Good point about wpa_supplicant
I have just
zypper dup'ed today, so i am on a tumbleweed completely updated inclusing the network repo :
Code:
zypper lr
Repository priorities are without effect. All enabled repositories share the same priority.
# | Alias | Name | Enabled | GPG Check | Refresh
--+-------------------------------------+-----------------------------+---------+-----------+--------
1 | http-download.opensuse.org-22123e64 | network | Yes | (r ) Yes | Yes
2 | http-ftp.gwdg.de-189aabdb | Packman Repository | Yes | (r ) Yes | Yes
3 | http-opensuse-guide.org-e0cb3c9f | libdvdcss repository | Yes | (r ) Yes | Yes
4 | repo-non-oss | openSUSE-Tumbleweed-Non-Oss | Yes | (r ) Yes | Yes
5 | repo-oss | openSUSE-Tumbleweed-Oss | Yes | (r ) Yes | Yes
6 | repo-update | openSUSE-Tumbleweed-Update | Yes | (r ) Yes | Yes
here about wpa_supplicant :
Code:
rpm -qi wpa_supplicant
Name : wpa_supplicant
Version : 2.9
Release : 1.1
Architecture: x86_64
Install Date: Sun Nov 17 11:13:44 2019
Group : Unspecified
Size : 4907621
License : BSD-3-Clause AND GPL-2.0-or-later
Signature : RSA/SHA256, Mon Nov 11 14:45:43 2019, Key ID b88b2fd43dbdc284
Source RPM : wpa_supplicant-2.9-1.1.src.rpm
Build Date : Mon Nov 11 14:45:15 2019
Build Host : lamb11
Relocations : (not relocatable)
Packager : https://bugs.opensuse.org
Vendor : openSUSE
URL : https://w1.fi/wpa_supplicant
Summary : WPA supplicant implementation
Description :
I have again tried to delete my access point and reconnect to it as new, but also on wpa3 to be found in the security drop down list.
And i notice this all up on top in the changelog of wpa_supplicant :
Code:
rpm -q wpa_supplicant-2.9-1.1 --changelog |less
* Mon Nov 04 2019 Tomáš Chvátal <tchvatal@suse.com>
- Update to 2.9 release:
* SAE changes
- disable use of groups using Brainpool curves
- improved protection against side channel attacks
[https://w1.fi/security/2019-6/]
* EAP-pwd changes
- disable use of groups using Brainpool curves
- allow the set of groups to be configured (eap_pwd_groups)
- improved protection against side channel attacks
[https://w1.fi/security/2019-6/]
* fixed FT-EAP initial mobility domain association using PMKSA caching
(disabled by default for backwards compatibility; can be enabled
with ft_eap_pmksa_caching=1)
* fixed a regression in OpenSSL 1.1+ engine loading
* added validation of RSNE in (Re)Association Response frames
* fixed DPP bootstrapping URI parser of channel list
* extended EAP-SIM/AKA fast re-authentication to allow use with FILS
* extended ca_cert_blob to support PEM format
* improved robustness of P2P Action frame scheduling
* added support for EAP-SIM/AKA using anonymous@realm identity
* fixed Hotspot 2.0 credential selection based on roaming consortium
to ignore credentials without a specific EAP method
* added experimental support for EAP-TEAP peer (RFC 7170)
* added experimental support for EAP-TLS peer with TLS v1.3
* fixed a regression in WMM parameter configuration for a TDLS peer
* fixed a regression in operation with drivers that offload 802.1X
4-way handshake
* fixed an ECDH operation corner case with OpenSSL
* SAE changes
- added support for SAE Password Identifier
- changed default configuration to enable only groups 19, 20, 21
......
Bookmarks