public inbox for iwd@lists.linux.dev
 help / color / mirror / Atom feed
* Is there a way to manually force the security protocol with IWD?
@ 2026-01-30 14:43 Bryce Johnson
  2026-01-30 14:48 ` James Prestwood
  0 siblings, 1 reply; 7+ messages in thread
From: Bryce Johnson @ 2026-01-30 14:43 UTC (permalink / raw)
  To: iwd

Hi All
We are working to get our product through wifi certification.  Our
testing company mentioned there was several negative test cases that
were failing where IWD was connecting anyways because it would decide
on the security type based on the AP.  Is there a way to force IWD to
use a security type that is different than the AP so it would fail the
connection?  Can we disable WPA1-only connection or force WPA2 only
connection?

Thanks
Bryce

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: Is there a way to manually force the security protocol with IWD?
  2026-01-30 14:43 Is there a way to manually force the security protocol with IWD? Bryce Johnson
@ 2026-01-30 14:48 ` James Prestwood
  2026-01-30 15:01   ` Bryce Johnson
  0 siblings, 1 reply; 7+ messages in thread
From: James Prestwood @ 2026-01-30 14:48 UTC (permalink / raw)
  To: Bryce Johnson, iwd

Hi Bryce,

On 1/30/26 6:43 AM, Bryce Johnson wrote:
> Hi All
> We are working to get our product through wifi certification.  Our
> testing company mentioned there was several negative test cases that
> were failing where IWD was connecting anyways because it would decide
> on the security type based on the AP.  Is there a way to force IWD to
> use a security type that is different than the AP so it would fail the
> connection?  Can we disable WPA1-only connection or force WPA2 only
> connection?

There unfortunately isn't at the moment. We do have a "developer mode" 
by specifying "-E" to IWD and this seems like it would fall into that 
category, support would need to be added of course.

But I'm somewhat confused (and maybe this is just poor test cases by 
WFA?), why would you need to certify that IWD fails when using a 
different security type than the AP? A client should not ever use a 
security type the AP doesn't advertise support for... This feels like 
its testing the AP, not IWD :)

>
> Thanks
> Bryce
>

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: Is there a way to manually force the security protocol with IWD?
  2026-01-30 14:48 ` James Prestwood
@ 2026-01-30 15:01   ` Bryce Johnson
  2026-01-30 15:07     ` James Prestwood
  0 siblings, 1 reply; 7+ messages in thread
From: Bryce Johnson @ 2026-01-30 15:01 UTC (permalink / raw)
  To: James Prestwood; +Cc: iwd

Hi James

On Fri, Jan 30, 2026 at 7:48 AM James Prestwood <prestwoj@gmail.com> wrote:
>
> Hi Bryce,
>
> On 1/30/26 6:43 AM, Bryce Johnson wrote:
> > Hi All
> > We are working to get our product through wifi certification.  Our
> > testing company mentioned there was several negative test cases that
> > were failing where IWD was connecting anyways because it would decide
> > on the security type based on the AP.  Is there a way to force IWD to
> > use a security type that is different than the AP so it would fail the
> > connection?  Can we disable WPA1-only connection or force WPA2 only
> > connection?
>
> There unfortunately isn't at the moment. We do have a "developer mode"
> by specifying "-E" to IWD and this seems like it would fall into that
> category, support would need to be added of course.
>
> But I'm somewhat confused (and maybe this is just poor test cases by
> WFA?), why would you need to certify that IWD fails when using a
> different security type than the AP? A client should not ever use a
> security type the AP doesn't advertise support for... This feels like
> its testing the AP, not IWD :)
>

I'm was requesting what test case fails and if I could get a copy of
it.  The only thing I can think of is that they want to disable WPA1
for example and show that the device won't connect to a WPA1 only AP.
Or maybe for a product you only want to connect WPA3 and fail and not
connect or not allow the AP to downgrade the connection.

Maybe it would make sense to allow a blacklist of protocols you won't
allow IWD to use?  For our product we wouldn't allow open or WEP
connections for example (but we perform that check outside of IWD).

