{"id":372,"date":"2025-12-14T11:22:50","date_gmt":"2025-12-14T03:22:50","guid":{"rendered":"https:\/\/www.garfield-blog.top\/?p=372"},"modified":"2025-12-14T11:22:50","modified_gmt":"2025-12-14T03:22:50","slug":"%e3%80%90%e6%ba%90%e7%a0%81%e8%a7%a3%e6%9e%90%e3%80%91hostapd1%e7%ae%80%e8%bf%b0","status":"publish","type":"post","link":"https:\/\/www.garfield-blog.top\/?p=372","title":{"rendered":"\u3010\u6e90\u7801\u89e3\u6790\u3011hostapd(1)\u7b80\u8ff0"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">hostapd\u662f\u4ec0\u4e48<\/h2>\n\n\n\n<p>\u8fd9\u91cc\u9644\u4e0a\u4e0d\u540c\u7684\u89e3\u8bfb<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><strong>hostapd<\/strong> (host access point daemon) is a user space daemon software enabling a network interface cardto act as an access point and authentication server. There are three implementations: Jouni Malinen&#8217;s hostapd, OpenBSD&#8217;s hostapd and Devicescape&#8217;s hostapd.<\/p>\n\n\n\n<p>Jouni Malinen&#8217;s hostapd is a user space daemon for access point and authentication servers. It can be used to create a wireless hotspot using a Linux computer.It implements IEEE 802.11access point management, IEEE 802.1X\/WPA\/WPA2\/EAP Authenticators, RADIUSclient, EAP server, and RADIUS authentication server. The current version supports Linux(Host AP, MadWifi,Prism54) and some of the drivers which use the kernel&#8217;s mac80211 subsystem), QNX, FreeBSD (net80211), and DragonFlyBSD.<\/p>\n<\/blockquote>\n\n\n\n<p>\u4e2d\u6587\u7ffb\u8bd1\uff1a<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><strong>hostapd<\/strong>\uff08\u4e3b\u673a\u63a5\u5165\u70b9\u5b88\u62a4\u7a0b\u5e8f\uff09\u662f\u4e00\u4e2a\u7528\u6237\u7a7a\u95f4\u5b88\u62a4\u7a0b\u5e8f\u8f6f\u4ef6\uff0c\u4f7f\u7f51\u7edc\u63a5\u53e3\u5361\u5145\u5f53\u63a5\u5165\u70b9\u548c\u8eab\u4efd\u9a8c\u8bc1\u670d\u52a1\u5668\u3002\u6709\u4e09\u79cd\u5b9e\u73b0\uff1aJouni Malinen\u7684hostapd\uff0c OpenBSD\u7684hostapd\u548cDevicescape\u7684hostapd<\/p>\n\n\n\n<p>Jouni Malinen\u7684hostapd\u662f\u7528\u4e8e\u63a5\u5165\u70b9\u548c\u8eab\u4efd\u9a8c\u8bc1\u670d\u52a1\u5668\u7684\u7528\u6237\u7a7a\u95f4\u5b88\u62a4\u8fdb\u7a0b\u3002\u5b83\u53ef\u4ee5\u7528\u4e8e\u4f7f\u7528Linux\u8ba1\u7b97\u673a\u521b\u5efa\u65e0\u7ebf\u70ed\u70b9\u3002\u5b83\u5b9e\u73b0\u4e86IEEE 802.11\u63a5\u5165\u70b9\u7ba1\u7406\u3001IEEE 802.1X\/WPA\/WPA2\/EAP\u8ba4\u8bc1\u5668\u3001RADIUSclient\u3001EAP\u670d\u52a1\u5668\u548cRADIUS\u8ba4\u8bc1\u670d\u52a1\u5668\u3002\u5f53\u524d\u7248\u672c\u652f\u6301Linux\uff08Host AP, MadWifi,Prism54\uff09\u548c\u4e00\u4e9b\u4f7f\u7528\u5185\u6838mac80211\u5b50\u7cfb\u7edf\u7684\u9a71\u52a8\u7a0b\u5e8f)\uff0cQNX, FreeBSD \uff08net80211\uff09\u548cDragonFlyBSD<\/p>\n<\/blockquote>\n\n\n\n<p><strong><code>hostapd<\/code>\u6e90\u7801<code>README<\/code><\/strong><\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Originally, hostapd was an optional user space component for Host AP driver. It adds more features to the basic IEEE 802.11 management included in the kernel driver: using external RADIUS authentication<br>server for MAC address based access control, IEEE 802.1X Authenticator and dynamic WEP keying, RADIUS accounting, WPA\/WPA2 (IEEE 802.11i\/RSN) Authenticator and dynamic TKIP\/CCMP keying.<\/p>\n\n\n\n<p>The current version includes support for other drivers, an integrated EAP server (i.e., allow full authentication without requiring an external RADIUS authentication server), and RADIUS authentication server for EAP authentication.