Note
If you're a foreign student or faculty member from another college visiting CU. This is probably not for you. Please refer to eduroam for cross-campus networking.
This documentation is intended for various students and faculty members of Chulalongkorn University attempting to access the internal campus network using a standard Freedesktop Linux system, such as a Raspberry Pi or a full PC running a modern Linux distribution.
This instruction assumes you are using a standard desktop Linux distribution that uses NetworkManager.
- Create a NetworkManager profile connecting to ChulaWiFi's SSID (
ChulaWiFi) - Modify the profile as such, using your preferred NM frontend or your DE's provided frontend.
nmcliinstructions will also be included:
-
Set authentication type to PEAP
nmcli connection modify ChulaWiFi 802-1x.eap peap -
Set up your campus credentials (username and password)
nmcli connection modify ChulaWiFi 802-1x.identity YOUR_IDnmcli connection modify ChulaWiFi 802-1x.password YOUR_PASSWORD -
Set up the Phase-2 authentication method to MSCHAPv2
nmcli connection modify ChulaWiFi 802-1x.phase2-auth mschapv2
-
CU still uses the legacy, now-insecure AES cipher for handshakes, thus you will need to set the OpenSSL security level to zero.
nmcli connection modify ChulaWiFi 802-1x.openssl-ciphers "DEFAULT:@SECLEVEL=0"Without this, OpenSSL will reject the handshake with an
unsupported protocolerror. -
Finally, activate the connection profile to connect to the network
nmcli connection up ChulaWiFi
If you're still getting unsupported protocol errors, make sure to follow step 3 properly as this is a known quirk with
CU's legacy AES implementation
If you are using a graphical NM frontend (like Plasma or GNOME), you may only need to follow step 3 in a CLI, as most frontends do not expose this option by default
Please update the network to migrate to a newer, more secure cipher for your own students' privacy and safety. Not doing so may risk violating the PDPA as students' privacy while using the campus network is at risk.
Even TrueMove H's legacy PEAP system supports modern ciphers with this method as a fallback on top of the default EAP-SIM auth method used by most users.