Skip to content

Instantly share code, notes, and snippets.

@projectgus
Last active August 29, 2015 14:13
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save projectgus/5d18fdd40d601eb24a5a to your computer and use it in GitHub Desktop.
Save projectgus/5d18fdd40d601eb24a5a to your computer and use it in GitHub Desktop.
LCA2015 SimpleBot/Raspberry Pi Wifi Config
* There are two config files further down this page. Place them on the second partition (rootfs,
the ext4 partition) of your SimpleBot/Raspberry Pi SD card.
* Remember to edit in the correct conference credentials inside the wpa_supplicant.conf
file.
* Run the 'passwd' command on the Pi to change the pi user's default password -
unless you are very generous about who gets to drive your robot (& own your
robot's OS).
* You should probably also firewall against any services you don't explicitly
want. You can start with these commands on the Pi:
sudo apt-get install ufw
sudo ufw allow ssh
sudo ufw allow 5353
sudo ufw enable
(It'll warn you when you run 'ufw enable', but as long as you ran the 'allow ssh'
step already then all will be OK and you won't lock yourself out.)
Once ufw is enabled, if you want to run a new service - ie a web server or something -
then you'll need to allow this service name or port via ufw, also.
* If you haven't already booted the SD card, remove the line "wifichanged=1" from
the "machine.local" file on the first partition (/boot, the FAT partition) if
the line is there. After first boot this line is removed so you can skip this.
* Feel free to seek me out if I can help you to get this working (I want to see
all the SimpleBots on the network!)
# This file goes in /etc/network/interfaces
auto lo
iface lo inet loopback
allow-hotplug eth0
iface eth0 inet dhcp
auto ra0
allow-hotplug ra0
iface ra0 inet manual
wpa-roam /etc/wpa_supplicant/wpa_supplicant.conf
iface default inet dhcp
# This file goes in /etc/wpa_supplicant/wpa_supplicant.conf
ctrl_interface=DIR=/var/run/wpa_supplicant GROUP=netdev
update_config=1
network={
scan_ssid=1
ssid="LCA2015"
proto=WPA2
key_mgmt=WPA-EAP
pairwise=CCMP TKIP
group=CCMP TKIP
eap=PEAP
identity="IDENTITYGOESHERE"
password="SUPERSECRETPASSWORDGOESHERE"
}
@sfd
Copy link

sfd commented Jan 14, 2015

Looks like mdns (avahi) is filtered on the LCA2015 network, how can we tell what IP it gets in order to ssh in?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment