summaryrefslogtreecommitdiff
path: root/pkgs/development/python-modules/python-mapnik/python-mapnik_std_optional.patch
diff options
context:
space:
mode:
authorrnhmjoj <rnhmjoj@inventati.org>2022-01-11 22:01:32 +0100
committerrnhmjoj <rnhmjoj@inventati.org>2022-01-14 10:54:01 +0100
commit2eed89bbe1fd431079b6c824bbcb66a92d3bff7c (patch)
tree6acd5d9e81d4f6ae6989fef5ea066392fb1ca517 /pkgs/development/python-modules/python-mapnik/python-mapnik_std_optional.patch
parent2f5ced6d7c3d1f31305d8c0935a2ff0d3da3d56a (diff)
nixos/wireless: implement opportunistic WPA3
It turns out it's actually possible to fall back to WPA2 in case the authentication fails with WPA3. This was suggested to me in the hostapd mailing list: add another network block with only WPA2 and lower priority, for each network with WPA3. For clients with missing/broken WPA3, wpa_supplicant will: 1. try the network block with higher priority first 2. fail and temporarily disable the network block 3. try the fallback network block and connect This takes a little more time (still <5s) because wpa_supplicant retries a couple times before disabling the network block, but it allows old client to gracefully fall back to WPA2 on mixed WPA2/WPA3 networks. To avoid downgrade attacks, clients with proper WPA3 should disable this; in the future we may want to disable this option by default.
Diffstat (limited to 'pkgs/development/python-modules/python-mapnik/python-mapnik_std_optional.patch')
0 files changed, 0 insertions, 0 deletions