* Is there a way to manually force the security protocol with IWD? @ 2026-01-30 14:43 Bryce Johnson 2026-01-30 14:48 ` James Prestwood 0 siblings, 1 reply; 7+ messages in thread From: Bryce Johnson @ 2026-01-30 14:43 UTC (permalink / raw) To: iwd Hi All We are working to get our product through wifi certification. Our testing company mentioned there was several negative test cases that were failing where IWD was connecting anyways because it would decide on the security type based on the AP. Is there a way to force IWD to use a security type that is different than the AP so it would fail the connection? Can we disable WPA1-only connection or force WPA2 only connection? Thanks Bryce ^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: Is there a way to manually force the security protocol with IWD? 2026-01-30 14:43 Is there a way to manually force the security protocol with IWD? Bryce Johnson @ 2026-01-30 14:48 ` James Prestwood 2026-01-30 15:01 ` Bryce Johnson 0 siblings, 1 reply; 7+ messages in thread From: James Prestwood @ 2026-01-30 14:48 UTC (permalink / raw) To: Bryce Johnson, iwd Hi Bryce, On 1/30/26 6:43 AM, Bryce Johnson wrote: > Hi All > We are working to get our product through wifi certification. Our > testing company mentioned there was several negative test cases that > were failing where IWD was connecting anyways because it would decide > on the security type based on the AP. Is there a way to force IWD to > use a security type that is different than the AP so it would fail the > connection? Can we disable WPA1-only connection or force WPA2 only > connection? There unfortunately isn't at the moment. We do have a "developer mode" by specifying "-E" to IWD and this seems like it would fall into that category, support would need to be added of course. But I'm somewhat confused (and maybe this is just poor test cases by WFA?), why would you need to certify that IWD fails when using a different security type than the AP? A client should not ever use a security type the AP doesn't advertise support for... This feels like its testing the AP, not IWD :) > > Thanks > Bryce > ^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: Is there a way to manually force the security protocol with IWD? 2026-01-30 14:48 ` James Prestwood @ 2026-01-30 15:01 ` Bryce Johnson 2026-01-30 15:07 ` James Prestwood 0 siblings, 1 reply; 7+ messages in thread From: Bryce Johnson @ 2026-01-30 15:01 UTC (permalink / raw) To: James Prestwood; +Cc: iwd Hi James On Fri, Jan 30, 2026 at 7:48 AM James Prestwood <prestwoj@gmail.com> wrote: > > Hi Bryce, > > On 1/30/26 6:43 AM, Bryce Johnson wrote: > > Hi All > > We are working to get our product through wifi certification. Our > > testing company mentioned there was several negative test cases that > > were failing where IWD was connecting anyways because it would decide > > on the security type based on the AP. Is there a way to force IWD to > > use a security type that is different than the AP so it would fail the > > connection? Can we disable WPA1-only connection or force WPA2 only > > connection? > > There unfortunately isn't at the moment. We do have a "developer mode" > by specifying "-E" to IWD and this seems like it would fall into that > category, support would need to be added of course. > > But I'm somewhat confused (and maybe this is just poor test cases by > WFA?), why would you need to certify that IWD fails when using a > different security type than the AP? A client should not ever use a > security type the AP doesn't advertise support for... This feels like > its testing the AP, not IWD :) > I'm was requesting what test case fails and if I could get a copy of it. The only thing I can think of is that they want to disable WPA1 for example and show that the device won't connect to a WPA1 only AP. Or maybe for a product you only want to connect WPA3 and fail and not connect or not allow the AP to downgrade the connection. Maybe it would make sense to allow a blacklist of protocols you won't allow IWD to use? For our product we wouldn't allow open or WEP connections for example (but we perform that check outside of IWD). > > > > Thanks > > Bryce > > ^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: Is there a way to manually force the security protocol with IWD? 2026-01-30 15:01 ` Bryce Johnson @ 2026-01-30 15:07 ` James Prestwood 2026-01-30 17:21 ` Bryce Johnson 0 siblings, 1 reply; 7+ messages in thread From: James Prestwood @ 2026-01-30 15:07 UTC (permalink / raw) To: Bryce Johnson; +Cc: iwd Hi, On 1/30/26 7:01 AM, Bryce Johnson wrote: > Hi James > > On Fri, Jan 30, 2026 at 7:48 AM James Prestwood <prestwoj@gmail.com> wrote: >> Hi Bryce, >> >> On 1/30/26 6:43 AM, Bryce Johnson wrote: >>> Hi All >>> We are working to get our product through wifi certification. Our >>> testing company mentioned there was several negative test cases that >>> were failing where IWD was connecting anyways because it would decide >>> on the security type based on the AP. Is there a way to force IWD to >>> use a security type that is different than the AP so it would fail the >>> connection? Can we disable WPA1-only connection or force WPA2 only >>> connection? >> There unfortunately isn't at the moment. We do have a "developer mode" >> by specifying "-E" to IWD and this seems like it would fall into that >> category, support would need to be added of course. >> >> But I'm somewhat confused (and maybe this is just poor test cases by >> WFA?), why would you need to certify that IWD fails when using a >> different security type than the AP? A client should not ever use a >> security type the AP doesn't advertise support for... This feels like >> its testing the AP, not IWD :) >> > I'm was requesting what test case fails and if I could get a copy of > it. The only thing I can think of is that they want to disable WPA1 > for example and show that the device won't connect to a WPA1 only AP. > Or maybe for a product you only want to connect WPA3 and fail and not > connect or not allow the AP to downgrade the connection. Yeah I'd be interested in the test case. > > Maybe it would make sense to allow a blacklist of protocols you won't > allow IWD to use? For our product we wouldn't allow open or WEP > connections for example (but we perform that check outside of IWD). IWD already won't connect to a WEP network, so we're ok there. You may be able to coax out some behavior with the following options: main.conf [General].ManagementFrameProtection network profile: [Settings].TransitionDisable [Settings].DisabledTransitionModes Anyways, lets hope you can get the test case. Shouldn't be too hard to add some support for specific test/dev type requirements. Thanks, James > >>> Thanks >>> Bryce >>> ^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: Is there a way to manually force the security protocol with IWD? 2026-01-30 15:07 ` James Prestwood @ 2026-01-30 17:21 ` Bryce Johnson 2026-01-30 17:36 ` James Prestwood 2026-01-30 17:39 ` Denis Kenzior 0 siblings, 2 replies; 7+ messages in thread From: Bryce Johnson @ 2026-01-30 17:21 UTC (permalink / raw) To: James Prestwood; +Cc: iwd Hi James, On Fri, Jan 30, 2026 at 8:07 AM James Prestwood <prestwoj@gmail.com> wrote: > > Hi, > > On 1/30/26 7:01 AM, Bryce Johnson wrote: > > Hi James > > > > On Fri, Jan 30, 2026 at 7:48 AM James Prestwood <prestwoj@gmail.com> wrote: > >> Hi Bryce, > >> > >> On 1/30/26 6:43 AM, Bryce Johnson wrote: > >>> Hi All > >>> We are working to get our product through wifi certification. Our > >>> testing company mentioned there was several negative test cases that > >>> were failing where IWD was connecting anyways because it would decide > >>> on the security type based on the AP. Is there a way to force IWD to > >>> use a security type that is different than the AP so it would fail the > >>> connection? Can we disable WPA1-only connection or force WPA2 only > >>> connection? > >> There unfortunately isn't at the moment. We do have a "developer mode" > >> by specifying "-E" to IWD and this seems like it would fall into that > >> category, support would need to be added of course. > >> > >> But I'm somewhat confused (and maybe this is just poor test cases by > >> WFA?), why would you need to certify that IWD fails when using a > >> different security type than the AP? A client should not ever use a > >> security type the AP doesn't advertise