> >
> > Thanks
> > Bryce
> >

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: Is there a way to manually force the security protocol with IWD?
  2026-01-30 15:01   ` Bryce Johnson
@ 2026-01-30 15:07     ` James Prestwood
  2026-01-30 17:21       ` Bryce Johnson
  0 siblings, 1 reply; 7+ messages in thread
From: James Prestwood @ 2026-01-30 15:07 UTC (permalink / raw)
  To: Bryce Johnson; +Cc: iwd

Hi,

On 1/30/26 7:01 AM, Bryce Johnson wrote:
> Hi James
>
> On Fri, Jan 30, 2026 at 7:48 AM James Prestwood <prestwoj@gmail.com> wrote:
>> Hi Bryce,
>>
>> On 1/30/26 6:43 AM, Bryce Johnson wrote:
>>> Hi All
>>> We are working to get our product through wifi certification.  Our
>>> testing company mentioned there was several negative test cases that
>>> were failing where IWD was connecting anyways because it would decide
>>> on the security type based on the AP.  Is there a way to force IWD to
>>> use a security type that is different than the AP so it would fail the
>>> connection?  Can we disable WPA1-only connection or force WPA2 only
>>> connection?
>> There unfortunately isn't at the moment. We do have a "developer mode"
>> by specifying "-E" to IWD and this seems like it would fall into that
>> category, support would need to be added of course.
>>
>> But I'm somewhat confused (and maybe this is just poor test cases by
>> WFA?), why would you need to certify that IWD fails when using a
>> different security type than the AP? A client should not ever use a
>> security type the AP doesn't advertise support for... This feels like
>> its testing the AP, not IWD :)
>>
> I'm was requesting what test case fails and if I could get a copy of
> it.  The only thing I can think of is that they want to disable WPA1
> for example and show that the device won't connect to a WPA1 only AP.
> Or maybe for a product you only want to connect WPA3 and fail and not
> connect or not allow the AP to downgrade the connection.
Yeah I'd be interested in the test case.
>
> Maybe it would make sense to allow a blacklist of protocols you won't
> allow IWD to use?  For our product we wouldn't allow open or WEP
> connections for example (but we perform that check outside of IWD).

IWD already won't connect to a WEP network, so we're ok there. You may 
be able to coax out some behavior with the following options:

main.conf

[General].ManagementFrameProtection

network profile:

[Settings].TransitionDisable

[Settings].DisabledTransitionModes

Anyways, lets hope you can get the test case. Shouldn't be too hard to 
add some support for specific test/dev type requirements.

Thanks,

James

>
>>> Thanks
>>> Bryce
>>>

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: Is there a way to manually force the security protocol with IWD?
  2026-01-30 15:07     ` James Prestwood
@ 2026-01-30 17:21       ` Bryce Johnson
  2026-01-30 17:36         ` James Prestwood
  2026-01-30 17:39         ` Denis Kenzior
  0 siblings, 2 replies; 7+ messages in thread
From: Bryce Johnson @ 2026-01-30 17:21 UTC (permalink / raw)
  To: James Prestwood; +Cc: iwd

Hi James,

On Fri, Jan 30, 2026 at 8:07 AM James Prestwood <prestwoj@gmail.com> wrote:
>
> Hi,
>
> On 1/30/26 7:01 AM, Bryce Johnson wrote:
> > Hi James
> >
> > On Fri, Jan 30, 2026 at 7:48 AM James Prestwood <prestwoj@gmail.com> wrote:
> >> Hi Bryce,
> >>
> >> On 1/30/26 6:43 AM, Bryce Johnson wrote:
> >>> Hi All
> >>> We are working to get our product through wifi certification.  Our
> >>> testing company mentioned there was several negative test cases that
> >>> were failing where IWD was connecting anyways because it would decide
> >>> on the security type based on the AP.  Is there a way to force IWD to
> >>> use a security type that is different than the AP so it would fail the
> >>> connection?  Can we disable WPA1-only connection or force WPA2 only
> >>> connection?
> >> There unfortunately isn't at the moment. We do have a "developer mode"
> >> by specifying "-E" to IWD and this seems like it would fall into that
> >> category, support would need to be added of course.
> >>
> >> But I'm somewhat confused (and maybe this is just poor test cases by
> >> WFA?), why would you need to certify that IWD fails when using a
> >> different security type than the AP? A client should not ever use a
> >> security type the AP doesn't advertise support for... This feels like
> >> its testing the AP, not IWD :)
> >>
> > I'm was requesting what test case fails and if I could get a copy of
> > it.  The only thing I can think of is that they want to disable WPA1
> > for example and show that the device won't connect to a WPA1 only AP.
> > Or maybe for a product you only want to connect WPA3 and fail and not
> > connect or not allow the AP to downgrade the connection.
> Yeah I'd be interested in the test case.
> >
> > Maybe it would make sense to allow a blacklist of protocols you won't
> > allow IWD to use?  For our product we wouldn't allow open or WEP
> > connections for example (but we perform that check outside of IWD).
>
> IWD already won't connect to a WEP network, so we're ok there. You may
> be able to coax out some behavior with the following options:
>
> main.conf
>
> [General].ManagementFrameProtection
>
> network profile:
>
> [Settings].TransitionDisable
>
> [Settings].DisabledTransitionModes
>
> Anyways, lets hope you can get the test case. Shouldn't be too hard to
> add some support for specific test/dev type requirements.

