Imao sam mnogo problema sa Wireless, pa sam ovde nabacao sve što sam radio…
You can ignore “unknown event 60”. It’s just NL80211_CMD_FRAME, which is used by mac80211 to report received management frames to user space.
Kompletna WiFi konfiguracija se nalazi u jedno fajlu:
cat /etc/config/wireless
Countries: Wireless regulatory database for CRDA
Coverage Cell Density
Device Configuration > Advanced Settings > Coverage Cell Density
The higher you set, the faster clients will connect, but clients which are far and cannot connect to the advertised speeds will be denied. You can start from very high and go down until all your clients connect within the range you wish.
How should the Coverage Cell Density setting be used?
DTIM Interval
Interface Configuration > Advanced Settings > DTIM Interval
- set to 3 on 5GHz or even 6 on 2.4GHz, specijalno ako smanjuješ Beacon Interval, tada podesi na 6 na primer
Go To Sleep, Go To Sleep, Go To Sleep Little iPhone DTIM Interval (Period) Best Setting - Router Guide
47
Beacon interval is used for synchronization of the clients (as well as advertising the SSID). So the beacon is the rhythm of your network. If you increase the time between beacons by too much (raise the beacon interval) a client is holding traffic waiting for a beacon, and if you have multiple stations competing for the attention of the AP, a wide interval between beacons makes it more likely that more than one station will attempt to contact the AP at the same time.
Choosing from among a list of prime numbers makes it less likely that your beacons will chirp in sync with the beacons of other networks. Since beacons can collide as well, it makes sense to choose an interval that is unlikely to align with neighboring networks for very long.
Baš bitno objašnjenje: Theory on Optimizing a 802.11 Beacon - Wireless Networking | DSLReports Forums
Time interval for rekeying GTK (IMPORTANT!)
Interface Configuration > Advanced Settings > Time interval for rekeying GTK
- set to 86400 both on 2.4GHz and 5GHz (set to one day or more, default is 600 aka 10 minutes)
aka group key rotation interval It can be disabled also.
What is the key update interval (rekey-interval) between a client and a Wi-Fi access point? – Keenetic Another possible ‘No Response’ fix - WiFi GTK Rekeying interval
Get Rid of TKIP
Data Rate Won’t Exceed 54 Mbps When WEP or TKIP Encryption is configured. If you have a 100 Mbps connection and TKIP has been set as encryption then you will only get 54 Mbps.
Top Ten Tune-up Tips Wi-Fi. Wireless Networking Standards (Wi-Fi)
Enable WMM
WMM (Wi-Fi Multimedia) mode must be enabled for speeds above 54 Mbps. Ways to increase connection speed, bandwidth and stability of your Wi-Fi network – Keenetic
Channel Width
In 2.4GHz, you should always use 20MHz channel widths. The use of a 40 MHz channel width is justified in the 5 GHz frequency band.
Don’t use channel 14
The channel 14 is banned in most countries, however in Japan channel 14 is allowed. If you are wondering what happens if you set your WiFi (WLAN in 2.4 Ghz band) AP on channel 14? The microwaves also operate in this frequency.
Transmit Power
8 reasons to turn down the transmit power of your Wi-Fi - Metis.fi Maximum wifi transmission power per country | Wolph
Tool za podešavanje wireless
iw dev iw dev phy0-ap0 scan trigger freq 2447 flush iw event
cat /etc/config/wireless
WiFi Countries Legal
Izvukao legal pravila WiFi šta je slobodno i u kojoj zemlji, a ovo su najslobodnije zemlje:
country PA: DFS-FCC (2400 - 2483.5 @ 40), (36) (5150 - 5250 @ 80), (36), AUTO-BW (5250 - 5350 @ 80), (30), AUTO-BW (5470 - 5725 @ 160), (30)
- (5725 - 5850 @ 80), (36) (57000 - 64000 @ 2160), (43)
country HK: DFS-ETSI (2400 - 2483.5 @ 40), (36) (5150 - 5250 @ 80), (23), AUTO-BW, NO-OUTDOOR (5250 - 5350 @ 80), (23), DFS, AUTO-BW, NO-OUTDOOR (5470 - 5730 @ 160), (27), DFS
- (5730 - 5850 @ 80), (36) (5925 - 6425 @ 160), (14)
country US: DFS-FCC (2400 - 2472 @ 40), (30) (5150 - 5250 @ 80), (23), AUTO-BW (5250 - 5350 @ 80), (24), DFS, AUTO-BW (5470 - 5730 @ 160), (24), DFS
- (5730 - 5850 @ 80), (30), AUTO-BW (5850 - 5895 @ 40), (27), NO-OUTDOOR, AUTO-BW, NO-IR (5925 - 7125 @ 320), (12), NO-OUTDOOR, NO-IR (57240 - 71000 @ 2160), (40)
Komanda za čekanje na konekciju
|
|
Opportunistic Wireless Encryption (OWE)
OWE is basically for public hotspots, an auth-free, but encrypted replacement for „no encryption“.
In WPA3 standard, there is something know as Opportunistic Wireless Encryption (OWE) which will enables the WiFi devices to encrypt the traffic without even knowing any secret.
Opportunistic Wireless Encryption (OWE) for Open SSID - OWE derives an encryption key between an access point (AP) and a client, even if they have had no prior contact to establish any shared secret.
Jamming WiFi Network on purpose
If you cloned the MAC address of the router and duped the ssid and had it on the same channel, yes it’s going to keep it from working. You can find a piece of software called airgeddon that is very well capable of doing this easily, Can be found on GitHub.
Most consumer routers don’t protect your devices from these attacks, which is a weakness of how WPA/WPA2 manages connections. Less common routers have 802.11w, which actually encrypts the management frames and protects from these types of attacks when enabled. Currently WPA3 is slowly rolling out to consumers, which also encrypts these packets, thus protecting from attacks like this. It will be a good awhile before everyone catches up and has all WPA3 enabled devices, but it’s a good start.
How to Hack Wi-Fi: Build a Software-Based Wi-Fi Jammer with Airgeddon « Null Byte :: WonderHowTo