support for... This feels like > >> its testing the AP, not IWD :) > >> > > I'm was requesting what test case fails and if I could get a copy of > > it. The only thing I can think of is that they want to disable WPA1 > > for example and show that the device won't connect to a WPA1 only AP. > > Or maybe for a product you only want to connect WPA3 and fail and not > > connect or not allow the AP to downgrade the connection. > Yeah I'd be interested in the test case. > > > > Maybe it would make sense to allow a blacklist of protocols you won't > > allow IWD to use? For our product we wouldn't allow open or WEP > > connections for example (but we perform that check outside of IWD). > > IWD already won't connect to a WEP network, so we're ok there. You may > be able to coax out some behavior with the following options: > > main.conf > > [General].ManagementFrameProtection > > network profile: > > [Settings].TransitionDisable > > [Settings].DisabledTransitionModes > > Anyways, lets hope you can get the test case. Shouldn't be too hard to > add some support for specific test/dev type requirements. Here were the test cases For test case 10153_1: The test bed AP beacons with no security. The test case requires the STAUT to connect with WPA2-PSK only. Because of the mismatch of security protocols, the connection will fail. For test case 10165_1: The test bed AP advertises at WPA2-Personal only. The test case requires the STAUT to connect with WPA3-Personal. Because of the mismatch of security protocols, the connection will also fail. I got the PDFs of the test cases I can share offlist as well. 10153_1 looks like it would not connect, but apparently hung up on the setting the STAUT to WPA2-PSK only. So it looks like I need a way to restrict IWD from using other security types for these tests. If you have any suggestions on a good way to do this, let me know. Thanks Bryce ^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: Is there a way to manually force the security protocol with IWD? 2026-01-30 17:21 ` Bryce Johnson @ 2026-01-30 17:36 ` James Prestwood 2026-01-30 17:39 ` Denis Kenzior 1 sibling, 0 replies; 7+ messages in thread From: James Prestwood @ 2026-01-30 17:36 UTC (permalink / raw) To: Bryce Johnson; +Cc: iwd Hi Bryce, On 1/30/26 9:21 AM, Bryce Johnson wrote: > Hi James, > > On Fri, Jan 30, 2026 at 8:07 AM James Prestwood <prestwoj@gmail.com> wrote: >> Hi, >> >> On 1/30/26 7:01 AM, Bryce Johnson wrote: >>> Hi James >>> >>> On Fri, Jan 30, 2026 at 7:48 AM James Prestwood <prestwoj@gmail.com> wrote: >>>> Hi Bryce, >>>> >>>> On 1/30/26 6:43 AM, Bryce Johnson wrote: >>>>> Hi All >>>>> We are working to get our product through wifi certification. Our >>>>> testing company mentioned there was several negative test cases that >>>>> were failing where IWD was connecting anyways because it would decide >>>>> on the security type based on the AP. Is there a way to force IWD to >>>>> use a security type that is different than the AP so it would fail the >>>>> connection? Can we disable WPA1-only connection or force WPA2 only >>>>> connection? >>>> There unfortunately isn't at the moment. We do have a "developer mode" >>>> by specifying "-E" to IWD and this seems like it would fall into that >>>> category, support would need to be added of course. >>>> >>>> But I'm somewhat confused (and maybe this is just poor test cases by >>>> WFA?), why would you need to certify that IWD fails when using a >>>> different security type than the AP? A client should not ever use a >>>> security type the AP doesn't advertise support for... This feels like >>>> its testing the AP, not IWD :) >>>> >>> I'm was requesting what test case fails and if I could get a copy of >>> it. The only thing I can think of is that they want to disable WPA1 >>> for example and show that the device won't connect to a WPA1 only AP. >>> Or maybe for a product you only want to connect WPA3 and fail and not >>> connect or not allow the AP to downgrade the connection. >> Yeah I'd be interested in the test case. >>> Maybe it would make sense to allow a blacklist of protocols you won't >>> allow IWD to use? For our product we wouldn't allow open or WEP >>> connections for