クライアント構成に公開鍵を手動で配置せずに、wpa_supplicantにPEAP MSCHAPv2のサーバー証明書を受け入れさせるにはどうすればよいですか?
Wpa_supplicant.confファイルに_ca_cert
_または_ca_path
_タグ/値のペアを含めないでください。
Wpa_supplicant.confファイルの例から。 3番目の文に注意してください(私の強調):
# ca_cert: File path to CA certificate file (PEM/DER). This file can have one # or more trusted CA certificates. If ca_cert and ca_path are not # included, server certificate will not be verified. This is insecure and # a trusted CA certificate should always be configured when using # EAP-TLS/TTLS/PEAP. Full path should be used since working directory may # change when wpa_supplicant is run in the background.