Here were the test cases
For test case 10153_1:  The test bed AP beacons with no security.  The
test case requires the STAUT to connect with WPA2-PSK only.  Because
of the mismatch of security protocols, the connection will fail.

For test case 10165_1: The test bed AP advertises at WPA2-Personal
only.  The test case requires the STAUT to connect with WPA3-Personal.
Because of the mismatch of security protocols, the connection will
also fail.

I got the PDFs of the test cases I can share offlist as well.  10153_1
looks like it would not connect, but apparently hung up on the setting
the STAUT to WPA2-PSK only.  So it looks like I need a way to restrict
IWD from using other security types for these tests.  If you have any
suggestions on a good way to do this, let me know.

Thanks
Bryce

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: Is there a way to manually force the security protocol with IWD?
  2026-01-30 17:21       ` Bryce Johnson
@ 2026-01-30 17:36         ` James Prestwood
  2026-01-30 17:39         ` Denis Kenzior
  1 sibling, 0 replies; 7+ messages in thread
From: James Prestwood @ 2026-01-30 17:36 UTC (permalink / raw)
  To: Bryce Johnson; +Cc: iwd

Hi Bryce,

On 1/30/26 9:21 AM, Bryce Johnson wrote:
> Hi James,
>
> On Fri, Jan 30, 2026 at 8:07 AM James Prestwood <prestwoj@gmail.com> wrote:
>> Hi,
>>
>> On 1/30/26 7:01 AM, Bryce Johnson wrote:
>>> Hi James
>>>
>>> On Fri, Jan 30, 2026 at 7:48 AM James Prestwood <prestwoj@gmail.com> wrote:
>>>> Hi Bryce,
>>>>
>>>> On 1/30/26 6:43 AM, Bryce Johnson wrote:
>>>>> Hi All
>>>>> We are working to get our product through wifi certification.  Our
>>>>> testing company mentioned there was several negative test cases that
>>>>> were failing where IWD was connecting anyways because it would decide
>>>>> on the security type based on the AP.  Is there a way to force IWD to
>>>>> use a security type that is different than the AP so it would fail the
>>>>> connection?  Can we disable WPA1-only connection or force WPA2 only
>>>>> connection?
>>>> There unfortunately isn't at the moment. We do have a "developer mode"
>>>> by specifying "-E" to IWD and this seems like it would fall into that
>>>> category, support would need to be added of course.
>>>>
>>>> But I'm somewhat confused (and maybe this is just poor test cases by
>>>> WFA?), why would you need to certify that IWD fails when using a
>>>> different security type than the AP? A client should not ever use a
>>>> security type the AP doesn't advertise support for... This feels like
>>>> its testing the AP, not IWD :)
>>>>
>>> I'm was requesting what test case fails and if I could get a copy of
>>> it.  The only thing I can think of is that they want to disable WPA1
>>> for example and show that the device won't connect to a WPA1 only AP.
>>> Or maybe for a product you only want to connect WPA3 and fail and not
>>> connect or not allow the AP to downgrade the connection.
>> Yeah I'd be interested in the test case.
>>> Maybe it would make sense to allow a blacklist of protocols you won't
>>> allow IWD to use?  For our product we wouldn't allow open or WEP
>>> connections for example (but we perform that check outside of IWD).
>> IWD already won't connect to a WEP network, so we're ok there. You may
>> be able to coax out some behavior with the following options:
>>
>> main.conf
>>
>> [General].ManagementFrameProtection
>>
>> network profile:
>>
>> [Settings].TransitionDisable
>>
>> [Settings].DisabledTransitionModes
>>
>> Anyways, lets hope you can get the test case. Shouldn't be too hard to
>> add some support for specific test/dev type requirements.
> Here were the test cases
> For test case 10153_1:  The test bed AP beacons with no security.  The
> test case requires the STAUT to connect with WPA2-PSK only.  Because
> of the mismatch of security protocols, the connection will fail.
>
> For test case 10165_1: The test bed AP advertises at WPA2-Personal
> only.  The test case requires the STAUT to connect with WPA3-Personal.
> Because of the mismatch of security protocols, the connection will
> also fail.

