You are not logged in.
I have a pure WPA3 SSID on my home network. I know it's working:
1) Several iOS devices can connect to it.
2) When I use NetworkManager, it can connect and shows "WPA3" in the connection properties.
My goal is to use wpa_supplicant and systemd-networkd rather than NetworkManager.
I know that wpa_supplicant, is able to see my SSID called blast:
# wpa_cli -i wlp4s0 scan
OK
# wpa_cli -i wlp4s0 scan_results | grep blast
xx:xx:xx:xx:xx:xx 5745 -66 [WPA2-SAE-CCMP][ESS][UTF-8] blast
So I created /etc/wpa_supplicant/wpa_supplicant-wlp4s0.conf:
ctrl_interface=/run/wpa_supplicant
update_config=1
network={
ssid="blast"
psk=xxx
key_mgmt=SAE
ieee80211w=2
}
Where psk is my correctly formatted passphrase which I sanitized for the forum post.
But wpa_supplicant fails to connect:
# wpa_supplicant -i wlp4s0 -c /etc/wpa_supplicant/wpa_supplicant-wlp4s0.conf
Successfully initialized wpa_supplicant
wlp4s0: No PSK available for association
wlp4s0: SME: Failed to set WPA key management and encryption suites
Am I misunderstanding the conf options? Thanks.
Last edited by graysky (2020-06-14 15:16:53)
CPU-optimized Linux-ck packages @ Repo-ck • AUR packages • Zsh and other configs
Offline
Finally figured it out with the help of the debug flag (-d) and searching the example /usr/share/doc/wpa_supplicant/wpa_supplicant.conf for some key words:
CPU-optimized Linux-ck packages @ Repo-ck • AUR packages • Zsh and other configs
Offline
@graysky, thanks for that, but shouldn't 'ieee80211w=2' still be true for a 'pure WPA3 SSID' as you call it?
1=optional
2=required
(see) https://w1.fi/cgit/hostap/plain/wpa_sup … icant.conf
# ieee80211w: whether management frame protection is enabled
# 0 = disabled (default unless changed with the global pmf parameter)
# 1 = optional
# 2 = required
# The most common configuration options for this based on the PMF (protected
# management frames) certification program are:
# PMF enabled: ieee80211w=1 and key_mgmt=WPA-EAP WPA-EAP-SHA256
# PMF required: ieee80211w=2 and key_mgmt=WPA-EAP-SHA256
# (and similarly for WPA-PSK and WPA-PSK-SHA256 if WPA2-Personal is used)
# WPA3-Personal-only mode: ieee80211w=2 and key_mgmt=SAE
Offline
@qinohe - I think so but am I not expert enough with different WPA3 configurations on the router's side... on my openwrt device, I have the SSID set to be required, but there is an optional mode as well. I think setting it to 1 in wpa's config is more permissive but please correct me if I am mistaken.
CPU-optimized Linux-ck packages @ Repo-ck • AUR packages • Zsh and other configs
Offline
Yes, that's what that option seems to imply.
If option '2' is enabled PFM is a crypto enabled transmission too.
I'm not an expert too but reading about it, it seems you could be forced to re-authenticate by malicious frames.
Could be far fetched, but better safe than sorry;)
Offline