We have moved to a new Sailfish OS Forum. Please start new discussions there.

How to: eduroam wifi and WPA-enterprise [duplicate]

asked 2016-02-09 14:40:58 +0300

nik gravatar image

updated 2016-08-17 10:52:02 +0300

jiit gravatar image

Lots of good information in this original how-to: https://together.jolla.com/question/315/how-to-wpa-8021x-enterprise-eduroam-others-gui-wifi-support-needed-workaround/

After some compatibility testing for my Yolla and different authentication types used in eduroam specifically, here is the summary of results and some instructions.

Eduroam is a federated access system, which means that many different organisations provide it. The authentication types used will differ from one place to the next and you have to configure your device so it uses an authentication mechanism that your organisation supports. Once you have done that, it doesn't matter where in Europe/World you connect, your authentication is forwarded to your home institution and handled there, so no need to change configs.

I tried PEAP-MSCHAPv2, EAP-TTLS/PAP and EAP-TLS and all of them worked at my university. None of these you can configure through the GUI however, hence this post.

For the impatient, here are the configs (largely collected from various posts here):


PrivateKeyPassphrase=your password here


Passphrase=your password here


Passphrase=your password here

How to put these in place, install certificate authorities, convert your personal certificate (if needed) and how to troubleshoot if it still doesn't work follows.

Start with enabling developer mode and SSH-ing into the device. Doing that over the USB connection works best for me. You could do it all through a terminal app, but it will be a pain. Become root. You can either create the above config file/s on your computer and copy (e.g. scp) it to /var/lib/connman, or create the chosen file in place. You can call the file whatever you want, as long as you keep the .config extension. This also means that if you want you can create all of the above and then change the extensions of the ones you don't currently use. I have found that changing the files does not come into effect until I reboot the phone - hopefully someone will reply here saying what service needs to be restarted so we don't have to go into Windows reboot territory :)

For EAP-TLS (my preferred method) you need to ensure you have a valid user certificate in PEM format, and your organisations Certificate Authority is installed on your phone (is trusted). The first part should be easy, just copy your certificate, as provided by your institution, to some location on your Yolla. If it is provided in .p12 format, you will have to convert it to PEM:

openssl pkcs12 -in certificate.p12 -out username_cert.pem

Installing CA certificates is described in /etc/pki/ca-trust/source/README:

To add a certificate in the simple PEM or DER file formats to the list of CAs trusted on the system: Copy it to the


subdirectory, and run the


command. If your certificate is in the extended BEGIN TRUSTED file format, then place it into the main source/ directory instead.

Obviously, the names and paths of your personal certificate and the CA certs should correspond to what you have entered in the configuration file. Once this is done, reboot (unless you know a better way) and you should be able to connect with EAP-TLS.

If it doesn't work and you know your institution supports it, you can either look at the logs as described below to troubleshoot or try some of the other authentication methods below.

For EAP-TTLS and PEAP-MSCHAPv2: Install your institution's root certificates as above and create the corresponding configuration file in /var/lib/connman.

Configuring these is faster and easier, but in my experience the login is slower and if misconfigured (no root CA verification) can be insecure. Additionally, if your organisation requires you to change passwords regularly, you will need to change them on all your devices as well. With certificates, you only need to change them when they expire which is usually in a few years (or the length of your study if you are a student).

Troubleshooting: If after the reboot your connection attempts fail, you can SSH in and (as root) check the logs. Run

journalctl -f

hit enter a few times to clear the screen, and then connect again. You will see some output related to your connection attempt. If it doesn't mean anything to you, ask here - I will try to keep an eye on replies to this post.

edit retag flag offensive reopen delete

The question has been closed for the following reason "duplicate question" by chemist
close date 2016-02-09 20:40:24.390673



I tried what you explained here and this is what I got.

My network is : PEAP-MSCHAPv2

Sep 19 09:11:09 Sailfish kernel: [07:11:09.185133] [000003ACD434EE18] [wpa_s] wlan: [E :HDD] wlan_hdd_get_frame_logs: Frame Logging not init! Sep 19 09:11:09 Sailfish wpa_supplicant[23541]: wlan0: Failed to initiate sched scan Sep 19 09:11:09 Sailfish kernel: [07:11:09.749345] [000003ACD4DA39F8] [wpa_s] wlan: [E :HDD] __wlan_hdd_cfg80211_sched_scan_start: Network ...ted is 16 Sep 19 09:11:09 Sailfish kernel: IPC_RTR: msm_ipc_router_send_to: permission failure for dpmd Sep 19 09:11:09 Sailfish kernel: IPC_RTR: msm_ipc_router_sendmsg: Send_to failure -1 Sep 19 09:11:33 Sailfish [25381]: QObject::disconnect: Unexpected null parameter Sep 19 09:11:33 Sailfish [25381]: QObject::disconnect: Unexpected null parameter Sep 19 09:11:36 Sailfish kernel: [07:11:36.186035] [000003ACF31B59BA] [wpa_s] wlan: [E :HDD] wlan_hdd_get_frame_logs: Frame Logging not init! Sep 19 09:11:36 Sailfish wpa_supplicant[23541]: wlan0: Failed to initiate sched scan Sep 19 09:11:36 Sailfish kernel: [07:11:36.845576] [000003ACF3DC9350] [wpa_s] wlan: [E :HDD] __wlan_hdd_cfg80211_sched_scan_start: Network ...ted is 16

Edit: problem fixed by removing the CERT field. Looks like doesn't support blank field.

mousse04 ( 2016-09-19 10:12:28 +0300 )edit

1 Answer

Sort by » oldest newest most voted

answered 2016-02-09 20:39:57 +0300

chemist gravatar image

Please put it as answer in the original post and remove the duplicated effort. Closing as duplicate.

edit flag offensive delete publish link more

Question tools



Asked: 2016-02-09 14:40:58 +0300

Seen: 1,166 times

Last updated: Feb 09 '16