On Sun, Oct 16, 2022 at 10:34 AM Jouni Malinen <j@xxxxx> wrote: > > On Tue, Oct 11, 2022 at 09:49:18PM +0000, Jeffery Miller wrote: > > Add `sae_check_mfp` network option to limit SAE when PMF will > > not be selected for the connection. > > Avoids SAE when the hardware is not capable of PMF. > > Avoids SAE on capable hardware when the AP does not enable PMF. > > Why would this be done? IEEE Std 802.11-2020 allows SAE to be used > regardless of whether management frame protection is enabled. > WPA3-Personal may have this type of a restriction, but that is not the > only way SAE would be allowed to be used and as such, I'm not keen on > enforcing this unconditionally. It isn't intended to be enforced by default without the new option. The changelog comment is misleading. One goal is to enable a similar behavior as the pmf=1 global flag allowing avoidance of SAE based on the lack of device PMF capabilities. Allowing the decision to be enabled in wpa_supplicant instead of requiring the network configuration to be aware of the capabilities. > If these type of functionality is needed from the WPA3 view point, it > could be fine to add this using a global parameter that would enable > this behavior while leaving the existing behavior (SAE allowed without > PMF) to continue to be the default. It is a better fit for a global option where SAE allowed without PMF is still the default. I will submit a new version where it is a global instead of per-network change. _______________________________________________ Hostap mailing list Hostap@xxxxxxxxxxxxxxxxxxx http://lists.infradead.org/mailman/listinfo/hostap