example (but we perform that check outside of IWD). >> IWD already won't connect to a WEP network, so we're ok there. You may >> be able to coax out some behavior with the following options: >> >> main.conf >> >> [General].ManagementFrameProtection >> >> network profile: >> >> [Settings].TransitionDisable >> >> [Settings].DisabledTransitionModes >> >> Anyways, lets hope you can get the test case. Shouldn't be too hard to >> add some support for specific test/dev type requirements. > Here were the test cases > For test case 10153_1: The test bed AP beacons with no security. The > test case requires the STAUT to connect with WPA2-PSK only. Because > of the mismatch of security protocols, the connection will fail. > > For test case 10165_1: The test bed AP advertises at WPA2-Personal > only. The test case requires the STAUT to connect with WPA3-Personal. > Because of the mismatch of security protocols, the connection will > also fail. Both of these are pretty ridiculous. They want to test that a client chooses an incompatible security type than what the AP advertises.... what?!? I know these are coming from the WFA, and not you... Its just rather annoying that they're so adapted to using wpa_supplicant which you can force to do stupid things like this. And the fact they wrote test cases around that is just sad. I guess the only option if these are strictly required is to add some config option to the profiles that restrict what security types can be used. > > I got the PDFs of the test cases I can share offlist as well. 10153_1 > looks like it would not connect, but apparently hung up on the setting > the STAUT to WPA2-PSK only. So it looks like I need a way to restrict > IWD from using other security types for these tests. If you have any > suggestions on a good way to do this, let me know. > > Thanks > Bryce ^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: Is there a way to manually force the security protocol with IWD? 2026-01-30 17:21 ` Bryce Johnson 2026-01-30 17:36 ` James Prestwood @ 2026-01-30 17:39 ` Denis Kenzior 1 sibling, 0 replies; 7+ messages in thread From: Denis Kenzior @ 2026-01-30 17:39 UTC (permalink / raw) To: Bryce Johnson, James Prestwood; +Cc: iwd Hi Bryce, > Here were the test cases > For test case 10153_1: The test bed AP beacons with no security. The > test case requires the STAUT to connect with WPA2-PSK only. Because > of the mismatch of security protocols, the connection will fail. This is a tough one since iwd categorizes networks into SSID+security and treats each combo as a separate network. In other words SSID Foobar that advertises Open and SSID Foobar that advertises WPA-Personal will be treated as two separate networks. Best we can do is add some sort of global restriction setting to iwd (like always use WPA2+ or WPA3+). But really, this is almost always not what a typical user would want. Users do want to connect to Open/OWE networks, legacy networks, etc. Another thing to try is to force OWE-only mode for the Open network, but I'm not sure whether that will work for the 'spirit' of what the test is trying to do. Adding SSID.open with something like: " [Settings] TransitionDisable=true DisabledTransitionModes=open " > > For test case 10165_1: The test bed AP advertises at WPA2-Personal > only. The test case requires the STAUT to connect with WPA3-Personal. > Because of the mismatch of security protocols, the connection will > also fail. This is a little bit easier. You can add a SSID.psk setting with the following: " [Settings] TransitionDisable=true DisbledTransitionModes=personal " Refer to man 5 iwd.network for more details. Regards, -Denis ^ permalink raw reply [flat|nested] 7+ messages in thread
end of thread, other threads:[~2026-01-30 17:39 UTC | newest] Thread overview: 7+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2026-01-30 14:43 Is there a way to manually force the security protocol with IWD? Bryce Johnson 2026-01-30 14:48 ` James Prestwood 2026-01-30 15:01 ` Bryce Johnson 2026-01-30 15:07 ` James Prestwood 2026-01-30 17:21 ` Bryce Johnson 2026-01-30 17:36 ` James Prestwood 2026-01-30 17:39 ` Denis Kenzior
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox