt/redpitaya/hostapd.conf
and client /opt/redpitaya/wpa_supplicant.conf
configuration files. If wpa_supplicant.conf
is present, client mode configuration
will be attempted, regardless of the presence of hostapd.conf
. If only hostapd.conf
is present access point configuration will be attempted. If no configuration
file is present, WiFi will not be configured.
file | comment |
---|---|
wpa_supplicant.conf |
client configuration |
hostapd.conf |
access point configuration |
Wireless networks almost universally use some king of encryption/authentication
scheme for security. This is handled by the tool wpa_supplicant
.
The default network configuration option on Debian/Ubuntu
is NetworkManager. Sometimes
it conflicts with the default systemd-networkd
install, this seems to be one
of those cases. On Debian/Ubuntu
a device specific [email protected]
service is missing, so we made a copy [email protected]
in our Git repository.
By default the service is installed as a dependency for multi-user.target
which means it would delay multi-user.target
if it could not start properly,
for example due to the USB WiFi adapter not being plugged in. At the same time
the service was not automatically started after the adapter was plugged into
Red Pitaya. The next change fixes both.
[Install]
-Alias=multi-user.target.wants/wpa_supplicant@%i.service
+WantedBy=sys-subsystem-net-devices-%i.device
Since WiFi drivers using two different APIs are allowed, and each API requires
a slightly different wpa_supplicant
configuration, there are also two different services:
[email protected]
triggered by the presence of network interface wlan0
and
[email protected]
triggered by the presence of network interface wlan0wext
.
The encryption/authentication configuration file is linked to the FAT partition
for easier user access. So it is enough to provide a proper wpa_supplicant.conf
file on the FAT partition to enable wireless client mode.
ln -s /opt/redpitaya/wpa_supplicant.conf /etc/wpa_supplicant/wpa_supplicant.conf
This configuration file can be created using the wpa_passphrase
tool can be used:
$ wpa_passphrase <ssid> [passphrase] > /opt/redpitaya/wpa_supplicant.conf
WiFi access point functionality is provided by the hostapd
application.
Since the upstream version does not support the wireless extensions
API, the application is not
installed as a Debian package, and is instead downloaded, patched, recompiled and installed.
The [email protected]
is handling the start of the daemon. Hotplugging is achieved the same way as with
[email protected]
.
To enable access point mode a configuration file hostapd.conf
must be placed on the FAT partition on the SD card, and the client mode configuration file wpa_supplicant.conf
must be removed. Inside a shell on Red Pitaya this file is visible as /opt/redpitaya/hostapd.conf
.
The next example hostapd.conf
file is for the rtl871xdrv
driver:
interface=wlan0wext
ssid=<ssid>
driver=rtl871xdrv
hw_mode=g
channel=6
macaddr_acl=0
auth_algs=1
ignore_broadcast_ssid=0
wpa=2
wpa_passphrase=<passphrase>
wpa_key_mgmt=WPA-PSK
wpa_pairwise=TKIP
rsn_pairwise=CCMP
This file must be edited to set the chosen <ssid>
and <passphrase>
.
Other settings are for the currently most secure personal encryption.
If the configuration file is written for a device supported by a nl80211
driver,
then the driver line should be driver=nl80211
instead of driver=rtl871xdrv
.
The interface line must also be changed from interface=wlan0wext
to interface=wlan0
.
interface=wlan0
ssid=<ssid>
driver=nl80211
hw_mode=g
channel=6
macaddr_acl=0
auth_algs=1
ignore_broadcast_ssid=0
wpa=2
wpa_passphrase=<passphrase>
wpa_key_mgmt=WPA-PSK
wpa_pairwise=TKIP
rsn_pairwise=CCMP
In access point mode Red Pitaya behaves as a wireless router, if the wired interface is connected to the local network.
In the wired network configuration file /etc/systemd/network/wired.network
there are two lines to enable IP forwarding and masquerading.
IPForward=yes
IPMasquerade=yes
An iptables configuration /etc/iptables/iptables.rules
is enbled by the iptables service /etc/systemd/system/iptables.service
NOTE: this functionality combined with default passwords can be a serious security issue. And since it is not needed to provide advertized functionality, we might remove it in the future.
Our main target was a low cost USB adapter which also supports access point mode. The Edimax EW-7811Un adapter is also commonly used on Raspberry PI.
$ lsusb
ID 7392:7811 Edimax Technology Co., Ltd EW-7811Un 802.11n Wireless Adapter [Realtek RTL8188CUS]
The kernel upstream driver for this chip is now working well, so a working driver was copied from the Raspberry PI repository and applied as a patch.
Other WiFi USB devices might also be supported by upstream kernel drivers, but there is no comprehensive list for now.
To enable the systemd
integrated resolver, a symlink for /etc/resolv.conf
must be created.
ln -sf /run/systemd/resolve/resolv.conf /etc/resolv.conf
It is also possible to add default DNS servers by adding them to *.network
files.
nameserver=8.8.8.8
nameserver=8.8.4.4
Instead of using the common ntpd
the lightweight systemd-timesyncd
SNTP client is used.
Since by default NTP servers are provided by DHCP, no additional configuration changes to
timesyncd.conf
are needed.
To observe the status of time synchronization do:
$ timedatectl status
To enable the service do:
# timedatectl set-ntp true
The Open SSH server is installed and access to the root user is enabled.
At the end of the SD card Debian/Ubuntu image creation encryption certificates are removed.
They are again created on the first boot by /etc/systemd/system/ssh-reconfigure.service
.
Due to this the first boot takes a bit longer.
This way the SSH encryption certificates are unique on each board.
systemd-networkd
can provide interfaces with link-local addresses, if this is
enabled inside systemd.network
files with the line LinkLocalAddressing=yes
.
All interfaces have this setting enabled, this way each active interface will
acquire an address in the reserved 169.254.0.0/16
address block.
If the computer used to access the device supports zeroconf (Avahi/Bobjour) name resolving is also available.
Since there can be multiple devices on a single network they must be distinguished.
The last three segments of the Ethernet MAC number without semicolons
(as printed on the Ethernet connector on each device) is used
to generate the hostname, which is then used to generate a link name.
For example if the MAC address is 00:26:32:f0:f1:f2
then the shortened string shortMAC
is f0f1f2
.
Hostname generation is done by /etc/systemd/system/hostname-mac.service which must run early during the boot process.
Each device can now be accessed using the URL:
http://rp-<shortMAC>.local
Similarly to get SSH access use:
ssh root@rp-<shortMAC>.local
This service is a good alternative for our Discovery service provided on redpitaya.com servers.
Avahi daemon is used to advertise specific services. Three configuration files are provided:
- HTTP /etc/avahi/services/bazaar.service
- SSH /etc/avahi/services/ssh.service
- SCPI /etc/avahi/services/scpi.service
NOTE: This services were enabled just recently, so full extent of their usefulness is still unknown.
Services handling the described configuration are enabled with:
# enable systemd network related services
systemctl enable systemd-networkd
systemctl enable systemd-resolved
systemctl enable systemd-timesyncd
systemctl enable [email protected]
systemctl enable [email protected]
systemctl enable [email protected]
systemctl enable [email protected]
systemctl enable wireless-mode-client.service
systemctl enable wireless-mode-ap.service
systemctl enable iptables.service
#systemctl enable [email protected]
#systemctl enable [email protected]
#systemctl enable [email protected]
#systemctl enable [email protected]
systemctl enable hostname-mac.service
systemctl enable avahi-daemon.service
# enable service for creating SSH keys on first boot
systemctl enable ssh-reconfigure