diff options
| author | rnhmjoj <rnhmjoj@inventati.org> | 2022-01-11 22:01:32 +0100 |
|---|---|---|
| committer | rnhmjoj <rnhmjoj@inventati.org> | 2022-01-14 10:54:01 +0100 |
| commit | 2eed89bbe1fd431079b6c824bbcb66a92d3bff7c (patch) | |
| tree | 6acd5d9e81d4f6ae6989fef5ea066392fb1ca517 /pkgs/development/python-modules/python-mapnik/python-mapnik_std_optional.patch | |
| parent | 2f5ced6d7c3d1f31305d8c0935a2ff0d3da3d56a (diff) | |
nixos/wireless: implement opportunistic WPA3
It turns out it's actually possible to fall back to WPA2 in case the
authentication fails with WPA3. This was suggested to me in the hostapd
mailing list: add another network block with only WPA2 and lower
priority, for each network with WPA3. For clients with missing/broken
WPA3, wpa_supplicant will:
1. try the network block with higher priority first
2. fail and temporarily disable the network block
3. try the fallback network block and connect
This takes a little more time (still <5s) because wpa_supplicant
retries a couple times before disabling the network block, but it allows
old client to gracefully fall back to WPA2 on mixed WPA2/WPA3 networks.
To avoid downgrade attacks, clients with proper WPA3 should disable
this; in the future we may want to disable this option by default.
Diffstat (limited to 'pkgs/development/python-modules/python-mapnik/python-mapnik_std_optional.patch')
0 files changed, 0 insertions, 0 deletions
