[prev in list] [next in list] [prev in thread] [next in thread] 

List:       hostap
Subject:    wpa_supplicant: configuring opportunistic WPA3
From:       Michele Guerini Rocco <rnhmjoj () eurofusion ! eu>
Date:       2021-12-28 10:38:15
Message-ID: YcrpF9Zt8amx/F3e () charlie
[Download RAW message or body]

[Attachment #2 (multipart/signed)]


Hi all,

I'm the maintainer of the NixOS module[^1] for wpa_supplicant.
I'd like to know if it's possible to write a network block that will
always work for to both WPA2 and WPA3 networks. Based on the
documentation I wrote:

  network={
    ssid="mynetwork"
    psk="mypassword"
    key_mgmt=SAE WPA-PSK
    ieee80211w=1
  }

This seem to work:
  1. if the network is mixed SAE WPA-PSK, wpa_supplicant uses SAE
  2. if the network is WPA-PSK or SAE only, wpa_supplicant uses that
However, if (in case 1.) SAE fails for some reason, wpa_supplicant
will not fallback to WPA-PSK but keep trying SAE forever.
This is an issue, for example, if the hardware lacks PMF support.

Is there a way to configure SAE opportunistically? Try SAE first,
if it succeeds use that, otherwise try another protocol.

Thank you,

rnhmjoj


[^1]: If you never heard of NixOS, that is basically a high-level
interface for generating wpa_supplicant config file.

["signature.asc" (application/pgp-signature)]

_______________________________________________
Hostap mailing list
Hostap@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/hostap


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic