[prev in list] [next in list] [prev in thread] [next in thread]
List: hostap
Subject: wpa_supplicant: configuring opportunistic WPA3
From: Michele Guerini Rocco <rnhmjoj () eurofusion ! eu>
Date: 2021-12-28 10:38:15
Message-ID: YcrpF9Zt8amx/F3e () charlie
[Download RAW message or body]
[Attachment #2 (multipart/signed)]
Hi all,
I'm the maintainer of the NixOS module[^1] for wpa_supplicant.
I'd like to know if it's possible to write a network block that will
always work for to both WPA2 and WPA3 networks. Based on the
documentation I wrote:
network={
ssid="mynetwork"
psk="mypassword"
key_mgmt=SAE WPA-PSK
ieee80211w=1
}
This seem to work:
1. if the network is mixed SAE WPA-PSK, wpa_supplicant uses SAE
2. if the network is WPA-PSK or SAE only, wpa_supplicant uses that
However, if (in case 1.) SAE fails for some reason, wpa_supplicant
will not fallback to WPA-PSK but keep trying SAE forever.
This is an issue, for example, if the hardware lacks PMF support.
Is there a way to configure SAE opportunistically? Try SAE first,
if it succeeds use that, otherwise try another protocol.
Thank you,
rnhmjoj
[^1]: If you never heard of NixOS, that is basically a high-level
interface for generating wpa_supplicant config file.
["signature.asc" (application/pgp-signature)]
_______________________________________________
Hostap mailing list
Hostap@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/hostap
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic