Possible to disable SAE and force WPA2-PSK-AES on wpa_supplicant v2.10?
Jouni Malinen
j at w1.fi
Fri Mar 17 02:00:15 PDT 2023
On Thu, Mar 16, 2023 at 07:15:02PM -0500, Theron Spiegl wrote:
> Hi, I'm using a Qualcomm Atheros QCA6174 with wpa_supplicant v2.10. When I start a hotspot with the commands below, it can be joined by most devices (Linux, Windows, iOS) but not an M1 MacBook Pro. I've determined that this is because of SAE/WPA3 support: if I run macOS's `airport` CLI utility, I see that the wpa_supplicant 2.10 hotspot offers `WPA(PSK/AES/AES) RSN(PSK,PSK-SHA256,SAE/AES/AES)` in the Security column. When I use wpa_supplicant 2.9, it offers `WPA(PSK/AES/AES) RSN(PSK,PSK-SHA256/AES/AES)`, and the MacBook can join.
>
> Is there a way to disable SAE and force the use of WPA2-PSK with AES on wpa_supplicant 2.10? (Whether through nmcli or wpa_cli or something else?)
I would strongly discourage doing that and instead, figure out why there
is no WPA3-Personal (SAE) connection. The current MacBook Pro devices
should be able to use SAE.
Do you have management frame protection (a.k.a. PMF) enabled in
wpa_supplicant configuration? This could be enabled with ieee80211w=1
with the particular network profile for the AP mode operation or pmf=1
as a global parameter to enable it by default for all networks.
--
Jouni Malinen PGP id EFC895FA
More information about the Hostap
mailing list