1# $OpenBSD: hostapd.conf,v 1.1 2014/07/11 16:36:35 deraadt Exp $ 2# sample hostapd configuration file 3# see hostapd.conf(5) 4 5# "wavelan is a battle field" 6 7# 8# Macros 9# 10 11# Define macros for the interfaces to be used by hostapd. The "wlan" 12# interface is optional. 13wlan="ath0" 14wired="sis0" 15 16# 17# Tables 18# 19 20# Define the MAC addresses (BSSIDs) for your accesspoints in a table. 21table <myess> { 22 00:90:4b:0d:fd:c8, 23 00:02:6f:21:ea:8b 24} 25 26# Address masks are providing a simple way to match by MAC vendor ID. 27# 28# table <senao> { 00:02:6f:ff:ff:ff & ff:ff:ff:00:00:00 } 29 30# 31# Global options 32# 33 34# Comment this option to run hostapd in passive IAPP logging mode. 35set hostap interface $wlan 36 37# Use default radiotap mode. 38set hostap mode radiotap 39 40# Uncomment these options to jump to the next channel every 2 seconds. 41#set hostap hopper interface $wlan 42#set hostap hopper delay 2000 43 44# Use multicast (according to the revised standard). 45set iapp interface $wired 46set iapp mode multicast 47 48# The following mode is compatible to some pre-standard IAPP implementations 49#set iapp mode broadcast port 2313 50 51# 52# Event rules 53# 54 55# Log probe requests. 56hostap handle type management subtype probe request \ 57 with iapp type radiotap 58 59# Log and annoy foreign accesspoints. 60# 61# This will be logged as well but the important thing is to 62# annoy other accesspoints in your wireless territory. 63hostap handle type data bssid !<myess> \ 64 with frame type management subtype deauth reason auth expire \ 65 from &bssid to ff:ff:ff:ff:ff:ff bssid &bssid 66 67# The first de-auth example will not work with some newer stuff, like 68# iwi(4)/ipw(4) "centrino", because they ignore management frames to 69# the broadcast address as a countermeasure against the "void11" 70# attack. 71# 72# hostap handle type data bssid !<myess> \ 73# with frame type management subtype deauth reason auth expire \ 74# from &bssid to &from bssid &bssid 75 76# Detect flooding of management frames except beacons. 77# This will detect some possible Denial of Service attacks 78# against the IEEE 802.11 protocol (like "void11"). 79hostap handle skip type management subtype ! beacon \ 80 with log \ 81 rate 100 / 10 sec 82 83# Finally log any rogue accesspoints limited to every second. 84hostap handle skip type management subtype beacon bssid !<myess> \ 85 with iapp type radiotap limit 1 sec 86 87