Both of these are pretty ridiculous. They want to test that a client 
chooses an incompatible security type than what the AP advertises.... 
what?!?

I know these are coming from the WFA, and not you... Its just rather 
annoying that they're so adapted to using wpa_supplicant which you can 
force to do stupid things like this. And the fact they wrote test cases 
around that is just sad.

I guess the only option if these are strictly required is to add some 
config option to the profiles that restrict what security types can be used.

>
> I got the PDFs of the test cases I can share offlist as well.  10153_1
> looks like it would not connect, but apparently hung up on the setting
> the STAUT to WPA2-PSK only.  So it looks like I need a way to restrict
> IWD from using other security types for these tests.  If you have any
> suggestions on a good way to do this, let me know.
>
> Thanks
> Bryce

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: Is there a way to manually force the security protocol with IWD?
  2026-01-30 17:21       ` Bryce Johnson
  2026-01-30 17:36         ` James Prestwood
@ 2026-01-30 17:39         ` Denis Kenzior
  1 sibling, 0 replies; 7+ messages in thread
From: Denis Kenzior @ 2026-01-30 17:39 UTC (permalink / raw)
  To: Bryce Johnson, James Prestwood; +Cc: iwd

Hi Bryce,

 > Here were the test cases
> For test case 10153_1:  The test bed AP beacons with no security.  The
> test case requires the STAUT to connect with WPA2-PSK only.  Because
> of the mismatch of security protocols, the connection will fail.

This is a tough one since iwd categorizes networks into SSID+security and treats 
each combo as a separate network.  In other words SSID Foobar that advertises 
Open and SSID Foobar that advertises WPA-Personal will be treated as two 
separate networks.

Best we can do is add some sort of global restriction setting to iwd (like 
always use WPA2+ or WPA3+).  But really, this is almost always not what a 
typical user would want.  Users do want to connect to Open/OWE networks, legacy 
networks, etc.

Another thing to try is to force OWE-only mode for the Open network, but I'm not 
sure whether that will work for the 'spirit' of what the test is trying to do. 
Adding SSID.open with something like:
"
[Settings]
TransitionDisable=true
DisabledTransitionModes=open
"

> 
> For test case 10165_1: The test bed AP advertises at WPA2-Personal
> only.  The test case requires the STAUT to connect with WPA3-Personal.
> Because of the mismatch of security protocols, the connection will
> also fail.

This is a little bit easier.  You can add a SSID.psk setting with the following:
"
[Settings]
TransitionDisable=true
DisbledTransitionModes=personal
"

Refer to man 5 iwd.network for more details.

Regards,
-Denis

^ permalink raw reply	[flat|nested] 7+ messages in thread

end of thread, other threads:[~2026-01-30 17:39 UTC | newest]

Thread overview: 7+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2026-01-30 14:43 Is there a way to manually force the security protocol with IWD? Bryce Johnson
2026-01-30 14:48 ` James Prestwood
2026-01-30 15:01   ` Bryce Johnson
2026-01-30 15:07     ` James Prestwood
2026-01-30 17:21       ` Bryce Johnson
2026-01-30 17:36         ` James Prestwood
2026-01-30 17:39         ` Denis Kenzior

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox