I'd like to achieve what the wpa_psk_file offers, but with the information fetched from a radius server:
a device with mac connects using a psk
openwrt sends a radius auth request containing mac and psk to the radius server
the radius server sends a reply
an Access-Accept reply would contain Tunnel-Type = VLAN and Tunnel-Private-Group-Id =
openwrt disconnects the device or puts it into the according VLAN
Any help would be much apreciated.
Background: Have one open ssid in a network that only allows access to a registration portal. Once a user registered themself information is provided to which ssid connect for network access using a provided personal pre-shared key.
This would allow e.g. guest networks for which each guest has its own PSK (without the configuration overhead for enterprise encryption). If the users account expires the associated devices cannot access the network anymore.
Update: Replacing the wireless.js script with the version from the former MR let me configure dpsk aka ppsk through luci. I ended up with these parameters in /etc/config/wireless:
Without luci being able to set these settings they could be edited directly in /etc/config/wireless. If I do not misread this: mode: ['ap', 'ap-wds'], encryption: ['psk', 'psk2', 'psk+psk2', 'psk-mixed'] ppsk should work for modes ap & ap-wds and with encryptions psk, psk2, psk+psk2, psk-mixed.
Even though the settings end up in my /var/run/hostapd-phy0.conf the SSID does not become active, yet. (I didn't re-install the full version of wpad after my upgrade, but that is needed to interpret the according hostapd.conf lines)
Update: This seems to work. I get radius-requests on my radius server and I guess I have to adapt it to answer with the required tunnel-password (which it doesn't at the moment). But my question can be considered solved I guess.