<\/p>\n<\/blockquote>\n\n\n\n<p>\u4e2d\u6587\u7ffb\u8bd1\uff1a<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u6700\u521d\uff0chostapd\u662f\u4e3b\u673aAP\u9a71\u52a8\u7a0b\u5e8f\u7684\u53ef\u9009\u7528\u6237\u7a7a\u95f4\u7ec4\u4ef6\u3002\u5b83\u4e3a\u5185\u6838\u9a71\u52a8\u7a0b\u5e8f\u4e2d\u5305\u542b\u7684\u57fa\u672cIEEE 802.11\u7ba1\u7406\u6dfb\u52a0\u4e86\u66f4\u591a\u7279\u6027\uff1a\u4f7f\u7528\u5916\u90e8RADIUS\u8eab\u4efd\u9a8c\u8bc1<br>\u57fa\u4e8eMAC\u5730\u5740\u7684\u8bbf\u95ee\u63a7\u5236\u670d\u52a1\u5668\uff0cIEEE 802.1X\u8ba4\u8bc1\u5668\u548c\u52a8\u6001WEP\u5bc6\u94a5\uff0cRADIUS\u8ba1\u8d39\uff0cWPA\/WPA2 \uff08IEEE 802.11i\/RSN\uff09\u8ba4\u8bc1\u5668\u548c\u52a8\u6001TKIP\/CCMP\u5bc6\u94a5\u3002<\/p>\n\n\n\n<p>\u5f53\u524d\u7248\u672c\u5305\u62ec\u5bf9\u5176\u4ed6\u9a71\u52a8\u7a0b\u5e8f\u7684\u652f\u6301\uff0c\u4e00\u4e2a\u96c6\u6210\u7684EAP\u670d\u52a1\u5668\uff08\u5373\uff0c\u5141\u8bb8\u5b8c\u6574\u7684\u8eab\u4efd\u9a8c\u8bc1\u800c\u4e0d\u9700\u8981\u5916\u90e8RADIUS\u8ba4\u8bc1\u670d\u52a1\u5668\uff09\uff0c\u4ee5\u53ca\u7528\u4e8eEAP\u8eab\u4efd\u9a8c\u8bc1\u7684RADIUS\u8ba4\u8bc1\u670d\u52a1\u5668\u3002<\/p>\n<\/blockquote>\n\n\n\n<h2 class=\"wp-block-heading\">hostapd\u53ef\u4ee5\u505a\u4ec0\u4e48<\/h2>\n\n\n\n<p><strong>\u4f7f\u7528\u573a\u666f<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\u65e0\u7ebf\u8def\u7531\u5668\uff1a<code>hostapd<\/code> \u662f\u8bb8\u591a\u5f00\u6e90\u8def\u7531\u5668\u56fa\u4ef6\uff08\u5982 <code>OpenWrt<\/code>\uff09\u4e2d\u5b9e\u73b0\u65e0\u7ebf\u529f\u80fd\u7684\u6838\u5fc3\u7ec4\u4ef6<\/li>\n\n\n\n<li>\u65e0\u7ebf\u70ed\u70b9\uff1a\u5728 <code>Linux<\/code> \u7cfb\u7edf\u4e0a\u4f7f\u7528 <code>hostapd<\/code> \u53ef\u4ee5\u5c06\u7b14\u8bb0\u672c\u7535\u8111\u6216\u6811\u8393\u6d3e\u914d\u7f6e\u4e3a\u65e0\u7ebf\u70ed\u70b9<\/li>\n\n\n\n<li>\u4f01\u4e1a\u65e0\u7ebf\u7f51\u7edc\uff1a\u901a\u8fc7 <code>RADIUS<\/code> \u670d\u52a1\u5668\u548c <code>hostapd<\/code> \u914d\u7f6e\u4f01\u4e1a\u7ea7\u65e0\u7ebf\u7f51\u7edc<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">\u5de5\u4f5c\u539f\u7406<\/h2>\n\n\n\n<p><code>hostapd<\/code> \u901a\u8fc7\u4e0e\u65e0\u7ebf\u7f51\u5361\u9a71\u52a8\u4ea4\u4e92\uff0c\u63a7\u5236\u65e0\u7ebf\u7f51\u5361\u7684\u5de5\u4f5c\u6a21\u5f0f\uff0c\u5c06\u5176\u5207\u6362\u4e3a <code>AP<\/code> \u6a21\u5f0f\uff08Access Point Mode\uff09\u5e76\u901a\u8fc7\u914d\u7f6e\u6587\u4ef6\u5b9a\u4e49\u65e0\u7ebf\u7f51\u7edc\u7684\u53c2\u6570\uff08\u5982 <code>SSID<\/code>\u3001\u5bc6\u7801\u3001\u4fe1\u9053\u7b49\uff09<\/p>\n","protected":false},"excerpt":{"rendered":"<p>hostapd\u662f\u4ec0\u4e48 \u8fd9\u91cc\u9644\u4e0a\u4e0d\u540c\u7684\u89e3\u8bfb hostapd (host access point daemon) [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_import_markdown_pro_load_document_selector":0,"_import_markdown_pro_submit_text_textarea":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-372","post","type-post","status-publish","format-standard","hentry","category-source-code-analysis"],"_links":{"self":[{"href":"https:\/\/www.garfield-blog.top\/index.php?rest_route=\/wp\/v2\/posts\/372","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.garfield-blog.top\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.garfield-blog.top\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.garfield-blog.top\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.garfield-blog.top\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=372"}],"version-history":[{"count":1,"href":"https:\/\/www.garfield-blog.top\/index.php?rest_route=\/wp\/v2\/posts\/372\/revisions"}],"predecessor-version":[{"id":373,"href":"https:\/\/www.garfield-blog.top\/index.php?rest_route=\/wp\/v2\/posts\/372\/revisions\/373"}],"wp:attachment":[{"href":"https:\/\/www.garfield-blog.top\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=372"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.garfield-blog.top\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=372"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.garfield-blog.top\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=372"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}